[arch-commits] Commit in sslsplit/trunk (PKGBUILD)

2020-07-07 Thread Felix Yan via arch-commits
Date: Tuesday, July 7, 2020 @ 16:04:48
  Author: felixonmars
Revision: 659096

upgpkg: sslsplit 0.5.2-3: reproducibility rebuild

Modified:
  sslsplit/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2020-07-07 16:04:32 UTC (rev 659095)
+++ PKGBUILD2020-07-07 16:04:48 UTC (rev 659096)
@@ -2,7 +2,7 @@
 
 pkgname=sslsplit
 pkgver=0.5.2
-pkgrel=2
+pkgrel=3
 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections'
 url='https://www.roe.ch/SSLsplit'
 arch=('x86_64')


[arch-commits] Commit in sslsplit/trunk (PKGBUILD)

2019-08-05 Thread Evangelos Foutras via arch-commits
Date: Tuesday, August 6, 2019 @ 05:02:01
  Author: foutrelis
Revision: 497579

libevent 2.1.11 rebuild

Modified:
  sslsplit/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2019-08-06 04:55:37 UTC (rev 497578)
+++ PKGBUILD2019-08-06 05:02:01 UTC (rev 497579)
@@ -2,7 +2,7 @@
 
 pkgname=sslsplit
 pkgver=0.5.2
-pkgrel=1
+pkgrel=2
 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections'
 url='https://www.roe.ch/SSLsplit'
 arch=('x86_64')


[arch-commits] Commit in sslsplit/trunk (PKGBUILD fix-tests.patch)

2019-08-05 Thread Evangelos Foutras via arch-commits
Date: Tuesday, August 6, 2019 @ 04:55:37
  Author: foutrelis
Revision: 497578

Fix tests

Added:
  sslsplit/trunk/fix-tests.patch
Modified:
  sslsplit/trunk/PKGBUILD

-+
 PKGBUILD|   11 +--
 fix-tests.patch |   32 
 2 files changed, 41 insertions(+), 2 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2019-08-06 04:51:57 UTC (rev 497577)
+++ PKGBUILD2019-08-06 04:55:37 UTC (rev 497578)
@@ -9,11 +9,18 @@
 license=('BSD')
 depends=('libevent' 'openssl')
 checkdepends=('check')
-source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc})
+source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}
+fix-tests.patch)
 
sha512sums=('6c8a679c8016255e11adabb4f2a2e94cc23386ce33bc128e5bab2e5187f042e8daf8c720eef0f4fd3e7e94250deaf33b3c9253ffe05f1e4bdbd9a31f77785cc2'
-'SKIP')
+'SKIP'
+
'092ad2dc4dba64ff17c3401053218231ad9890b40d999a9b74b837c8f42a60fb33f2cc41de40aa5ef291ed69c7c90c47760c2148406bbae6b5dbba8a1f84f0fe')
 validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel 
Roethlisberger 
 
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -Np1 -i ../fix-tests.patch
+}
+
 build() {
   cd ${pkgname}-${pkgver}
   make

Added: fix-tests.patch
===
--- fix-tests.patch (rev 0)
+++ fix-tests.patch 2019-08-06 04:55:37 UTC (rev 497578)
@@ -0,0 +1,32 @@
+From 209ef11bb0e63681e54a9d74ea635bc6048450a3 Mon Sep 17 00:00:00 2001
+From: Daniel Roethlisberger 
+Date: Sat, 27 Oct 2018 00:24:01 +0200
+Subject: [PATCH] Add session to testreqs and make server.pem order-only
+ dependency
+
+---
+ extra/pki/GNUmakefile | 4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/extra/pki/GNUmakefile b/extra/pki/GNUmakefile
+index 8053809..c23ae23 100644
+--- a/extra/pki/GNUmakefile
 b/extra/pki/GNUmakefile
+@@ -17,7 +17,7 @@ NO_SSL2:=$(shell $(OPENSSL) s_server -h 2>&1|awk 
'/-no_ssl2/ {print $$1}')
+ 
+ all: rsa dsa ec targets server pwd
+ 
+-testreqs: rsa targets server
++testreqs: rsa targets server session
+ 
+ session: session.pem
+ 
+@@ -112,7 +112,7 @@ targets/wildcard.roe.ch.pem: rsa.crt
+   targets/wildcard.roe.ch.crt
+ 
+ # localhost network connectivity is required
+-session.pem: server.pem
++session.pem: | server.pem
+   $(OPENSSL) s_server -accept 46143 -cert server.pem -quiet $(NO_SSL2) & \
+   pid=$$! ; \
+   sleep 1 ; \


[arch-commits] Commit in sslsplit/trunk (PKGBUILD)

2018-02-21 Thread Levente Polyak via arch-commits
Date: Wednesday, February 21, 2018 @ 17:12:40
  Author: anthraxx
Revision: 296711

upgpkg: sslsplit 0.5.2-1

Modified:
  sslsplit/trunk/PKGBUILD

--+
 PKGBUILD |8 
 1 file changed, 4 insertions(+), 4 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2018-02-21 17:07:52 UTC (rev 296710)
+++ PKGBUILD2018-02-21 17:12:40 UTC (rev 296711)
@@ -1,7 +1,7 @@
 # Maintainer: Levente Polyak 
 
 pkgname=sslsplit
-pkgver=0.5.1
+pkgver=0.5.2
 pkgrel=1
 pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections'
 url='https://www.roe.ch/SSLsplit'
@@ -10,7 +10,7 @@
 depends=('libevent' 'openssl')
 checkdepends=('check')
 
source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc})
-sha512sums=('89f399e9efa86610ede5d4f1ebaedfe90c2da36fa7d613c92f5b1a83bc385a83fd2775f350e6f320cd637c4546a7cbb97b7a554214ccb639df047370227d8d92'
+sha512sums=('6c8a679c8016255e11adabb4f2a2e94cc23386ce33bc128e5bab2e5187f042e8daf8c720eef0f4fd3e7e94250deaf33b3c9253ffe05f1e4bdbd9a31f77785cc2'
 'SKIP')
 validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel 
Roethlisberger 
 
@@ -26,8 +26,8 @@
 
 package() {
   cd ${pkgname}-${pkgver}
-  make PREFIX="${pkgdir}/usr" install
-  install -Dm 644 LICENSE.md -t "${pkgdir}/usr/share/licenses/${pkgname}"
+  make DESTDIR="${pkgdir}" PREFIX=/usr install
+  install -Dm 644 LICENSE* -t "${pkgdir}/usr/share/licenses/${pkgname}"
   install -Dm 644 README.md NEWS.md -t "${pkgdir}/usr/share/doc/${pkgname}"
 }
 


[arch-commits] Commit in sslsplit/trunk (PKGBUILD)

2017-06-13 Thread Levente Polyak
Date: Tuesday, June 13, 2017 @ 13:16:13
  Author: anthraxx
Revision: 236602

upgpkg: sslsplit 0.5.0-3 (libevent rebuild)

Modified:
  sslsplit/trunk/PKGBUILD

--+
 PKGBUILD |7 +++
 1 file changed, 3 insertions(+), 4 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2017-06-13 10:54:42 UTC (rev 236601)
+++ PKGBUILD2017-06-13 13:16:13 UTC (rev 236602)
@@ -2,7 +2,7 @@
 
 pkgname=sslsplit
 pkgver=0.5.0
-pkgrel=2
+pkgrel=3
 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections"
 url="https://www.roe.ch/SSLsplit;
 arch=('i686' 'x86_64')
@@ -18,7 +18,7 @@
 
 prepare() {
   cd ${pkgname}-${pkgver}
-  patch -Np1 -i 
../0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch
+  patch -p1 < 
"${srcdir}/0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch"
 }
 
 build() {
@@ -35,8 +35,7 @@
   cd ${pkgname}-${pkgver}
   make PREFIX="${pkgdir}/usr" install
   install -Dm 644 LICENSE.md "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
-  install -Dm 644 README.md "${pkgdir}/usr/share/doc/${pkgname}/README.md"
-  install -Dm 644 NEWS.md "${pkgdir}/usr/share/doc/${pkgname}/NEWS.md"
+  install -Dm 644 README.md NEWS.md -t "${pkgdir}/usr/share/doc/${pkgname}"
 }
 
 # vim: ts=2 sw=2 et:


[arch-commits] Commit in sslsplit/trunk (PKGBUILD)

2016-03-02 Thread Evangelos Foutras
Date: Thursday, March 3, 2016 @ 01:06:57
  Author: foutrelis
Revision: 164265

OpenSSL 1.0.2g rebuild

Modified:
  sslsplit/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2016-03-03 00:01:33 UTC (rev 164264)
+++ PKGBUILD2016-03-03 00:06:57 UTC (rev 164265)
@@ -2,7 +2,7 @@
 
 pkgname=sslsplit
 pkgver=0.4.11
-pkgrel=3
+pkgrel=4
 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections"
 url="https://www.roe.ch/SSLsplit;
 arch=('i686' 'x86_64')


[arch-commits] Commit in sslsplit/trunk (PKGBUILD no-ssl3.patch)

2016-03-02 Thread Levente Polyak
Date: Thursday, March 3, 2016 @ 01:01:33
  Author: anthraxx
Revision: 164264

openssl rebuild

Added:
  sslsplit/trunk/no-ssl3.patch
Modified:
  sslsplit/trunk/PKGBUILD

---+
 PKGBUILD  |   13 ---
 no-ssl3.patch |   66 
 2 files changed, 76 insertions(+), 3 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2016-03-02 22:51:54 UTC (rev 164263)
+++ PKGBUILD2016-03-03 00:01:33 UTC (rev 164264)
@@ -2,7 +2,7 @@
 
 pkgname=sslsplit
 pkgver=0.4.11
-pkgrel=2
+pkgrel=3
 pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network 
connections"
 url="https://www.roe.ch/SSLsplit;
 arch=('i686' 'x86_64')
@@ -9,11 +9,18 @@
 license=('BSD')
 depends=('libevent' 'openssl')
 checkdepends=('check')
-source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc})
+source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}
+no-ssl3.patch)
 
sha512sums=('c3339b4d22eb8f94ad1bc161b2c2d9efcb2f2828985712a5580437077f4c0bd74657d42274c4a9118c92721b9bd1d8150cf83d89afef6144b20aba497ac1d69a'
-'SKIP')
+'SKIP'
+
'0c80471a881d29d285385e00dc1d36d27d796648b0327748263b7b78dfa6d728f0d7feaca719df3b74c0741740a350604173c9cb6f44ba5e68e34bd47a293856')
 validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel 
Roethlisberger 
 
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 < "${srcdir}/no-ssl3.patch"
+}
+
 build() {
   cd ${pkgname}-${pkgver}
   make

Added: no-ssl3.patch
===
--- no-ssl3.patch   (rev 0)
+++ no-ssl3.patch   2016-03-03 00:01:33 UTC (rev 164264)
@@ -0,0 +1,66 @@
+From: Hilko Bengen 
+Date: Sun, 22 Nov 2015 14:25:42 +0100
+Subject: Use OPENSSL_NO_SSL3_METHOD to determine whether SSLv3_method is
+ available
+
+As suggested by Kurt Roeckx
+---
+ opts.c | 16 
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/opts.c b/opts.c
+index 0189af8..f23b357 100644
+--- a/opts.c
 b/opts.c
+@@ -143,11 +143,11 @@ opts_proto_force(opts_t *opts, const char *optarg, const 
char *argv0)
+   opts->sslmethod = SSLv2_method;
+   } else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+   if (!strcmp(optarg, "ssl3")) {
+   opts->sslmethod = SSLv3_method;
+   } else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+   if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+   opts->sslmethod = TLSv1_method;
+@@ -182,11 +182,11 @@ opts_proto_disable(opts_t *opts, const char *optarg, 
const char *argv0)
+   opts->no_ssl2 = 1;
+   } else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+   if (!strcmp(optarg, "ssl3")) {
+   opts->no_ssl3 = 1;
+   } else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+   if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+   opts->no_tls10 = 1;
+@@ -219,9 +219,9 @@ opts_proto_dbg_dump(opts_t *opts)
+ #if defined(SSL_OP_NO_SSLv2) && defined(WITH_SSLV2)
+  (opts->sslmethod == SSLv2_method) ? "nossl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+  (opts->sslmethod == SSLv3_method) ? "ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+  (opts->sslmethod == TLSv1_method) ? "tls10" :
+ #endif /* SSL_OP_NO_TLSv1 */
+@@ -236,9 +236,9 @@ opts_proto_dbg_dump(opts_t *opts)
+  opts->no_ssl2 ? " -ssl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+  "",
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+  opts->no_ssl3 ? " -ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+  "",
+ #ifdef SSL_OP_NO_TLSv1
+  opts->no_tls10 ? " -tls10" :