graphics/ivtools - The NetBSD Packages Collection

Drawing editors for PostScript, TeX, and web graphics

ivtools is a layered collection of application frameworks for building
custom drawing editors and spatial data servers.  It incorporates a
backward compatible copy of the original InterViews and Unidraw class
libraries and sample programs (from 3.2a.tar.Z), augmented with new
class libraries and sample programs for a wide variety of generic
spatial data applications.

ivtools comprises four sets of interrelated capabilities useful to
application programmers.  The first set is the libraries and example
programs borrowed whole from InterViews 3.1.  The second set is for
reusing and extending the light-weight glyph objects of InterViews 3.1
which embody a lot of the capability of TeX.  The third set reuses and
extends the Unidraw library (Unidraw is a major portion of the overall
InterViews 3.1 release that provides an application framework for
custom drawing editors).  The fourth set adds a command interpreter
and server mechanism to ivtools, and demonstrates these capabilities
with text, glyph, and graphic front-ends.  To get more of an overview
of these layers you can read:

Build dependencies

pkgtools/x11-links pkgtools/cwrappers print/ghostscript devel/libtool-base devel/automake devel/autoconf devel/gmake

Runtime dependencies

fonts/ghostscript-fonts shells/bash graphics/tiff graphics/tiff

Binary packages

NetBSD 8.0earmv7hfivtools-2.0.4a1.tgz
NetBSD 9.0aarch64ivtools-2.0.4a1.tgz
NetBSD 9.0earmv6hfivtools-2.0.4a1.tgz
NetBSD 9.0earmv7hfivtools-2.0.4a1.tgz
NetBSD 9.0x86_64ivtools-2.0.4a1.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options


Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.

Problem reports, updates or suggestions for this package should be reported with send-pr.