summaryrefslogtreecommitdiff
path: root/comms
AgeCommit message (Collapse)AuthorFilesLines
2013-09-10Forgotten patch to ensure presence of ioctl prototype.joerg1-0/+12
2013-09-10Fix operator precendence. Include missing header. Use socklen_t.joerg8-21/+104
Don't pass formatted buffers as format string. Bump revision.
2013-09-10Continue on pointer sign warnings from clang.joerg1-1/+4
2013-09-10Fix printf argument type. Handle errors properly. Bump revision.joerg3-5/+24
2013-09-02Revbump after cairo updateadam12-21/+24
2013-08-30Requires jbigkit. Bump revision.joerg3-3/+15
2013-08-30Update to Asterisk 11.5.1: this is a security fix release to fixjnemeth2-10/+9
AST-2013-004 and AST-2013-005. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security rele ases are released as versions 1.8.15-cert2, 11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1. The release of these versions resolve the following issues: * A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present. * A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-004 and AST-2013-005, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.5.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf Thank you for your continued support of Asterisk!
2013-08-29Update to Asterisk 10.12.3: this is a security fix release to fixjnemeth2-11/+16
AST-2013-004 and AST-2013-005. pkgsrc change: disable detection of broken IP_PKTINFO on NetBSD The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security rele ases are released as versions 1.8.15-cert2, 11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1. The release of these versions resolve the following issues: * A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present. * A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-004 and AST-2013-005, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.3 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf Thank you for your continued support of Asterisk!
2013-08-29Update to Asterisk 1.8.23.1: this is a security fix release to fixjnemeth2-9/+9
AST-2013-004 and AST-2013-005. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15, 11.2, and Asterisk 1.8, 10, and 11. The available security rele ases are released as versions 1.8.15-cert2, 11.2-cert2, 1.8.23.1, 10.12.3, 10.12.3-di giumphones, and 11.5.1. The release of these versions resolve the following issues: * A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present. * A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set. These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-004 and AST-2013-005, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.23.1 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-004.pdf * http://downloads.asterisk.org/pub/security/AST-2013-005.pdf Thank you for your continued support of Asterisk!
2013-08-22using hicolor-icon-theme.obache1-1/+3
Bump PKGREVISION.
2013-08-08Add patches to convert RAII_VAR to a method that doesn't use nestedjnemeth14-8/+956
functions, thus making Asterisk portable to all C compilers. The patches from joerg@ (with one missing file added by myself).
2013-07-21Update to Asterisk 1.8.23.0: this is a bugfix releasejnemeth3-17/+22
pkgsrc changes: - add work around for NetBSD's incompatible implementation of IP_PKTINFO - core sounds package was updated to 1.4.24 The Asterisk Development Team has announced the release of Asterisk 1.8.23.0. The release of Asterisk 1.8.23.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix a memory copying bug in slinfactory which was causing mixmonitor issues. * --- IAX2: fix race condition with nativebridge transfers. * --- Fix crash in chan_sip when a core initiated op occurs at the same time as a BYE * --- Fix The Payload Being Set On CN Packets And Do Not Set Marker Bit * --- chan_sip: Session-Expires: Set timer to correctly expire at (~2/3) of the interval when not the refresher For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.23.0 Thank you for your continued support of Asterisk!
2013-07-21Upgrade to Asterisk 11.5.0: this is a general bug fix releasejnemeth3-17/+23
pkgsrc changes: - add dependency on libuuid - work around NetBSD's incompatible implementation of IP_PKTINFO The Asterisk Development Team has announced the release of Asterisk 11.5.0. The release of Asterisk 11.5.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix Segfault In app_queue When "persistentmembers" Is Enabled And Using Realtime * --- IAX2: fix race condition with nativebridge transfers. * --- Fix The Payload Being Set On CN Packets And Do Not Set Marker Bit * --- Fix One-Way Audio With auto_* NAT Settings When SIP Calls Initiated By PBX * --- chan_sip: NOTIFYs for BLF start queuing up and fail to be sent out after retries fail For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.5.0 Thank you for your continued support of Asterisk!
2013-07-21Tweak GEM_CLEANBUILD for ruby200.taca1-2/+3
2013-07-17catch up to changes in Makefileobache1-2/+2
(devel/readline/buildlink3.mk => mk/readline.buildlink3.mk)
2013-07-15* .include "../../devel/readline/buildlink3.mk" with USE_GNU_READLINE=yesryoon3-6/+6
are replaced with .include "../../devel/readline/buildlink3.mk", and USE_GNU_READLINE are removed, * .include "../../devel/readline/buildlink3.mk" without USE_GNU_READLINE are replaced with .include "../../mk/readline.buildlink3.mk".
2013-07-12Bump PKGREVISION of all packages which create users, to pick up change ofjperkin7-13/+14
sysutils/user_* packages.
2013-06-16Asterisk is known to fail on 32-bit systems, specifically i386. Mark itjnemeth3-3/+12
as such until the bug is found and fixed.
2013-06-15- fix compile issue when newlocale support is detected, from joerg@jnemeth6-18/+142
2013-06-15Packaged DeforaOS Phone 0.3.12, with:khorben3-11/+29
- improvements to the user interface - better phone log support - support for changing the SIM PIN code (via the new "password" plug-in) - optional "pulseaudio" plug-in (instead of builtin to the "profiles" plug-in) - fixes to the "video" plug-in - new manual pages - more portable Makefiles
2013-06-14- fix PLIST when jabber option is disabledjnemeth7-21/+145
- fix build when newlocale is detected, patch from joerg@
2013-06-14- fix PLIST when jabber option is disabledjnemeth9-24/+189
- fix compile problem on newer NetBSD systems that have newlocale support - fix a couple of cases where ctype functions called with plain char - last two items from joerg@
2013-06-09Remove fortran77 from USE_LANGUAGES as suggested by jnemeth@rodent1-2/+2
2013-06-09Updated to latest pre-release, 0.0.6pre21. No ChangeLog. pkgsrc changes:rodent5-13/+44
Commented 2/3 patches. Added gsed to USE_TOOLS. Buildlink'd pthread. Added fortran77 to USE_LANGUAGES. Included options.mk file to enable the user to build with mmx, sse, and "tests" option, which uses pcap, X11, sndfile, libxml2, fltk, and fftw to run some tests. All of these options are disabled by default. Some of these changes were already present in wip/spandsp and were merged into this package after its removal. All PKG_OPTIONS are disabled by default. There are no noticeable changes to the package from this update.
2013-06-06Bump PKGREVISION for libXft changes for NetBSD native X support onwiz13-26/+26
NetBSD 6, requested by tron.
2013-06-04Try to fix the fallout caused by the fix for PR pkg/47882. Part 3:tron13-26/+26
Recursively bump package revisions again after the "freetype2" and "fontconfig" handling was fixed.
2013-06-03Bump freetype2 and fontconfig dependencies to current pkgsrc versions,wiz13-24/+26
to address issues with NetBSD-6(and earlier)'s fontconfig not being new enough for pango. While doing that, also bump freetype2 dependency to current pkgsrc version. Suggested by tron in PR 47882
2013-05-31Bump all packages for perl-5.18, thatwiz17-32/+34
a) refer 'perl' in their Makefile, or b) have a directory name of p5-*, or c) have any dependency on any p5-* package Like last time, where this caused no complaints.
2013-05-26+libti* +tilp2;rodent1-1/+6
2013-05-26Import tilp2-1.16 as comms/tilp2.rodent5-0/+186
"Tilp is a Linking Program" - The TiLP project aims to develop a multi-platform linking program for use with all TI graphing calculators (TI73 ... V200PLT). Supported link cables are: GrayLink, BlackLink, SilverLink, DirectLink Parallel Link, VTi (virtual) and TiEmu (virtual). Supported hand-helds are: TI73, TI82, TI83, TI83+, TI84+, TI85, TI86, TI89, Titanium, TI92, TI92+, V200, NSpire, NSpire-CAS. Capabilities: silent link, screendump, directory listing, send/recv of vars, send/Recv of backups, send/recv of FLASH apps, send of OS, ROM dumping, ID LIST, clock, create folder, delete var/app...
2013-05-26Import libtifiles2-1.1.5 as comms/libtifiles2.rodent6-0/+100
"Tilp is a Linking Program" - The TiLP project aims to develop a multi-platform linking program for use with all TI graphing calculators (TI73 ... V200PLT). Supported link cables are: GrayLink, BlackLink, SilverLink, DirectLink Parallel Link, VTi (virtual) and TiEmu (virtual). Supported hand-helds are: TI73, TI82, TI83, TI83+, TI84+, TI85, TI86, TI89, Titanium, TI92, TI92+, V200, NSpire, NSpire-CAS. Capabilities: silent link, screendump, directory listing, send/recv of vars, send/Recv of backups, send/recv of FLASH apps, send of OS, ROM dumping, ID LIST, clock, create folder, delete var/app...
2013-05-26Import libticonv-1.1.3 as comms/libticonv.rodent5-0/+59
"Tilp is a Linking Program" - The TiLP project aims to develop a multi-platform linking program for use with all TI graphing calculators (TI73 ... V200PLT). Supported link cables are: GrayLink, BlackLink, SilverLink, DirectLink Parallel Link, VTi (virtual) and TiEmu (virtual). Supported hand-helds are: TI73, TI82, TI83, TI83+, TI84+, TI85, TI86, TI89, Titanium, TI92, TI92+, V200, NSpire, NSpire-CAS. Capabilities: silent link, screendump, directory listing, send/recv of vars, send/Recv of backups, send/recv of FLASH apps, send of OS, ROM dumping, ID LIST, clock, create folder, delete var/app...
2013-05-26Import libticalcs2-1.1.7 as comms/libticalcs2.rodent6-0/+88
"Tilp is a Linking Program" - The TiLP project aims to develop a multi-platform linking program for use with all TI graphing calculators (TI73 ... V200PLT). Supported link cables are: GrayLink, BlackLink, SilverLink, DirectLink Parallel Link, VTi (virtual) and TiEmu (virtual). Supported hand-helds are: TI73, TI82, TI83, TI83+, TI84+, TI85, TI86, TI89, Titanium, TI92, TI92+, V200, NSpire, NSpire-CAS. Capabilities: silent link, screendump, directory listing, send/recv of vars, send/Recv of backups, send/recv of FLASH apps, send of OS, ROM dumping, ID LIST, clock, create folder, delete var/app...
2013-05-26Import libticables2-1.3.3 as comms/libticables2.rodent6-0/+105
"Tilp is a Linking Program" - The TiLP project aims to develop a multi-platform linking program for use with all TI graphing calculators (TI73 ... V200PLT). Supported link cables are: GrayLink, BlackLink, SilverLink, DirectLink Parallel Link, VTi (virtual) and TiEmu (virtual). Supported hand-helds are: TI73, TI82, TI83, TI83+, TI84+, TI85, TI86, TI89, Titanium, TI92, TI92+, V200, NSpire, NSpire-CAS. Capabilities: silent link, screendump, directory listing, send/recv of vars, send/Recv of backups, send/recv of FLASH apps, send of OS, ROM dumping, ID LIST, clock, create folder, delete var/app...
2013-05-25g_type_init is deprecated.joerg2-1/+15
2013-05-25Update to 1.8.0. Changes:shattered3-9/+11
Added libgcrypt support Added support for Calendar app Export function for KeyRing data Overhaul of Expense plugin Overhaul VCARD export including adding IM, Birthday, Website fields GUI changes: ToDo items due today are marked by a soft green color GUI changes: new alarm clock and lock icons GUI changes: radio buttons to select between timed and untimed events Fixed Mac OS X bugs/crash Resolve segmentation fault when editing Contacts with attached pictures Resolve error where Contacts created on Palm could not be deleted with Jpilot Resolve sync error with simultaneously modified Contacts Fix Bug 1991 : Categories are lost during first sync
2013-05-24Bump PKGREVISION for libproxy shlib major bump.wiz3-6/+6
2013-05-21Use real prototype for main.joerg2-4/+110
2013-05-18Update to Asterisk 11.4.0: this is a general bugfix release.jnemeth6-91/+35
The Asterisk Development Team has announced the release of Asterisk 11.4.0. The release of Asterisk 11.4.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix Sorting Order For Parking Lots Stored In Static Realtime * --- Fix StopMixMonitor Hanging Up When Unable To Stop MixMonitor On A Channel * --- When a session timer expires during a T.38 call, re-invite with correct SDP * --- Fix white noise on SRTP decryption * --- Fix reload skinny with active devices. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.4.0 Thank you for your continued support of Asterisk!
2013-05-18Update to Asterisk 1.8.22.0: this is a bug fix update.jnemeth3-24/+11
The Asterisk Development Team has announced the release of Asterisk 1.8.22.0. The release of Asterisk 1.8.22.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix Sorting Order For Parking Lots Stored In Static Realtime * --- Make ParkAndAnnounce return to priority + 1 when return context is not defined * --- When a session timer expires during a T.38 call, re-invite with correct SDP * --- Fix several unreleased mutex locks that cause problem with processing calls * --- Fix crash when AMI redirect action redirects two channels out of a bridge. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.22.0 Thank you for your continued support of Asterisk!
2013-05-12Whoops missed updating sound tarball in 11.3.0 update. Fixed.jnemeth2-5/+122
Thanks to joerg@ for pointing it out.
2013-05-09Massive revbump after updating graphics/ilmbase, graphics/openexr, textproc/icu.adam13-23/+26
2013-05-05Update to Asterisk 11.3.0: this is a bugfix release.jnemeth6-60/+62
The Asterisk Development Team has announced the release of Asterisk 11.3.0. The release of Asterisk 11.3.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix issue where chan_mobile fails to bind to first available port * --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h" Extension Present * --- Retain XMPP filters across reconnections so external modules continue to function as expected. * --- Ensure that a declined media stream is terminated with a '\r\n' * --- Fix pjproject compilation in certain circumstances For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-11.3.0 Thank you for your continued support of Asterisk!
2013-04-24Revbump for all packages that have USE_TOOLS+=gssbd1-2/+2
2013-04-18Update to Asterisk 1.8.21.0: this is a bug fix updatejnemeth5-50/+169
The Asterisk Development Team has announced the release of Asterisk 1.8.21.0. The release of Asterisk 1.8.21.0 resolves several issues reported by the community and would have not been possible without your participation. Thank you! The following is a sample of the issues resolved in this release: * --- Fix issue where chan_mobile fails to bind to first available port * --- Fix station ringback; trunk hangup issues in SLA * --- Fix Queue Log Reporting Every Call COMPLETECALLER With "h" Extension Present * --- Fix Record-Route parsing for large headers. * --- Fix AMI redirect action with two channels failing to redirect both channels. For a full list of changes in this release, please see the ChangeLog: http://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-1.8.21.0 Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 11.2.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A possible buffer overflow during H.264 format negotiation. The format attribute resource for H.264 video performs an unsafe read against a media attribute when parsing the SDP. This vulnerability only affected Asterisk 11. * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-11.2.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 10.12.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-10.12.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-10Update to Asterisk 1.2.20.2: this is a security update which fixesjnemeth2-10/+9
AST-2013-001, AST-2013-002, and AST-2013-003. The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.15 and Asterisk 1.8, 10, and 11. The available security releases are released as versions 1.8.15-cert2, 1.8.20.2, 10.12.2, 10.12.2-digiumphones, and 11.2.2. The release of these versions resolve the following issues: * A denial of service exists in Asterisk's HTTP server. AST-2012-014, fixed in January of this year, contained a fix for Asterisk's HTTP server for a remotely-triggered crash. While the fix prevented the crash from being triggered, a denial of service vector still exists with that solution if an attacker sends one or more HTTP POST requests with very large Content-Length values. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 * A potential username disclosure exists in the SIP channel driver. When authenticating a SIP request with alwaysauthreject enabled, allowguest disabled, and autocreatepeer disabled, Asterisk discloses whether a user exists for INVITE, SUBSCRIBE, and REGISTER transactions in multiple ways. This vulnerability affects Certified Asterisk 1.8.15, Asterisk 1.8, 10, and 11 These issues and their resolutions are described in the security advisories. For more information about the details of these vulnerabilities, please read security advisories AST-2013-001, AST-2013-002, and AST-2013-003, which were released at the same time as this announcement. For a full list of changes in the current releases, please see the ChangeLogs: http://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-1.8.20.2 The security advisories are available at: * http://downloads.asterisk.org/pub/security/AST-2013-001.pdf * http://downloads.asterisk.org/pub/security/AST-2013-002.pdf * http://downloads.asterisk.org/pub/security/AST-2013-003.pdf Thank you for your continued support of Asterisk!
2013-04-07Edited DESCR in the case of:rodent2-62/+41
File too long (should be no more than 24 lines). Line too long (should be no more than 80 characters). Trailing empty lines. Trailing white-space. Trucated the long files as best as possible while preserving the most info contained in them.
2013-04-07Revert: these packages are marked OWNER= for a reason!jnemeth2-6/+4
pkglint warnings aren't gospel! They need to be verified in an intelligent manner. After variable substitution, the lines will be shorter then 80 characters, thus there was no need to shorten them.