pkg_add: package `libsamplerate-0.1.9' was already installed as dependency, now marked as installed manually
pkg_add: package `libsndfile-1.0.28nb2' was already installed as dependency, now marked as installed manually
pkg_add: package `fftw-3.3.8nb1' was already installed as dependency, now marked as installed manually
===========================================================================
$NetBSD: MESSAGE,v 1.1 2008/07/31 03:58:05 bjs Exp $

NOTE:  Unfortunately, JACK wants to use a linux /proc filesystem to
perform shared memory housekeeping tasks.  Therefore, if your platform
supports a "Linux-compliant" proc filesystem, we recommend mounting one
prior to using jack.  On NetBSD, this can be accomplished with the
following command:

		mount_procfs -orw,linux /proc <mount point>

Conventionally, the mount point is /proc.  If you wish to use a different
pathname for this filesystem, you may define the JACKD_PROCFS_PATH
variable in your build environment or mk.conf as shown below.

		JACKD_PROCFS_PATH= /emul/linux/proc

ATTENTION:  NetBSD-current users who wish to run jackd with real-time
	    scheduling will likely find that the loader fails to mmap
	    the driver module(s) when using -R.  Until this issue is re-
	    solved, one may work around this problem by using the -m
	    (--no-mlock) option.

===========================================================================
===========================================================================
$NetBSD: MESSAGE,v 1.5 2014/08/10 10:47:42 wiz Exp $

Execute this command to extract and rehash all CA root certificates
distributed by the Mozilla Project, so that they can be used by third
party applications using OpenSSL. It also creates a single file
certificate bundle in PEM format which can be used by applications using
GnuTLS.

	# mozilla-rootcerts install

To mark these certificates as trusted for users of gnupg2, do
the following (assuming default PKG_SYSCONFBASE and a Bourne shell):

	# mkdir -p /usr/pkg/etc/gnupg
	# cd /usr/pkg/etc/gnupg
	# for c in /etc/openssl/certs/*.pem; do
	> openssl x509 -in $c -noout -fingerprint|sed 's|^.*=\(.*\)|\1 S|'
	> done > trustlist.txt
===========================================================================