[arch-commits] Commit in sslsplit/trunk (PKGBUILD)
Date: Tuesday, July 7, 2020 @ 16:04:48 Author: felixonmars Revision: 659096 upgpkg: sslsplit 0.5.2-3: reproducibility rebuild Modified: sslsplit/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2020-07-07 16:04:32 UTC (rev 659095) +++ PKGBUILD2020-07-07 16:04:48 UTC (rev 659096) @@ -2,7 +2,7 @@ pkgname=sslsplit pkgver=0.5.2 -pkgrel=2 +pkgrel=3 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections' url='https://www.roe.ch/SSLsplit' arch=('x86_64')
[arch-commits] Commit in sslsplit/trunk (PKGBUILD)
Date: Tuesday, August 6, 2019 @ 05:02:01 Author: foutrelis Revision: 497579 libevent 2.1.11 rebuild Modified: sslsplit/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2019-08-06 04:55:37 UTC (rev 497578) +++ PKGBUILD2019-08-06 05:02:01 UTC (rev 497579) @@ -2,7 +2,7 @@ pkgname=sslsplit pkgver=0.5.2 -pkgrel=1 +pkgrel=2 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections' url='https://www.roe.ch/SSLsplit' arch=('x86_64')
[arch-commits] Commit in sslsplit/trunk (PKGBUILD fix-tests.patch)
Date: Tuesday, August 6, 2019 @ 04:55:37 Author: foutrelis Revision: 497578 Fix tests Added: sslsplit/trunk/fix-tests.patch Modified: sslsplit/trunk/PKGBUILD -+ PKGBUILD| 11 +-- fix-tests.patch | 32 2 files changed, 41 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-08-06 04:51:57 UTC (rev 497577) +++ PKGBUILD2019-08-06 04:55:37 UTC (rev 497578) @@ -9,11 +9,18 @@ license=('BSD') depends=('libevent' 'openssl') checkdepends=('check') -source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}) +source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc} +fix-tests.patch) sha512sums=('6c8a679c8016255e11adabb4f2a2e94cc23386ce33bc128e5bab2e5187f042e8daf8c720eef0f4fd3e7e94250deaf33b3c9253ffe05f1e4bdbd9a31f77785cc2' -'SKIP') +'SKIP' + '092ad2dc4dba64ff17c3401053218231ad9890b40d999a9b74b837c8f42a60fb33f2cc41de40aa5ef291ed69c7c90c47760c2148406bbae6b5dbba8a1f84f0fe') validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger +prepare() { + cd ${pkgname}-${pkgver} + patch -Np1 -i ../fix-tests.patch +} + build() { cd ${pkgname}-${pkgver} make Added: fix-tests.patch === --- fix-tests.patch (rev 0) +++ fix-tests.patch 2019-08-06 04:55:37 UTC (rev 497578) @@ -0,0 +1,32 @@ +From 209ef11bb0e63681e54a9d74ea635bc6048450a3 Mon Sep 17 00:00:00 2001 +From: Daniel Roethlisberger +Date: Sat, 27 Oct 2018 00:24:01 +0200 +Subject: [PATCH] Add session to testreqs and make server.pem order-only + dependency + +--- + extra/pki/GNUmakefile | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/extra/pki/GNUmakefile b/extra/pki/GNUmakefile +index 8053809..c23ae23 100644 +--- a/extra/pki/GNUmakefile b/extra/pki/GNUmakefile +@@ -17,7 +17,7 @@ NO_SSL2:=$(shell $(OPENSSL) s_server -h 2>&1|awk '/-no_ssl2/ {print $$1}') + + all: rsa dsa ec targets server pwd + +-testreqs: rsa targets server ++testreqs: rsa targets server session + + session: session.pem + +@@ -112,7 +112,7 @@ targets/wildcard.roe.ch.pem: rsa.crt + targets/wildcard.roe.ch.crt + + # localhost network connectivity is required +-session.pem: server.pem ++session.pem: | server.pem + $(OPENSSL) s_server -accept 46143 -cert server.pem -quiet $(NO_SSL2) & \ + pid=$$! ; \ + sleep 1 ; \
[arch-commits] Commit in sslsplit/trunk (PKGBUILD)
Date: Wednesday, February 21, 2018 @ 17:12:40 Author: anthraxx Revision: 296711 upgpkg: sslsplit 0.5.2-1 Modified: sslsplit/trunk/PKGBUILD --+ PKGBUILD |8 1 file changed, 4 insertions(+), 4 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-02-21 17:07:52 UTC (rev 296710) +++ PKGBUILD2018-02-21 17:12:40 UTC (rev 296711) @@ -1,7 +1,7 @@ # Maintainer: Levente Polyak pkgname=sslsplit -pkgver=0.5.1 +pkgver=0.5.2 pkgrel=1 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections' url='https://www.roe.ch/SSLsplit' @@ -10,7 +10,7 @@ depends=('libevent' 'openssl') checkdepends=('check') source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}) -sha512sums=('89f399e9efa86610ede5d4f1ebaedfe90c2da36fa7d613c92f5b1a83bc385a83fd2775f350e6f320cd637c4546a7cbb97b7a554214ccb639df047370227d8d92' +sha512sums=('6c8a679c8016255e11adabb4f2a2e94cc23386ce33bc128e5bab2e5187f042e8daf8c720eef0f4fd3e7e94250deaf33b3c9253ffe05f1e4bdbd9a31f77785cc2' 'SKIP') validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger @@ -26,8 +26,8 @@ package() { cd ${pkgname}-${pkgver} - make PREFIX="${pkgdir}/usr" install - install -Dm 644 LICENSE.md -t "${pkgdir}/usr/share/licenses/${pkgname}" + make DESTDIR="${pkgdir}" PREFIX=/usr install + install -Dm 644 LICENSE* -t "${pkgdir}/usr/share/licenses/${pkgname}" install -Dm 644 README.md NEWS.md -t "${pkgdir}/usr/share/doc/${pkgname}" }
[arch-commits] Commit in sslsplit/trunk (PKGBUILD)
Date: Tuesday, June 13, 2017 @ 13:16:13 Author: anthraxx Revision: 236602 upgpkg: sslsplit 0.5.0-3 (libevent rebuild) Modified: sslsplit/trunk/PKGBUILD --+ PKGBUILD |7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-06-13 10:54:42 UTC (rev 236601) +++ PKGBUILD2017-06-13 13:16:13 UTC (rev 236602) @@ -2,7 +2,7 @@ pkgname=sslsplit pkgver=0.5.0 -pkgrel=2 +pkgrel=3 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections" url="https://www.roe.ch/SSLsplit"; arch=('i686' 'x86_64') @@ -18,7 +18,7 @@ prepare() { cd ${pkgname}-${pkgver} - patch -Np1 -i ../0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch + patch -p1 < "${srcdir}/0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch" } build() { @@ -35,8 +35,7 @@ cd ${pkgname}-${pkgver} make PREFIX="${pkgdir}/usr" install install -Dm 644 LICENSE.md "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" - install -Dm 644 README.md "${pkgdir}/usr/share/doc/${pkgname}/README.md" - install -Dm 644 NEWS.md "${pkgdir}/usr/share/doc/${pkgname}/NEWS.md" + install -Dm 644 README.md NEWS.md -t "${pkgdir}/usr/share/doc/${pkgname}" } # vim: ts=2 sw=2 et:
[arch-commits] Commit in sslsplit/trunk (PKGBUILD no-ssl3.patch)
Date: Tuesday, March 29, 2016 @ 18:22:22 Author: anthraxx Revision: 168805 upgpkg: sslsplit 0.5.0-1 Modified: sslsplit/trunk/PKGBUILD Deleted: sslsplit/trunk/no-ssl3.patch ---+ PKGBUILD | 19 +--- no-ssl3.patch | 66 2 files changed, 6 insertions(+), 79 deletions(-) Modified: PKGBUILD === --- PKGBUILD2016-03-29 16:06:18 UTC (rev 168804) +++ PKGBUILD2016-03-29 16:22:22 UTC (rev 168805) @@ -1,8 +1,8 @@ # Maintainer: Levente Polyak pkgname=sslsplit -pkgver=0.4.11 -pkgrel=4 +pkgver=0.5.0 +pkgrel=1 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections" url="https://www.roe.ch/SSLsplit"; arch=('i686' 'x86_64') @@ -9,18 +9,11 @@ license=('BSD') depends=('libevent' 'openssl') checkdepends=('check') -source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc} -no-ssl3.patch) -sha512sums=('c3339b4d22eb8f94ad1bc161b2c2d9efcb2f2828985712a5580437077f4c0bd74657d42274c4a9118c92721b9bd1d8150cf83d89afef6144b20aba497ac1d69a' -'SKIP' - '0c80471a881d29d285385e00dc1d36d27d796648b0327748263b7b78dfa6d728f0d7feaca719df3b74c0741740a350604173c9cb6f44ba5e68e34bd47a293856') +source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}) +sha512sums=('d8d4f294018a7a28b6e5cdec4690c5078118e1fc9c8b78d626290cdb5f2c8d2ecdbbee776a50666a99c522e9e22a15e85b5a602c412e242ec4cce64327555862' +'SKIP') validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger -prepare() { - cd ${pkgname}-${pkgver} - patch -p1 < "${srcdir}/no-ssl3.patch" -} - build() { cd ${pkgname}-${pkgver} make @@ -34,7 +27,7 @@ package() { cd ${pkgname}-${pkgver} make PREFIX="${pkgdir}/usr" install - install -Dm 644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + install -Dm 644 LICENSE.md "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" install -Dm 644 README.md "${pkgdir}/usr/share/doc/${pkgname}/README.md" install -Dm 644 NEWS.md "${pkgdir}/usr/share/doc/${pkgname}/NEWS.md" } Deleted: no-ssl3.patch === --- no-ssl3.patch 2016-03-29 16:06:18 UTC (rev 168804) +++ no-ssl3.patch 2016-03-29 16:22:22 UTC (rev 168805) @@ -1,66 +0,0 @@ -From: Hilko Bengen -Date: Sun, 22 Nov 2015 14:25:42 +0100 -Subject: Use OPENSSL_NO_SSL3_METHOD to determine whether SSLv3_method is - available - -As suggested by Kurt Roeckx - opts.c | 16 - 1 file changed, 8 insertions(+), 8 deletions(-) - -diff --git a/opts.c b/opts.c -index 0189af8..f23b357 100644 a/opts.c -+++ b/opts.c -@@ -143,11 +143,11 @@ opts_proto_force(opts_t *opts, const char *optarg, const char *argv0) - opts->sslmethod = SSLv2_method; - } else - #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ --#ifdef SSL_OP_NO_SSLv3 -+#ifndef OPENSSL_NO_SSL3_METHOD - if (!strcmp(optarg, "ssl3")) { - opts->sslmethod = SSLv3_method; - } else --#endif /* SSL_OP_NO_SSLv3 */ -+#endif /* OPENSSL_NO_SSL3_METHOD */ - #ifdef SSL_OP_NO_TLSv1 - if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) { - opts->sslmethod = TLSv1_method; -@@ -182,11 +182,11 @@ opts_proto_disable(opts_t *opts, const char *optarg, const char *argv0) - opts->no_ssl2 = 1; - } else - #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ --#ifdef SSL_OP_NO_SSLv3 -+#ifndef OPENSSL_NO_SSL3_METHOD - if (!strcmp(optarg, "ssl3")) { - opts->no_ssl3 = 1; - } else --#endif /* SSL_OP_NO_SSLv3 */ -+#endif /* OPENSSL_NO_SSL3_METHOD */ - #ifdef SSL_OP_NO_TLSv1 - if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) { - opts->no_tls10 = 1; -@@ -219,9 +219,9 @@ opts_proto_dbg_dump(opts_t *opts) - #if defined(SSL_OP_NO_SSLv2) && defined(WITH_SSLV2) - (opts->sslmethod == SSLv2_method) ? "nossl2" : - #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ --#ifdef SSL_OP_NO_SSLv3 -+#ifndef OPENSSL_NO_SSL3_METHOD - (opts->sslmethod == SSLv3_method) ? "ssl3" : --#endif /* SSL_OP_NO_SSLv3 */ -+#endif /* OPENSSL_NO_SSL3_METHOD */ - #ifdef SSL_OP_NO_TLSv1 - (opts->sslmethod == TLSv1_method) ? "tls10" : - #endif /* SSL_OP_NO_TLSv1 */ -@@ -236,9 +236,9 @@ opts_proto_dbg_dump(opts_t *opts) - opts->no_ssl2 ? " -ssl2" : - #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ - "", --#ifdef SSL_OP_NO_SSLv3 -+#ifndef OPENSSL_NO_SSL3_METHOD - opts->no_ssl3 ? " -ssl3" : --#endif /* SSL_OP_NO_SSLv3 */ -+#endif /* OPENSSL_NO_SSL3_METHOD */ - "", - #ifdef SSL_OP_NO_TLSv1 - opts->no_tls10 ? " -tls10" :
[arch-commits] Commit in sslsplit/trunk (PKGBUILD)
Date: Thursday, March 3, 2016 @ 01:06:57 Author: foutrelis Revision: 164265 OpenSSL 1.0.2g rebuild Modified: sslsplit/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2016-03-03 00:01:33 UTC (rev 164264) +++ PKGBUILD2016-03-03 00:06:57 UTC (rev 164265) @@ -2,7 +2,7 @@ pkgname=sslsplit pkgver=0.4.11 -pkgrel=3 +pkgrel=4 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections" url="https://www.roe.ch/SSLsplit"; arch=('i686' 'x86_64')
[arch-commits] Commit in sslsplit/trunk (PKGBUILD no-ssl3.patch)
Date: Thursday, March 3, 2016 @ 01:01:33 Author: anthraxx Revision: 164264 openssl rebuild Added: sslsplit/trunk/no-ssl3.patch Modified: sslsplit/trunk/PKGBUILD ---+ PKGBUILD | 13 --- no-ssl3.patch | 66 2 files changed, 76 insertions(+), 3 deletions(-) Modified: PKGBUILD === --- PKGBUILD2016-03-02 22:51:54 UTC (rev 164263) +++ PKGBUILD2016-03-03 00:01:33 UTC (rev 164264) @@ -2,7 +2,7 @@ pkgname=sslsplit pkgver=0.4.11 -pkgrel=2 +pkgrel=3 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections" url="https://www.roe.ch/SSLsplit"; arch=('i686' 'x86_64') @@ -9,11 +9,18 @@ license=('BSD') depends=('libevent' 'openssl') checkdepends=('check') -source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}) +source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc} +no-ssl3.patch) sha512sums=('c3339b4d22eb8f94ad1bc161b2c2d9efcb2f2828985712a5580437077f4c0bd74657d42274c4a9118c92721b9bd1d8150cf83d89afef6144b20aba497ac1d69a' -'SKIP') +'SKIP' + '0c80471a881d29d285385e00dc1d36d27d796648b0327748263b7b78dfa6d728f0d7feaca719df3b74c0741740a350604173c9cb6f44ba5e68e34bd47a293856') validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger +prepare() { + cd ${pkgname}-${pkgver} + patch -p1 < "${srcdir}/no-ssl3.patch" +} + build() { cd ${pkgname}-${pkgver} make Added: no-ssl3.patch === --- no-ssl3.patch (rev 0) +++ no-ssl3.patch 2016-03-03 00:01:33 UTC (rev 164264) @@ -0,0 +1,66 @@ +From: Hilko Bengen +Date: Sun, 22 Nov 2015 14:25:42 +0100 +Subject: Use OPENSSL_NO_SSL3_METHOD to determine whether SSLv3_method is + available + +As suggested by Kurt Roeckx +--- + opts.c | 16 + 1 file changed, 8 insertions(+), 8 deletions(-) + +diff --git a/opts.c b/opts.c +index 0189af8..f23b357 100644 +--- a/opts.c b/opts.c +@@ -143,11 +143,11 @@ opts_proto_force(opts_t *opts, const char *optarg, const char *argv0) + opts->sslmethod = SSLv2_method; + } else + #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ +-#ifdef SSL_OP_NO_SSLv3 ++#ifndef OPENSSL_NO_SSL3_METHOD + if (!strcmp(optarg, "ssl3")) { + opts->sslmethod = SSLv3_method; + } else +-#endif /* SSL_OP_NO_SSLv3 */ ++#endif /* OPENSSL_NO_SSL3_METHOD */ + #ifdef SSL_OP_NO_TLSv1 + if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) { + opts->sslmethod = TLSv1_method; +@@ -182,11 +182,11 @@ opts_proto_disable(opts_t *opts, const char *optarg, const char *argv0) + opts->no_ssl2 = 1; + } else + #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ +-#ifdef SSL_OP_NO_SSLv3 ++#ifndef OPENSSL_NO_SSL3_METHOD + if (!strcmp(optarg, "ssl3")) { + opts->no_ssl3 = 1; + } else +-#endif /* SSL_OP_NO_SSLv3 */ ++#endif /* OPENSSL_NO_SSL3_METHOD */ + #ifdef SSL_OP_NO_TLSv1 + if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) { + opts->no_tls10 = 1; +@@ -219,9 +219,9 @@ opts_proto_dbg_dump(opts_t *opts) + #if defined(SSL_OP_NO_SSLv2) && defined(WITH_SSLV2) + (opts->sslmethod == SSLv2_method) ? "nossl2" : + #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ +-#ifdef SSL_OP_NO_SSLv3 ++#ifndef OPENSSL_NO_SSL3_METHOD + (opts->sslmethod == SSLv3_method) ? "ssl3" : +-#endif /* SSL_OP_NO_SSLv3 */ ++#endif /* OPENSSL_NO_SSL3_METHOD */ + #ifdef SSL_OP_NO_TLSv1 + (opts->sslmethod == TLSv1_method) ? "tls10" : + #endif /* SSL_OP_NO_TLSv1 */ +@@ -236,9 +236,9 @@ opts_proto_dbg_dump(opts_t *opts) + opts->no_ssl2 ? " -ssl2" : + #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */ + "", +-#ifdef SSL_OP_NO_SSLv3 ++#ifndef OPENSSL_NO_SSL3_METHOD + opts->no_ssl3 ? " -ssl3" : +-#endif /* SSL_OP_NO_SSLv3 */ ++#endif /* OPENSSL_NO_SSL3_METHOD */ + "", + #ifdef SSL_OP_NO_TLSv1 + opts->no_tls10 ? " -tls10" :