From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by sourceware.org (Postfix) with ESMTPS id 251313858424 for ; Sat, 24 Feb 2024 20:38:07 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 251313858424 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=SystematicSW.ab.ca Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=SystematicSW.ab.ca ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 251313858424 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=216.40.44.14 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1708807090; cv=none; b=oUGzk1ehw6vw+U0rg11Nl4kc/wxNf80yQ9fThuApy3Fe87vjz10iREjf9Wr4Rj6X86cn9zgZHirAsLpJTf/Ygxqp8xnRuCADmd7wGGvzM+W5qeK0vdRh7bSVldGygud+f6nFcCDh07FCHvTfjz8EIKWleOwPD7nvu1glkn1JDwk= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1708807090; c=relaxed/simple; bh=LQoqNA1XVJP+LV+G5+hcxZKu++7JKbx9EVvSBShWg1o=; h=From:To:Date:Message-Id:Subject; b=fPEMi7vcqqfeOi+rm2DDghGF0esGKBAYo751aJZ8l3qCfaVw+acAnVgQpF8S21JA/sTh6rRnKpPTpZi3VztpFdQ7sxjU5HdshaJkkMkFFBAqs1hZz8aw+6X09X7wgLTQVKU8AFN5f5+6ByM/xzqrHT2HNvHKvFUJBpk8b2lVxf0= ARC-Authentication-Results: i=1; server2.sourceware.org Received: from omf19.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id B5B90C01FF for ; Sat, 24 Feb 2024 20:38:06 +0000 (UTC) Received: from [HIDDEN] (Authenticated sender: Brian.Inglis@SystematicSW.ab.ca) by omf19.hostedemail.com (Postfix) with ESMTPA id 9D54620026 for ; Sat, 24 Feb 2024 20:38:04 +0000 (UTC) From: "Cygwin vttest Maintainer" To: "Cygwin Announcements" Reply-To: "Cygwin" Date: Sat, 24 Feb 2024 13:35:46 -0700 Message-Id: <20240224133546.28341-1-Brian.Inglis@SystematicSW.ab.ca> Subject: Updated: vttest 20240218 X-Rspamd-Queue-Id: 9D54620026 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,KAM_DMARC_STATUS,KAM_NUMSUBJECT,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Stat-Signature: ftwnmxq6f9fjxuexcxys8qe9zdw8wj41 X-Rspamd-Server: rspamout04 X-Session-Marker: 427269616E2E496E676C69734053797374656D6174696353572E61622E6361 X-Session-ID: U2FsdGVkX19LFr+YG+O4NDC3E1pS01SzBnd/RXQVxcg= X-HE-Tag: 1708807084-453566 X-HE-Meta: U2FsdGVkX1/niVBeDiA4cMsW50Q7FURSkDWodg4+qMsZRZU6d1Efhs/DHJXUIgTv8ZPRWPZyxraKhfE+10txOPs5KHMTYti9YsRlvyoIk2pCzfQ8Fgqhszp0PLHCvW4zkqsJCqNAeoZERYywaoJNVyGT8ff1eaHG5fGWf4pnXPpYvIOzvj3abpZQ6f3hUT7bm5X04uz3jKybQeuW+METDDeJ7cs1FCZ+a0bFKeijP7MpH0Co2RlDcxeAOts6KTdGGuNeDDISGX4arlpUFxLen6ZOhIuNMUugowHX348fRN/KIcfwyS6fAJj4f4D7vp5w5MbVwJPMxaUyz6nARhbWYsUhyRig1//a X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: The following package has been upgraded in the Cygwin distribution: * vttest 20240218 Tests the functionality of a VT100 terminal (or emulator thereof). Tests both display (escape sequence handling) and keyboard. The program is menu-driven and contains full operating instructions. To run a given menu-item, you enter its number. You can run all menu-items (for a given level) by entering an asterisk, i.e, '*'. It has been enhanced to support and test many xterm control and status escape sequences, and it is mainly used nowadays for testing emulator compatibility. See the project home page for more information: https://invisible-island.net/vttest/ Please see below or read /usr/share/doc/vttest/CHANGES after installation for details of changes since the last Cygwin release. https://github.com/ThomasDickey/vttest-snapshots/blob/master/CHANGES 20240218 - other improvements - modify DECAC test to include the window-frame - accept a 23/unsupported response for DSR status of UDK - improve/correct resetting of character-sets after tests: - improve use of current settings in the reset function - fix a case which tried to set a 96-character set in G0 - add a reset after SI/SO test - update config.guess, config.sub