[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2020-07-07 Thread Felix Yan via arch-commits
Date: Tuesday, July 7, 2020 @ 14:15:14
  Author: felixonmars
Revision: 658781

upgpkg: sslscan 1.10.2-8: reproducibility rebuild

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2020-07-07 14:15:10 UTC (rev 658780)
+++ PKGBUILD2020-07-07 14:15:14 UTC (rev 658781)
@@ -3,7 +3,7 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=7
+pkgrel=8
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('x86_64')


[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2018-11-09 Thread Felix Yan via arch-commits
Date: Friday, November 9, 2018 @ 23:26:56
  Author: felixonmars
Revision: 405282

PIE/BUILDINFO rebuild

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2018-11-09 23:26:23 UTC (rev 405281)
+++ PKGBUILD2018-11-09 23:26:56 UTC (rev 405282)
@@ -3,7 +3,7 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=6
+pkgrel=7
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('x86_64')


[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2017-05-19 Thread Antonio Rojas
Date: Friday, May 19, 2017 @ 17:50:14
  Author: arojas
Revision: 228592

openssl-1.0 rebuild

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2017-05-19 17:49:52 UTC (rev 228591)
+++ PKGBUILD2017-05-19 17:50:14 UTC (rev 228592)
@@ -3,7 +3,7 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=5
+pkgrel=6
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('i686' 'x86_64')


[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2017-04-05 Thread Antonio Rojas
Date: Wednesday, April 5, 2017 @ 12:09:12
  Author: arojas
Revision: 220609

openssl-1.0 1.0.2.k-3 rebuild

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2017-04-05 12:07:37 UTC (rev 220608)
+++ PKGBUILD2017-04-05 12:09:12 UTC (rev 220609)
@@ -3,7 +3,7 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=4
+pkgrel=5
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('i686' 'x86_64')


[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2017-03-21 Thread Jan de Groot
Date: Tuesday, March 21, 2017 @ 23:01:09
  Author: jgc
Revision: 218233

upgpkg: sslscan 1.10.2-4

Build with OpenSSL 1.0

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |7 ---
 1 file changed, 4 insertions(+), 3 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2017-03-21 21:58:13 UTC (rev 218232)
+++ PKGBUILD2017-03-21 23:01:09 UTC (rev 218233)
@@ -3,12 +3,12 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=3
+pkgrel=4
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('i686' 'x86_64')
 license=('GPL3')
-depends=('openssl')
+depends=('openssl-1.0')
 
source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz
 add-checks-for-ssl3.patch)
 
sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34'
@@ -17,11 +17,12 @@
 prepare() {
   cd ${pkgname}-${pkgver}
   patch -Np1 -i ../add-checks-for-ssl3.patch
+  sed -e 's/CFLAGS ?=/CFLAGS +=/' -e 's/LDFLAGS ?=/LDFLAGS +=/' -i Makefile
 }
 
 build() {
   cd ${pkgname}-${pkgver}
-  LDFLAGS="${LDFLAGS} -lssl -lcrypto" make
+  make OPENSSL_INCLUDE=/usr/include/openssl-1.0 
OPENSSL_LIB=/usr/lib/openssl-1.0
 }
 
 package() {


[arch-commits] Commit in sslscan/trunk (PKGBUILD)

2016-03-02 Thread Felix Yan
Date: Wednesday, March 2, 2016 @ 21:30:02
  Author: fyan
Revision: 164247

OpenSSL 1.0.2g rebuild

Modified:
  sslscan/trunk/PKGBUILD

--+
 PKGBUILD |2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2016-03-02 20:29:23 UTC (rev 164246)
+++ PKGBUILD2016-03-02 20:30:02 UTC (rev 164247)
@@ -3,7 +3,7 @@
 
 pkgname=sslscan
 pkgver=1.10.2
-pkgrel=2
+pkgrel=3
 pkgdesc="A fast tools to scan SSL services, such as HTTPS to determine the 
ciphers that are supported"
 url="https://github.com/DinoTools/sslscan/;
 arch=('i686' 'x86_64')


[arch-commits] Commit in sslscan/trunk (PKGBUILD add-checks-for-ssl3.patch)

2016-03-02 Thread Evangelos Foutras
Date: Wednesday, March 2, 2016 @ 21:29:23
  Author: foutrelis
Revision: 164246

Fix build with OpenSSL 1.0.2g

Add #ifdefs for OPENSSL_NO_SSL3 similar to those for OPENSSL_NO_SSL2.

Added:
  sslscan/trunk/add-checks-for-ssl3.patch
Modified:
  sslscan/trunk/PKGBUILD

---+
 PKGBUILD  |   11 ++-
 add-checks-for-ssl3.patch |  133 
 2 files changed, 142 insertions(+), 2 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2016-03-02 20:06:02 UTC (rev 164245)
+++ PKGBUILD2016-03-02 20:29:23 UTC (rev 164246)
@@ -9,9 +9,16 @@
 arch=('i686' 'x86_64')
 license=('GPL3')
 depends=('openssl')
-source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz)
-sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34')
+source=(${pkgname}-${pkgver}.tar.gz::https://github.com/DinoTools/${pkgname}/archive/${pkgver}.tar.gz
+add-checks-for-ssl3.patch)
+sha512sums=('b7bf9a12c0469893bf1ada53f42cf0a7c286d6bcb5db260ea0ecd6c332ccb8ec6caafa07cd78d15582af5d154b6f4c84cee55ba2fe5a286cb9bd3f9c83e60c34'
+
'2cc720dfc12ba8e50b5dc9665cb34a567f26b9685da36dcd56b937a2b3aa9b8199f241074558ed870fdd7b77415396723edff040904c585d519d0b66582dca29')
 
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -Np1 -i ../add-checks-for-ssl3.patch
+}
+
 build() {
   cd ${pkgname}-${pkgver}
   LDFLAGS="${LDFLAGS} -lssl -lcrypto" make

Added: add-checks-for-ssl3.patch
===
--- add-checks-for-ssl3.patch   (rev 0)
+++ add-checks-for-ssl3.patch   2016-03-02 20:29:23 UTC (rev 164246)
@@ -0,0 +1,133 @@
+diff -uprb sslscan-1.10.2.orig/sslscan.c sslscan-1.10.2/sslscan.c
+--- sslscan-1.10.2.orig/sslscan.c  2014-02-14 16:59:08.0 +0200
 sslscan-1.10.2/sslscan.c   2016-03-02 22:24:34.714187733 +0200
+@@ -1083,8 +1083,9 @@ int testCipher(struct sslCheckOptions *o
+ }
+ if (options->xmlOutput != 0)
+ fprintf(options->xmlOutput, " sslversion=\"");
++if (0) {}
+ #ifndef OPENSSL_NO_SSL2
+-if (sslCipherPointer->sslMethod == SSLv2_client_method())
++else if (sslCipherPointer->sslMethod == 
SSLv2_client_method())
+ {
+ if (options->xmlOutput != 0)
+ fprintf(options->xmlOutput, "SSLv2\" bits=\"");
+@@ -1093,10 +1094,9 @@ int testCipher(struct sslCheckOptions *o
+ else
+ printf("SSLv2  ");
+ }
+-else if (sslCipherPointer->sslMethod == 
SSLv3_client_method())
+-#else
+-if (sslCipherPointer->sslMethod == SSLv3_client_method())
+ #endif
++#ifndef OPENSSL_NO_SSL3
++else if (sslCipherPointer->sslMethod == 
SSLv3_client_method())
+ {
+ if (options->xmlOutput != 0)
+ fprintf(options->xmlOutput, "SSLv3\" bits=\"");
+@@ -1105,6 +1105,7 @@ int testCipher(struct sslCheckOptions *o
+ else
+ printf("SSLv3  ");
+ }
++#endif
+ else if (sslCipherPointer->sslMethod == 
TLSv1_client_method())
+ {
+ if (options->xmlOutput != 0)
+@@ -1238,8 +1239,9 @@ int defaultCipher(struct sslCheckOptions
+ cipherStatus = SSL_connect(ssl);
+ if (cipherStatus == 0 || cipherStatus == 1)
+ {
++if (0) {}
+ #ifndef OPENSSL_NO_SSL2
+-if (sslMethod == SSLv2_client_method())
++else if (sslMethod == SSLv2_client_method())
+ {
+ if (options->xmlOutput != 0)
+ fprintf(options->xmlOutput, "  
xmlOutput != 0)
+ fprintf(options->xmlOutput, "  
xmlOutput != 0)
+@@ -1937,8 +1939,10 @@ int testHost(struct sslCheckOptions *opt
+ if (status != false)
+ status = defaultCipher(options, SSLv2_client_method());
+ #endif
++#ifndef OPENSSL_NO_SSL3
+ if (status != false)
+ status = defaultCipher(options, SSLv3_client_method());
++#endif
+ if (status != false)
+ status = defaultCipher(options, TLSv1_client_method());
+ 
+@@ -1957,7 +1961,9 @@ int testHost(struct sslCheckOptions *opt
+ #endif
+ break;
+ case ssl_v3:
++#ifndef OPENSSL_NO_SSL3
+ status = defaultCipher(options,