[154191] trunk/dports/net/ssldump
khindenburg at macports.org
khindenburg at macports.org
Sun Oct 23 21:26:27 CEST 2016
Revision: 154191
https://trac.macports.org/changeset/154191
Author: khindenburg at macports.org
Date: 2016-10-23 21:26:27 +0200 (Sun, 23 Oct 2016)
Log Message:
-----------
ssldump: add Debian's patches to fix a large number of issues
- #49330 had some patches; using Debian's should make it easier to update
Modified Paths:
--------------
trunk/dports/net/ssldump/Portfile
Added Paths:
-----------
trunk/dports/net/ssldump/files/patch-add-AES-ciper-suites.diff
trunk/dports/net/ssldump/files/patch-add-missing-include.diff
trunk/dports/net/ssldump/files/patch-fix-MD5_CTX_undeclared.diff
trunk/dports/net/ssldump/files/patch-fix-table-stop.diff
trunk/dports/net/ssldump/files/patch-manpage.diff
trunk/dports/net/ssldump/files/patch-reinstate--y-nroff-flag.diff
trunk/dports/net/ssldump/files/patch-support-TUN-interfaces.diff
trunk/dports/net/ssldump/files/patch-update-for-glibc2.20.diff
Removed Paths:
-------------
trunk/dports/net/ssldump/files/patch-ssl_ssldecode_c
Modified: trunk/dports/net/ssldump/Portfile
===================================================================
--- trunk/dports/net/ssldump/Portfile 2016-10-23 19:18:35 UTC (rev 154190)
+++ trunk/dports/net/ssldump/Portfile 2016-10-23 19:26:27 UTC (rev 154191)
@@ -5,7 +5,7 @@
name ssldump
version 0.9b3
-revision 3
+revision 4
categories net
license BSD-old
maintainers nomaintainer
@@ -30,7 +30,17 @@
depends_lib port:libpcap \
path:lib/libssl.dylib:openssl
-patchfiles patch-ssl_ssldecode_c
+# Include Debian's patches since the last release was 2004
+patchfiles \
+ patch-add-AES-ciper-suites.diff \
+ patch-add-missing-include.diff \
+ patch-fix-MD5_CTX_undeclared.diff \
+ patch-fix-table-stop.diff \
+ patch-manpage.diff \
+ patch-base-pcap-snoop.c \
+ patch-reinstate--y-nroff-flag.diff \
+ patch-support-TUN-interfaces.diff \
+ patch-update-for-glibc2.20.diff
pre-configure {
xinstall -m 644 -W ${prefix}/share/libtool/build-aux config.guess config.sub ${worksrcpath}
@@ -40,14 +50,6 @@
--with-pcap=${prefix} \
--with-openssl=${prefix}
-platform darwin {
- # There seems to be a conflict between pcap.h (calling pcap-bpf.h) and
- # net/bpf.h.
- # This conflict apparently doesn't affect OpenBSD (judging from their port
- # of ssldump), so let's only fix it on darwin.
- patchfiles-append patch-base-pcap-snoop.c
-}
-
pre-destroot {
# Trash INSTALL because the FS might be case unsensitive.
file delete -force ${worksrcpath}/INSTALL
Added: trunk/dports/net/ssldump/files/patch-add-AES-ciper-suites.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-add-AES-ciper-suites.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-add-AES-ciper-suites.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,172 @@
+Description: AES patch
+ patch for ssldump >= 0.9b3: adds support for AES cipher-suites (to ssldump).
+ For further information, please have a look to Novell bug ID #50952.
+Author: Carsten Hoeger <choeger at suse.de>
+Bug-Debian: http://bugs.debian.org/383619
+--- ssl/ciphersuites.c
++++ ssl/ciphersuites.c
+@@ -78,10 +78,22 @@ static SSL_CipherSuite CipherSuites[]={
+ {25,KEX_DH,SIG_NONE,ENC_DES,8,64,40,DIG_MD5,16,1},
+ {26,KEX_DH,SIG_NONE,ENC_DES,8,64,64,DIG_MD5,16,0},
+ {27,KEX_DH,SIG_NONE,ENC_3DES,8,192,192,DIG_MD5,16,0},
++ {47,KEX_RSA,SIG_RSA,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {48,KEX_DH,SIG_DSS,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {49,KEX_DH,SIG_RSA,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {50,KEX_DH,SIG_DSS,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {51,KEX_DH,SIG_RSA,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {52,KEX_DH,SIG_NONE,ENC_AES128,16,128,128,DIG_SHA,20,0},
++ {53,KEX_RSA,SIG_RSA,ENC_AES256,16,256,256,DIG_SHA,20,0},
++ {54,KEX_DH,SIG_DSS,ENC_AES256,16,256,256,DIG_SHA,20,0},
++ {55,KEX_DH,SIG_RSA,ENC_AES256,16,256,256,DIG_SHA,20,0},
++ {56,KEX_DH,SIG_DSS,ENC_AES256,16,256,256,DIG_SHA,20,0},
++ {57,KEX_DH,SIG_RSA,ENC_AES256,16,256,256,DIG_SHA,20,0},
++ {58,KEX_DH,SIG_NONE,ENC_AES256,16,256,256,DIG_SHA,20,0},
+ {96,KEX_RSA,SIG_RSA,ENC_RC4,1,128,56,DIG_MD5,16,1},
+ {97,KEX_RSA,SIG_RSA,ENC_RC2,1,128,56,DIG_MD5,16,1},
+ {98,KEX_RSA,SIG_RSA,ENC_DES,8,64,64,DIG_SHA,20,1},
+- {99,KEX_DH,SIG_DSS,ENC_DES,8,64,64,DIG_SHA,16,1},
++ {99,KEX_DH,SIG_DSS,ENC_DES,8,64,64,DIG_SHA,20,1},
+ {100,KEX_RSA,SIG_RSA,ENC_RC4,1,128,56,DIG_SHA,20,1},
+ {101,KEX_DH,SIG_DSS,ENC_RC4,1,128,56,DIG_SHA,20,1},
+ {102,KEX_DH,SIG_DSS,ENC_RC4,1,128,128,DIG_SHA,20,0},
+--- ssl/ssl.enums
++++ ssl/ssl.enums
+@@ -356,6 +356,18 @@ ClientKeyExchange(16)
+ CipherSuite TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA = { 0x00,0x19 };
+ CipherSuite TLS_DH_anon_WITH_DES_CBC_SHA = { 0x00,0x1A };
+ CipherSuite TLS_DH_anon_WITH_3DES_EDE_CBC_SHA = { 0x00,0x1B };
++ CipherSuite TLS_RSA_WITH_AES_128_CBC_SHA = { 0x00,0x2F };
++ CipherSuite TLS_DH_DSS_WITH_AES_128_CBC_SHA = { 0x00,0x30 };
++ CipherSuite TLS_DH_RSA_WITH_AES_128_CBC_SHA = { 0x00,0x31 };
++ CipherSuite TLS_DHE_DSS_WITH_AES_128_CBC_SHA = { 0x00,0x32 };
++ CipherSuite TLS_DHE_RSA_WITH_AES_128_CBC_SHA = { 0x00,0x33 };
++ CipherSuite TLS_DH_anon_WITH_AES_128_CBC_SHA = { 0x00,0x34 };
++ CipherSuite TLS_RSA_WITH_AES_256_CBC_SHA = { 0x00,0x35 };
++ CipherSuite TLS_DH_DSS_WITH_AES_256_CBC_SHA = { 0x00,0x36 };
++ CipherSuite TLS_DH_RSA_WITH_AES_256_CBC_SHA = { 0x00,0x37 };
++ CipherSuite TLS_DHE_DSS_WITH_AES_256_CBC_SHA = { 0x00,0x38 };
++ CipherSuite TLS_DHE_RSA_WITH_AES_256_CBC_SHA = { 0x00,0x39 };
++ CipherSuite TLS_DH_anon_WITH_AES_256_CBC_SHA = { 0x00,0x3A };
+ CipherSuite TLS_RSA_EXPORT1024_WITH_RC4_56_MD5 = { 0x00,0x60 };
+ CipherSuite TLS_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 = { 0x00,0x61 };
+ CipherSuite TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA = { 0x00,0x62 };
+--- ssl/ssl.enums.c
++++ ssl/ssl.enums.c
+@@ -163,6 +163,7 @@ static int decode_HandshakeType_HelloReq
+
+
+ printf("\n");
++ return(0);
+
+ }
+ static int decode_HandshakeType_ClientHello(ssl,dir,seg,data)
+@@ -368,6 +369,7 @@ static int decode_HandshakeType_ServerHe
+
+
+ printf("\n");
++ return(0);
+
+ }
+ static int decode_HandshakeType_CertificateVerify(ssl,dir,seg,data)
+@@ -611,6 +613,54 @@ decoder cipher_suite_decoder[]={
+ "TLS_DH_anon_WITH_3DES_EDE_CBC_SHA",
+ 0 },
+ {
++ 47,
++ "TLS_RSA_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 48,
++ "TLS_DH_DSS_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 49,
++ "TLS_DH_RSA_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 50,
++ "TLS_DHE_DSS_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 51,
++ "TLS_DHE_RSA_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 52,
++ "TLS_DH_anon_WITH_AES_128_CBC_SHA",
++ 0 },
++ {
++ 53,
++ "TLS_RSA_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
++ 54,
++ "TLS_DH_DSS_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
++ 55,
++ "TLS_DH_RSA_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
++ 56,
++ "TLS_DHE_DSS_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
++ 57,
++ "TLS_DHE_RSA_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
++ 58,
++ "TLS_DH_anon_WITH_AES_256_CBC_SHA",
++ 0 },
++ {
+ 96,
+ "TLS_RSA_EXPORT1024_WITH_RC4_56_MD5",
+ 0 },
+--- ssl/ssl_rec.c
++++ ssl/ssl_rec.c
+@@ -78,7 +78,9 @@ static char *ciphers[]={
+ "DES3",
+ "RC4",
+ "RC2",
+- "IDEA"
++ "IDEA",
++ "AES128",
++ "AES256"
+ };
+
+
+@@ -101,6 +103,11 @@ int ssl_create_rec_decoder(dp,cs,mk,sk,i
+ /* Find the SSLeay cipher */
+ if(cs->enc!=ENC_NULL){
+ ciph=(EVP_CIPHER *)EVP_get_cipherbyname(ciphers[cs->enc-0x30]);
++ if(!ciph)
++ ABORT(R_INTERNAL);
++ }
++ else {
++ ciph=EVP_enc_null();
+ }
+
+ if(!(dec=(ssl_rec_decoder *)calloc(sizeof(ssl_rec_decoder),1)))
+@@ -169,7 +176,7 @@ int ssl_decode_rec_data(ssl,d,ct,version
+ *outl=inl;
+
+ /* Now strip off the padding*/
+- if(d->cs->block!=1){
++ if(d->cs->block>1){
+ pad=out[inl-1];
+ *outl-=(pad+1);
+ }
+--- ssl/sslciphers.h
++++ ssl/sslciphers.h
+@@ -71,7 +71,9 @@ typedef struct SSL_CipherSuite_ {
+ #define ENC_RC4 0x32
+ #define ENC_RC2 0x33
+ #define ENC_IDEA 0x34
+-#define ENC_NULL 0x35
++#define ENC_AES128 0x35
++#define ENC_AES256 0x36
++#define ENC_NULL 0x37
+
+ #define DIG_MD5 0x40
+ #define DIG_SHA 0x41
Added: trunk/dports/net/ssldump/files/patch-add-missing-include.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-add-missing-include.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-add-missing-include.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,38 @@
+Description: Add missing "include"
+ Add #include <string.h> to fix the warnings: "implicit
+ declaration of function 'memcpy'" and "implicit declaration of function
+ 'memset'"
+Author: Sophie Brun <sophie at freexian.com>
+Last-Update: 2016-03-11
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- common/lib/r_assoc.c
++++ common/lib/r_assoc.c
+@@ -56,6 +56,7 @@
+
+ static char *RCSSTRING="$Id: r_assoc.c,v 1.4 2001/12/24 06:06:26 ekr Exp $";
+
++#include <string.h>
+ #include <r_common.h>
+ #include "r_assoc.h"
+
+--- common/lib/r_bitfield.c
++++ common/lib/r_bitfield.c
+@@ -10,6 +10,7 @@
+
+ static char *RCSSTRING="$Id: r_bitfield.c,v 1.3 2001/12/24 06:06:26 ekr Exp $";
+
++#include <string.h>
+ #include <r_common.h>
+ #include "r_bitfield.h"
+
+--- common/lib/r_data.c
++++ common/lib/r_data.c
+@@ -46,6 +46,7 @@
+
+ static char *RCSSTRING="$Id: r_data.c,v 1.3 2001/07/20 23:33:15 ekr Exp $";
+
++#include <string.h>
+ #include <r_common.h>
+ #include <r_data.h>
+
Added: trunk/dports/net/ssldump/files/patch-fix-MD5_CTX_undeclared.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-fix-MD5_CTX_undeclared.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-fix-MD5_CTX_undeclared.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,23 @@
+Description: fix MD5_CTX undeclared
+Author: Luk Claes <luk at debian.org>
+Bug-Debian: http://bugs.debian.org/337453
+--- ssl/ssldecode.c
++++ ssl/ssldecode.c
+@@ -51,6 +51,7 @@
+ #include <openssl/ssl.h>
+ #include <openssl/hmac.h>
+ #include <openssl/evp.h>
++#include <openssl/md5.h>
+ #include <openssl/x509v3.h>
+ #endif
+ #include "ssldecode.h"
+@@ -131,7 +132,8 @@ int ssl_decode_ctx_create(dp,keyfile,pas
+ ssl_decode_ctx *d=0;
+ int r,_status;
+
+- SSLeay_add_all_algorithms();
++ SSL_library_init();
++ OpenSSL_add_all_algorithms();
+ if(!(d=(ssl_decode_ctx *)malloc(sizeof(ssl_decode_ctx))))
+ ABORT(R_NO_MEMORY);
+ if(!(d->ssl_ctx=SSL_CTX_new(SSLv23_server_method())))
Added: trunk/dports/net/ssldump/files/patch-fix-table-stop.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-fix-table-stop.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-fix-table-stop.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,75 @@
+Description: Fix table stops
+ ssldump segfaults when decoding some unknown enumerated values
+ because decoder tables end with 0 instead of -1 expected by
+ table search routines
+Author: Zdenek Salvet <salvet at ics.muni.cz>
+Bug-Debian: http://bugs.debian.org/627884
+Last-Update: 2016-03-11
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- ssl/ssl.enums.c
++++ ssl/ssl.enums.c
+@@ -151,7 +151,7 @@ decoder ContentType_decoder[]={
+ "application_data",
+ decode_ContentType_application_data
+ },
+-{0}
++{-1}
+ };
+
+ static int decode_HandshakeType_HelloRequest(ssl,dir,seg,data)
+@@ -498,7 +498,7 @@ decoder HandshakeType_decoder[]={
+ "Finished",
+ decode_HandshakeType_Finished
+ },
+-{0}
++{-1}
+ };
+
+ decoder cipher_suite_decoder[]={
+@@ -728,7 +728,7 @@ decoder AlertLevel_decoder[]={
+ "fatal",
+ decode_AlertLevel_fatal
+ },
+-{0}
++{-1}
+ };
+
+ static int decode_AlertDescription_close_notify(ssl,dir,seg,data)
+@@ -1031,7 +1031,7 @@ decoder AlertDescription_decoder[]={
+ "no_renegotiation",
+ decode_AlertDescription_no_renegotiation
+ },
+-{0}
++{-1}
+ };
+
+ decoder compression_method_decoder[]={
+@@ -1095,6 +1095,6 @@ decoder client_certificate_type_decoder[
+ "dss_fixed_dh",
+ decode_client_certificate_type_dss_fixed_dh
+ },
+-{0}
++{-1}
+ };
+
+--- ssl/ssl_enum.c
++++ ssl/ssl_enum.c
+@@ -70,7 +70,7 @@ decoder ContentType_decoder[]={
+ "application_data",
+ decode_ContentType_application_data
+ },
+-{0}
++{-1}
+ };
+
+ static int decode_HandshakeType_hello_request(ssl,dir,seg,data)
+@@ -260,7 +260,7 @@ decoder HandshakeType_decoder[]={
+ "finished",
+ decode_HandshakeType_finished
+ },
+-{0}
++{-1}
+ };
+
+ decoder cipher_suite_decoder[]={
Added: trunk/dports/net/ssldump/files/patch-manpage.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-manpage.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-manpage.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,160 @@
+Description: Revise ssldump.1 for correctness and completeness
+Author: Simon Law <sfllaw at engmail.uwaterloo.ca>
+--- ssldump.1
++++ ssldump.1
+@@ -61,12 +61,9 @@ ssldump \- dump SSL traffic on a network
+ .na
+ .B ssldump
+ [
+-.B \-vtaTnsAxXhHVNdq
++.B \-vTshVq
++.B \-aAdeHnNqTxXvy
+ ] [
+-.B \-r
+-.I dumpfile
+-]
+-[
+ .B \-i
+ .I interface
+ ]
+@@ -81,6 +78,16 @@ ssldump \- dump SSL traffic on a network
+ .I password
+ ]
+ [
++.B \-r
++.I dumpfile
++]
++.br
++.ti +8
++[
++.B \-S
++.RI [\| crypto \||\| d \||\| ht \||\| H \||\| nroff \|]
++]
++[
+ .I expression
+ ]
+ .br
+@@ -125,6 +132,7 @@ any user may run
+ You must have read access to
+ .IR /dev/bpf* .
+ .SH OPTIONS
++.TP
+ .B \-a
+ Print bare TCP ACKs (useful for observing Nagle behavior)
+ .TP
+@@ -135,7 +143,7 @@ the most interesting fields)
+ .B \-d
+ Display the application data traffic. This usually means
+ decrypting it, but when -d is used ssldump will also decode
+-application data traffic _before_ the SSL session initiates.
++application data traffic \fIbefore\fP the SSL session initiates.
+ This allows you to see HTTPS CONNECT behavior as well as
+ SMTP STARTTLS. As a side effect, since ssldump can't tell
+ whether plaintext is traffic before the initiation of an
+@@ -148,18 +156,9 @@ dumps. See also -X.
+ .B \-e
+ Print absolute timestamps instead of relative timestamps
+ .TP
+-.B \-r
+-Read data from \fIfile\fP instead of from the network.
+-The old -f option still works but is deprecated and will
+-probably be removed with the next version.
+ .B \-H
+ Print the full SSL packet header.
+ .TP
+-.B \-k
+-Use \fIkeyfile\fP as the location of the SSL keyfile (OpenSSL format)
+-Previous versions of ssldump automatically looked in ./server.pem.
+-Now you must specify your keyfile every time.
+-.TP
+ .B \-n
+ Don't try to resolve host names from IP addresses
+ .TP
+@@ -176,6 +175,12 @@ Don't put the interface into promiscuous
+ .B \-q
+ Don't decode any record fields beyond a single summary line. (quiet mode).
+ .TP
++.B \-T
++Print the TCP headers.
++.TP
++.B \-v
++Display version and copyright information.
++.TP
+ .B \-x
+ Print each record in hex, as well as decoding it.
+ .TP
+@@ -183,13 +188,48 @@ Print each record in hex, as well as dec
+ When the -d option is used, binary data is automatically printed
+ in two columns with a hex dump on the left and the printable characters
+ on the right. -X suppresses the display of the printable characters,
+-thus making it easier to cut and paste the hext data into some other
++thus making it easier to cut and paste the hex data into some other
+ program.
++.TP
+ .B \-y
+-Decorate the output for processing with troff. Not very
++Decorate the output for processing with nroff/troff. Not very
+ useful for the average user.
+ .TP
+-.IP "\fI expression\fP"
++.BI \-i " interface"
++Use \fIinterface\fP as the network interface on which to sniff SSL/TLS
++traffic.
++.TP
++.BI \-k " keyfile"
++Use \fIkeyfile\fP as the location of the SSL keyfile (OpenSSL format)
++Previous versions of ssldump automatically looked in ./server.pem.
++Now you must specify your keyfile every time.
++.TP
++.BI \-p " password"
++Use \fIpassword\fP as the SSL keyfile password.
++.TP
++.BI \-r " file"
++Read data from \fIfile\fP instead of from the network.
++The old -f option still works but is deprecated and will
++probably be removed with the next version.
++.TP
++.BI \-S " [ " crypto " | " d " | " ht " | " H " ]"
++Specify SSL flags to ssldump. These flags include:
++.RS
++.TP
++.I crypto
++Print cryptographic information.
++.TP
++.I d
++Print fields as decoded.
++.TP
++.I ht
++Print the handshake type.
++.TP
++.I H
++Print handshake type and highlights.
++.RE
++.TP
++\fIexpression\fP
+ .RS
+ Selects what packets ssldump will examine. Technically speaking,
+ ssldump supports the full expression syntax from PCAP and tcpdump.
+@@ -200,7 +240,7 @@ that ssldump will simply ignore. Only th
+ don't result in incomplete TCP streams are listed here.
+ .LP
+ The \fIexpression\fP consists of one or more
+-.I primitives.
++.IR primitives .
+ Primitives usually consist of an
+ .I id
+ (name or number) preceded by one or more qualifiers. There are three
+@@ -512,5 +552,11 @@ direct experience with ssldump on other
+ .LP
+ ssldump doesn't implement session caching and therefore can't decrypt
+ resumed sessions.
+-
+-
++.LP
++.SH SEE ALSO
++.LP
++.BR tcpdump (1)
++.LP
++.SH AUTHOR
++.LP
++ssldump was written by Eric Rescorla <ekr at rtfm.com>.
Added: trunk/dports/net/ssldump/files/patch-reinstate--y-nroff-flag.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-reinstate--y-nroff-flag.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-reinstate--y-nroff-flag.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,24 @@
+Description: Reinstate the -y (nroff) flag
+Author: Simon Law <sfllaw at engmail.uwaterloo.ca>
+--- base/pcap-snoop.c
++++ base/pcap-snoop.c
+@@ -206,7 +205,7 @@ int main(argc,argv)
+
+ signal(SIGINT,sig_handler);
+
+- while((c=getopt(argc,argv,"vr:f:S:Ttai:k:p:nsAxXhHVNdqem:P"))!=EOF){
++ while((c=getopt(argc,argv,"vr:f:S:yTtai:k:p:nsAxXhHVNdqem:P"))!=EOF){
+ switch(c){
+ case 'v':
+ print_version();
+--- ssl/ssl_analyze.c
++++ ssl/ssl_analyze.c
+@@ -133,7 +133,7 @@ flag_struct flags[]={
+ SSL_PRINT_DECODE
+ },
+ {
+- 0,
++ 'y',
+ "nroff",
+ SSL_PRINT_NROFF
+ },
Deleted: trunk/dports/net/ssldump/files/patch-ssl_ssldecode_c
===================================================================
--- trunk/dports/net/ssldump/files/patch-ssl_ssldecode_c 2016-10-23 19:18:35 UTC (rev 154190)
+++ trunk/dports/net/ssldump/files/patch-ssl_ssldecode_c 2016-10-23 19:26:27 UTC (rev 154191)
@@ -1,21 +0,0 @@
-$OpenBSD: patch-ssl_ssldecode_c,v 1.1 2002/06/16 19:43:39 pvalchev Exp $
---- ssl/ssldecode.c.orig Sun Jun 16 13:41:46 2002
-+++ ssl/ssldecode.c Sun Jun 16 13:42:10 2002
-@@ -51,6 +51,7 @@
- #include <openssl/ssl.h>
- #include <openssl/hmac.h>
- #include <openssl/evp.h>
-+#include <openssl/md5.h>
- #include <openssl/x509v3.h>
- #endif
- #include "ssldecode.h"
-@@ -132,7 +132,8 @@
- ssl_decode_ctx *d=0;
- int r,_status;
-
-- SSLeay_add_all_algorithms();
-+ SSL_library_init();
-+ OpenSSL_add_all_algorithms();
- if(!(d=(ssl_decode_ctx *)malloc(sizeof(ssl_decode_ctx))))
- ABORT(R_NO_MEMORY);
- if(!(d->ssl_ctx=SSL_CTX_new(SSLv23_server_method())))
Added: trunk/dports/net/ssldump/files/patch-support-TUN-interfaces.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-support-TUN-interfaces.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-support-TUN-interfaces.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,19 @@
+Description: Add support for TUN interfaces
+Author: Roland Pallai <pallair at magex.hu>
+Bug-Debian: http://bugs.debian.org/610334
+Last-Update: 2016-03-11
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- base/pcap-snoop.c
++++ base/pcap-snoop.c
+@@ -157,6 +157,10 @@ void pcap_cb(ptr,hdr,data)
+ return;
+
+ break;
++ case DLT_LINUX_SLL:
++ data+=16;
++ len-=16;
++ break;
+ }
+ network_process_packet(n,&hdr->ts,data,len);
+ }
Added: trunk/dports/net/ssldump/files/patch-update-for-glibc2.20.diff
===================================================================
--- trunk/dports/net/ssldump/files/patch-update-for-glibc2.20.diff (rev 0)
+++ trunk/dports/net/ssldump/files/patch-update-for-glibc2.20.diff 2016-10-23 19:26:27 UTC (rev 154191)
@@ -0,0 +1,29 @@
+Description: Fix warning about deprecated macro _BSD_SOURCE
+ use _DEFAULT_SOURCE: _BSD_SOURCE and _SVID_SOURCE are deprecated since
+ glibc 2.20
+Author: Sophie Brun <sophie at freexian.com>
+Last-Update: 2016-03-11
+---
+This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
+--- configure
++++ configure
+@@ -1040,7 +1040,7 @@ fi
+
+ case "$target_os" in
+ linux*)
+- DEFINES="$DEFINES -D_BSD_SOURCE=1 -DLINUX"
++ DEFINES="$DEFINES -D_DEFAULT_SOURCE=1 -DLINUX"
+ ;;
+ solaris*)
+ LIBS="$LIBS -lsocket -lnsl"
+--- configure.in
++++ configure.in
+@@ -50,7 +50,7 @@ AC_CHECK_LIB(m, pow)
+ dnl System-specific stuff
+ case "$target_os" in
+ linux*)
+- DEFINES="$DEFINES -D_BSD_SOURCE=1 -DLINUX"
++ DEFINES="$DEFINES -D_DEFAULT_SOURCE=1 -DLINUX"
+ ;;
+ solaris*)
+ LIBS="$LIBS -lsocket -lnsl"
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.macports.org/pipermail/macports-changes/attachments/20161023/7722cd8f/attachment-0002.html>
More information about the macports-changes
mailing list