[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Tuesday, July 7, 2020 @ 14:15:14 Author: felixonmars Revision: 658781 upgpkg: sslscan 1.10.2-8: reproducibility rebuild Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2020-07-07 14:15:10 UTC (rev 658780) +++ PKGBUILD2020-07-07 14:15:14 UTC (rev 658781) @@ -3,7 +3,7 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=7 +pkgrel=8 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('x86_64')
[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Friday, November 9, 2018 @ 23:26:56 Author: felixonmars Revision: 405282 PIE/BUILDINFO rebuild Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2018-11-09 23:26:23 UTC (rev 405281) +++ PKGBUILD2018-11-09 23:26:56 UTC (rev 405282) @@ -3,7 +3,7 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=6 +pkgrel=7 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('x86_64')
[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Friday, May 19, 2017 @ 17:50:14 Author: arojas Revision: 228592 openssl-1.0 rebuild Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2017-05-19 17:49:52 UTC (rev 228591) +++ PKGBUILD2017-05-19 17:50:14 UTC (rev 228592) @@ -3,7 +3,7 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=5 +pkgrel=6 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('i686' 'x86_64')
[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Wednesday, April 5, 2017 @ 12:09:12 Author: arojas Revision: 220609 openssl-1.0 1.0.2.k-3 rebuild Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2017-04-05 12:07:37 UTC (rev 220608) +++ PKGBUILD2017-04-05 12:09:12 UTC (rev 220609) @@ -3,7 +3,7 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=4 +pkgrel=5 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('i686' 'x86_64')
[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Tuesday, March 21, 2017 @ 23:01:09 Author: jgc Revision: 218233 upgpkg: sslscan 1.10.2-4 Build with OpenSSL 1.0 Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-03-21 21:58:13 UTC (rev 218232) +++ PKGBUILD2017-03-21 23:01:09 UTC (rev 218233) @@ -3,12 +3,12 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=3 +pkgrel=4 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('i686' 'x86_64') license=('GPL3') -depends=('openssl') +depends=('openssl-1.0') source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz add-checks-for-ssl3.patch) sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34' @@ -17,11 +17,12 @@ prepare() { cd ${pkgname}-${pkgver} patch -Np1 -i ../add-checks-for-ssl3.patch + sed -e 's/CFLAGS ?=/CFLAGS +=/' -e 's/LDFLAGS ?=/LDFLAGS +=/' -i Makefile } build() { cd ${pkgname}-${pkgver} - LDFLAGS="${LDFLAGS} -lssl -lcrypto" make + make OPENSSL_INCLUDE=/usr/include/openssl-1.0 OPENSSL_LIB=/usr/lib/openssl-1.0 } package() {
[arch-commits] Commit in sslscan/trunk (PKGBUILD)
Date: Wednesday, March 2, 2016 @ 21:30:02 Author: fyan Revision: 164247 OpenSSL 1.0.2g rebuild Modified: sslscan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2016-03-02 20:29:23 UTC (rev 164246) +++ PKGBUILD2016-03-02 20:30:02 UTC (rev 164247) @@ -3,7 +3,7 @@ pkgname=sslscan pkgver=1.10.2 -pkgrel=2 +pkgrel=3 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported" url="https://github.com/DinoTools/sslscan/; arch=('i686' 'x86_64')
[arch-commits] Commit in sslscan/trunk (PKGBUILD add-checks-for-ssl3.patch)
Date: Wednesday, March 2, 2016 @ 21:29:23 Author: foutrelis Revision: 164246 Fix build with OpenSSL 1.0.2g Add #ifdefs for OPENSSL_NO_SSL3 similar to those for OPENSSL_NO_SSL2. Added: sslscan/trunk/add-checks-for-ssl3.patch Modified: sslscan/trunk/PKGBUILD ---+ PKGBUILD | 11 ++- add-checks-for-ssl3.patch | 133 2 files changed, 142 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2016-03-02 20:06:02 UTC (rev 164245) +++ PKGBUILD2016-03-02 20:29:23 UTC (rev 164246) @@ -9,9 +9,16 @@ arch=('i686' 'x86_64') license=('GPL3') depends=('openssl') -source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz) -sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34') +source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz +add-checks-for-ssl3.patch) +sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34' + '2cc720dfc12ba8e50b5dc9665cb34a567f26b9685da36dcd56b937a2b3aa9b8199f241074558ed870fdd7b77415396723edff040904c585d519d0b66582dca29') +prepare() { + cd ${pkgname}-${pkgver} + patch -Np1 -i ../add-checks-for-ssl3.patch +} + build() { cd ${pkgname}-${pkgver} LDFLAGS="${LDFLAGS} -lssl -lcrypto" make Added: add-checks-for-ssl3.patch === --- add-checks-for-ssl3.patch (rev 0) +++ add-checks-for-ssl3.patch 2016-03-02 20:29:23 UTC (rev 164246) @@ -0,0 +1,133 @@ +diff -uprb sslscan-1.10.2.orig/sslscan.c sslscan-1.10.2/sslscan.c +--- sslscan-1.10.2.orig/sslscan.c 2014-02-14 16:59:08.0 +0200 sslscan-1.10.2/sslscan.c 2016-03-02 22:24:34.714187733 +0200 +@@ -1083,8 +1083,9 @@ int testCipher(struct sslCheckOptions *o + } + if (options->xmlOutput != 0) + fprintf(options->xmlOutput, " sslversion=\""); ++if (0) {} + #ifndef OPENSSL_NO_SSL2 +-if (sslCipherPointer->sslMethod == SSLv2_client_method()) ++else if (sslCipherPointer->sslMethod == SSLv2_client_method()) + { + if (options->xmlOutput != 0) + fprintf(options->xmlOutput, "SSLv2\" bits=\""); +@@ -1093,10 +1094,9 @@ int testCipher(struct sslCheckOptions *o + else + printf("SSLv2 "); + } +-else if (sslCipherPointer->sslMethod == SSLv3_client_method()) +-#else +-if (sslCipherPointer->sslMethod == SSLv3_client_method()) + #endif ++#ifndef OPENSSL_NO_SSL3 ++else if (sslCipherPointer->sslMethod == SSLv3_client_method()) + { + if (options->xmlOutput != 0) + fprintf(options->xmlOutput, "SSLv3\" bits=\""); +@@ -1105,6 +1105,7 @@ int testCipher(struct sslCheckOptions *o + else + printf("SSLv3 "); + } ++#endif + else if (sslCipherPointer->sslMethod == TLSv1_client_method()) + { + if (options->xmlOutput != 0) +@@ -1238,8 +1239,9 @@ int defaultCipher(struct sslCheckOptions + cipherStatus = SSL_connect(ssl); + if (cipherStatus == 0 || cipherStatus == 1) + { ++if (0) {} + #ifndef OPENSSL_NO_SSL2 +-if (sslMethod == SSLv2_client_method()) ++else if (sslMethod == SSLv2_client_method()) + { + if (options->xmlOutput != 0) + fprintf(options->xmlOutput, " xmlOutput != 0) + fprintf(options->xmlOutput, " xmlOutput != 0) +@@ -1937,8 +1939,10 @@ int testHost(struct sslCheckOptions *opt + if (status != false) + status = defaultCipher(options, SSLv2_client_method()); + #endif ++#ifndef OPENSSL_NO_SSL3 + if (status != false) + status = defaultCipher(options, SSLv3_client_method()); ++#endif + if (status != false) + status = defaultCipher(options, TLSv1_client_method()); + +@@ -1957,7 +1961,9 @@ int testHost(struct sslCheckOptions *opt + #endif + break; + case ssl_v3: ++#ifndef OPENSSL_NO_SSL3 + status = defaultCipher(options,