On 03/18/16 12:33, David CARLIER wrote:
sorry for the inconveniency, is this diff working better ? (in fact the patch for osscan2 is now useless) Thanks.
you should regen plist as well, there are new nse scripts. diff attached, will commit this week-end. Cheers Giovanni
Index: Makefile =================================================================== RCS file: /var/cvs/ports/net/nmap/Makefile,v retrieving revision 1.117 diff -u -p -r1.117 Makefile --- Makefile 7 Jan 2016 13:23:47 -0000 1.117 +++ Makefile 18 Mar 2016 11:38:50 -0000 @@ -5,7 +5,7 @@ SHARED_ONLY= Yes COMMENT-main= scan ports and fingerprint stack of network hosts COMMENT-zenmap= graphical frontend for nmap -MODPY_EGG_VERSION= 7.01 +MODPY_EGG_VERSION= 7.10 DISTNAME= nmap-${MODPY_EGG_VERSION} PKGNAME-main= ${DISTNAME} PKGNAME-zenmap= nmap-zenmap-${MODPY_EGG_VERSION} Index: distinfo =================================================================== RCS file: /var/cvs/ports/net/nmap/distinfo,v retrieving revision 1.31 diff -u -p -r1.31 distinfo --- distinfo 7 Jan 2016 13:23:47 -0000 1.31 +++ distinfo 18 Mar 2016 11:38:50 -0000 @@ -1,2 +1,2 @@ -SHA256 (nmap-7.01.tgz) = jK86y+k8D6CmhcPm+zpfgM5Jk2vX1AJpoJs+rW/YXtU= -SIZE (nmap-7.01.tgz) = 11029121 +SHA256 (nmap-7.10.tgz) = aOxAGi2neGSsClmNtqgq0mpxVt8fXVdtr756odcgeD0= +SIZE (nmap-7.10.tgz) = 11086463 Index: patches/patch-libnetutil_netutil_cc =================================================================== RCS file: /var/cvs/ports/net/nmap/patches/patch-libnetutil_netutil_cc,v retrieving revision 1.7 diff -u -p -r1.7 patch-libnetutil_netutil_cc --- patches/patch-libnetutil_netutil_cc 7 Jan 2016 13:23:47 -0000 1.7 +++ patches/patch-libnetutil_netutil_cc 18 Mar 2016 11:38:50 -0000 @@ -8,18 +8,9 @@ http://marc.info/?l=nmap-dev&m=140179174 chunks dealing with iovec: ??? ---- libnetutil/netutil.cc.orig Wed Oct 28 04:21:15 2015 -+++ libnetutil/netutil.cc Tue Dec 29 10:47:48 2015 -@@ -915,7 +915,7 @@ void set_ttl(int sd, int ttl) { - /* Other than WIN32, what these systems have in common is that they use BPF for - packet capture. (Solaris 10 and earlier used DLPI and had valid selectable - fds.) */ --#if defined(WIN32) || defined(MACOSX) || (defined(FREEBSD) && (__FreeBSD_version < 500000) || defined(SOLARIS_BPF_PCAP_CAPTURE)) -+#if defined(WIN32) || defined(MACOSX) || defined(OPENBSD) || (defined(FREEBSD) && (__FreeBSD_version < 500000) || defined(SOLARIS_BPF_PCAP_CAPTURE)) - /* Returns whether the system supports pcap_get_selectable_fd() properly */ - int pcap_selectable_fd_valid() { - return 0; -@@ -3139,7 +3139,6 @@ static int route_dst_netlink(const struct sockaddr_sto +--- libnetutil/netutil.cc.orig Thu Mar 17 20:17:27 2016 ++++ libnetutil/netutil.cc Thu Mar 17 20:19:47 2016 +@@ -3142,7 +3142,6 @@ static int route_dst_netlink(const struct sockaddr_sto const struct sockaddr_storage *spoofss) { struct sockaddr_nl snl; struct msghdr msg; @@ -27,7 +18,7 @@ chunks dealing with iovec: ??? struct nlmsghdr *nlmsg; struct rtmsg *rtmsg; struct rtattr *rtattr; -@@ -3191,22 +3190,14 @@ static int route_dst_netlink(const struct sockaddr_sto +@@ -3194,22 +3193,14 @@ static int route_dst_netlink(const struct sockaddr_sto add_rtattr_addr(nlmsg, &rtattr, &len, RTA_SRC, spoofss, intf_index); } @@ -50,7 +41,7 @@ chunks dealing with iovec: ??? len = recvmsg(fd, &msg, 0); if (len <= 0) netutil_fatal("%s: cannot recvmsg: %s", __func__, strerror(errno)); -@@ -3837,7 +3828,6 @@ static const unsigned char *add_exthdr_ancillary(struc +@@ -3840,7 +3831,6 @@ static const unsigned char *add_exthdr_ancillary(struc static int send_ipv6_ip(const struct sockaddr_in6 *dst, const unsigned char *packet, size_t packetlen) { struct msghdr msg; @@ -58,7 +49,7 @@ chunks dealing with iovec: ??? const unsigned char *end; struct ip6_hdr *hdr; -@@ -3853,8 +3843,6 @@ static int send_ipv6_ip(const struct sockaddr_in6 *dst +@@ -3859,8 +3849,6 @@ static int send_ipv6_ip(const struct sockaddr_in6 *dst /* Set up sendmsg data structure. iov is filled in below. */ msg.msg_name = (void *) dst; msg.msg_namelen = sizeof(*dst); @@ -67,7 +58,7 @@ chunks dealing with iovec: ??? msg.msg_control = NULL; msg.msg_controllen = 0; msg.msg_flags = 0; -@@ -3913,8 +3901,6 @@ static int send_ipv6_ip(const struct sockaddr_in6 *dst +@@ -3919,8 +3907,6 @@ static int send_ipv6_ip(const struct sockaddr_in6 *dst } assert(packet <= end); @@ -76,7 +67,7 @@ chunks dealing with iovec: ??? n = sendmsg(sd, &msg, 0); if (n == -1) -@@ -4117,9 +4103,6 @@ int datalink_offset(int datalink) +@@ -4123,9 +4109,6 @@ int datalink_offset(int datalink) { if (datalink == DLT_EN10MB) return ETH_HDR_LEN; @@ -86,16 +77,7 @@ chunks dealing with iovec: ??? else return -1; } -@@ -4156,7 +4139,7 @@ static int read_reply_pcap(pcap_t *pd, long to_usec, - netutil_fatal("Cannot obtain datalink information: %s", pcap_geterr(pd)); - ioffset = datalink_offset(*datalink); - if (ioffset < 0) -- netutil_fatal("datalink_offset failed for type %d (DLT_EN10MB = %d, DLT_LINUX_SLL = %d)", *datalink, DLT_EN10MB, DLT_LINUX_SLL); -+ netutil_fatal("datalink_offset failed for type %d (DLT_EN10MB = %d)", *datalink, DLT_EN10MB); - *offset = (unsigned int) ioffset; - - if (to_usec > 0) { -@@ -4256,10 +4239,6 @@ static bool accept_arp(const unsigned char *p, const s +@@ -4262,10 +4245,6 @@ static bool accept_arp(const unsigned char *p, const s if (datalink == DLT_EN10MB) { return ntohs(*((u16 *) (p + 12))) == ETH_TYPE_ARP; Index: patches/patch-osscan2_cc =================================================================== RCS file: patches/patch-osscan2_cc diff -N patches/patch-osscan2_cc --- patches/patch-osscan2_cc 7 Jan 2016 13:23:47 -0000 1.3 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,17 +0,0 @@ -$OpenBSD: patch-osscan2_cc,v 1.3 2016/01/07 13:23:47 giovanni Exp $ - -Format changes for 64-bit time_t, should go upstream - ---- osscan2.cc.orig Tue Nov 10 05:26:26 2015 -+++ osscan2.cc Tue Dec 29 10:47:48 2015 -@@ -2582,8 +2582,8 @@ void HostOsScan::makeTSeqFP(HostOsScanStats *hss) { - if (lastboot != 0.0 && (hss->seq_send_times[0].tv_sec - lastboot > 63072000)) { - /* Up 2 years? Perhaps, but they're probably lying. */ - if (o.debugging) { -- log_write(LOG_STDOUT, "Ignoring claimed %s uptime of %lu days\n", -- hss->target->targetipstr(), (hss->seq_send_times[0].tv_sec - hss->si.lastboot) / 86400); -+ log_write(LOG_STDOUT, "Ignoring claimed %s uptime of %lld days\n", -+ hss->target->targetipstr(), (long long) ((hss->seq_send_times[0].tv_sec - hss->si.lastboot) / 86400)); - } - lastboot = 0; - } Index: patches/patch-timing_cc =================================================================== RCS file: /var/cvs/ports/net/nmap/patches/patch-timing_cc,v retrieving revision 1.5 diff -u -p -r1.5 patch-timing_cc --- patches/patch-timing_cc 7 Jan 2016 13:23:47 -0000 1.5 +++ patches/patch-timing_cc 18 Mar 2016 11:38:50 -0000 @@ -1,13 +1,9 @@ -$OpenBSD: patch-timing_cc,v 1.5 2016/01/07 13:23:47 giovanni Exp $ - -Avoid float-related assertion triggered on i386, not triggered on -macppc/amd64/sparc64. - ---- timing.cc.orig Tue Jun 23 02:09:01 2015 -+++ timing.cc Tue Dec 29 10:47:48 2015 +$OpenBSD$ +--- timing.cc.orig Tue Jun 23 01:09:01 2015 ++++ timing.cc Thu Mar 17 20:44:33 2016 @@ -125,6 +125,8 @@ - /* $Id: patch-timing_cc,v 1.5 2016/01/07 13:23:47 giovanni Exp $ */ + /* $Id: timing.cc 34709 2015-06-23 00:09:01Z dmiller $ */ +#include <limits> + Index: patches/patch-zenmap_setup_py =================================================================== RCS file: /var/cvs/ports/net/nmap/patches/patch-zenmap_setup_py,v retrieving revision 1.12 diff -u -p -r1.12 patch-zenmap_setup_py --- patches/patch-zenmap_setup_py 7 Jan 2016 13:23:47 -0000 1.12 +++ patches/patch-zenmap_setup_py 18 Mar 2016 11:38:50 -0000 @@ -1,7 +1,7 @@ $OpenBSD: patch-zenmap_setup_py,v 1.12 2016/01/07 13:23:47 giovanni Exp $ ---- zenmap/setup.py.orig Wed Dec 9 16:45:33 2015 -+++ zenmap/setup.py Tue Dec 29 10:47:48 2015 -@@ -239,12 +239,11 @@ class my_install(install): +--- zenmap/setup.py.orig Tue Jan 5 14:12:42 2016 ++++ zenmap/setup.py Thu Mar 17 20:29:51 2016 +@@ -242,12 +242,11 @@ class my_install(install): install.finalize_options(self) def run(self): @@ -15,7 +15,7 @@ $OpenBSD: patch-zenmap_setup_py,v 1.12 2 self.write_installed_files() def get_installed_files(self): -@@ -404,17 +403,10 @@ for dir in dirs: +@@ -407,17 +406,10 @@ for dir in dirs: "NMAPDATADIR": os.path.join(self.saved_prefix, "share", "nmap") } @@ -36,7 +36,7 @@ $OpenBSD: patch-zenmap_setup_py,v 1.12 2 # Replace the path definitions. for path, replacement in interesting_paths.items(): -@@ -437,11 +429,6 @@ for dir in dirs: +@@ -440,11 +432,6 @@ for dir in dirs: desktop_filename = None root_desktop_filename = None Index: pkg/PLIST-main =================================================================== RCS file: /var/cvs/ports/net/nmap/pkg/PLIST-main,v retrieving revision 1.8 diff -u -p -r1.8 PLIST-main --- pkg/PLIST-main 7 Jan 2016 13:23:47 -0000 1.8 +++ pkg/PLIST-main 18 Mar 2016 11:48:00 -0000 @@ -121,6 +121,7 @@ share/nmap/nselib/ldap.lua share/nmap/nselib/lfs.luadoc share/nmap/nselib/listop.lua share/nmap/nselib/lpeg-utility.lua +share/nmap/nselib/lpeg.luadoc share/nmap/nselib/ls.lua share/nmap/nselib/match.lua share/nmap/nselib/membase.lua @@ -130,6 +131,7 @@ share/nmap/nselib/msrpc.lua share/nmap/nselib/msrpcperformance.lua share/nmap/nselib/msrpctypes.lua share/nmap/nselib/mssql.lua +share/nmap/nselib/multicast.lua share/nmap/nselib/mysql.lua share/nmap/nselib/natpmp.lua share/nmap/nselib/ncp.lua @@ -331,6 +333,7 @@ share/nmap/scripts/hostmap-robtex.nse share/nmap/scripts/http-adobe-coldfusion-apsa1301.nse share/nmap/scripts/http-affiliate-id.nse share/nmap/scripts/http-apache-negotiation.nse +share/nmap/scripts/http-apache-server-status.nse share/nmap/scripts/http-auth-finder.nse share/nmap/scripts/http-auth.nse share/nmap/scripts/http-avaya-ipoffice-users.nse @@ -428,11 +431,13 @@ share/nmap/scripts/http-vuln-cve2011-319 share/nmap/scripts/http-vuln-cve2011-3368.nse share/nmap/scripts/http-vuln-cve2012-1823.nse share/nmap/scripts/http-vuln-cve2013-0156.nse +share/nmap/scripts/http-vuln-cve2013-6786.nse share/nmap/scripts/http-vuln-cve2013-7091.nse share/nmap/scripts/http-vuln-cve2014-2126.nse share/nmap/scripts/http-vuln-cve2014-2127.nse share/nmap/scripts/http-vuln-cve2014-2128.nse share/nmap/scripts/http-vuln-cve2014-2129.nse +share/nmap/scripts/http-vuln-cve2014-3704.nse share/nmap/scripts/http-vuln-cve2014-8877.nse share/nmap/scripts/http-vuln-cve2015-1427.nse share/nmap/scripts/http-vuln-cve2015-1635.nse @@ -451,6 +456,7 @@ share/nmap/scripts/icap-info.nse share/nmap/scripts/ike-version.nse share/nmap/scripts/imap-brute.nse share/nmap/scripts/imap-capabilities.nse +share/nmap/scripts/imap-ntlm-info.nse share/nmap/scripts/informix-brute.nse share/nmap/scripts/informix-query.nse share/nmap/scripts/informix-tables.nse @@ -461,6 +467,7 @@ share/nmap/scripts/ip-geolocation-ipinfo share/nmap/scripts/ip-geolocation-maxmind.nse share/nmap/scripts/ip-https-discover.nse share/nmap/scripts/ipidseq.nse +share/nmap/scripts/ipv6-multicast-mld-list.nse share/nmap/scripts/ipv6-node-info.nse share/nmap/scripts/ipv6-ra-flood.nse share/nmap/scripts/irc-botnet-channels.nse @@ -508,6 +515,7 @@ share/nmap/scripts/ms-sql-dump-hashes.ns share/nmap/scripts/ms-sql-empty-password.nse share/nmap/scripts/ms-sql-hasdbaccess.nse share/nmap/scripts/ms-sql-info.nse +share/nmap/scripts/ms-sql-ntlm-info.nse share/nmap/scripts/ms-sql-query.nse share/nmap/scripts/ms-sql-tables.nse share/nmap/scripts/ms-sql-xp-cmdshell.nse @@ -543,6 +551,7 @@ share/nmap/scripts/nfs-ls.nse share/nmap/scripts/nfs-showmount.nse share/nmap/scripts/nfs-statfs.nse share/nmap/scripts/nje-node-brute.nse +share/nmap/scripts/nntp-ntlm-info.nse share/nmap/scripts/nping-brute.nse share/nmap/scripts/nrpe-enum.nse share/nmap/scripts/ntp-info.nse @@ -564,6 +573,7 @@ share/nmap/scripts/pgsql-brute.nse share/nmap/scripts/pjl-ready-message.nse share/nmap/scripts/pop3-brute.nse share/nmap/scripts/pop3-capabilities.nse +share/nmap/scripts/pop3-ntlm-info.nse share/nmap/scripts/pptp-version.nse share/nmap/scripts/qconn-exec.nse share/nmap/scripts/qscan.nse @@ -591,10 +601,12 @@ share/nmap/scripts/rsync-brute.nse share/nmap/scripts/rsync-list-modules.nse share/nmap/scripts/rtsp-methods.nse share/nmap/scripts/rtsp-url-brute.nse +share/nmap/scripts/rusers.nse share/nmap/scripts/s7-info.nse share/nmap/scripts/samba-vuln-cve-2012-1182.nse share/nmap/scripts/script.db share/nmap/scripts/servicetags.nse +share/nmap/scripts/shodan-api.nse share/nmap/scripts/sip-brute.nse share/nmap/scripts/sip-call-spoof.nse share/nmap/scripts/sip-enum-users.nse @@ -628,6 +640,7 @@ share/nmap/scripts/smbv2-enabled.nse share/nmap/scripts/smtp-brute.nse share/nmap/scripts/smtp-commands.nse share/nmap/scripts/smtp-enum-users.nse +share/nmap/scripts/smtp-ntlm-info.nse share/nmap/scripts/smtp-open-relay.nse share/nmap/scripts/smtp-strangeport.nse share/nmap/scripts/smtp-vuln-cve2010-4344.nse @@ -681,6 +694,7 @@ share/nmap/scripts/targets-xml.nse share/nmap/scripts/teamspeak2-version.nse share/nmap/scripts/telnet-brute.nse share/nmap/scripts/telnet-encryption.nse +share/nmap/scripts/telnet-ntlm-info.nse share/nmap/scripts/tftp-enum.nse share/nmap/scripts/tls-nextprotoneg.nse share/nmap/scripts/tor-consensus-checker.nse