[arch-commits] Commit in sslsplit/repos (6 files)

Evangelos Foutras foutrelis at archlinux.org
Thu Mar 3 00:07:04 UTC 2016


    Date: Thursday, March 3, 2016 @ 01:07:03
  Author: foutrelis
Revision: 164266

archrelease: copy trunk to community-staging-i686, community-staging-x86_64

Added:
  sslsplit/repos/community-staging-i686/
  sslsplit/repos/community-staging-i686/PKGBUILD
    (from rev 164265, sslsplit/trunk/PKGBUILD)
  sslsplit/repos/community-staging-i686/no-ssl3.patch
    (from rev 164265, sslsplit/trunk/no-ssl3.patch)
  sslsplit/repos/community-staging-x86_64/
  sslsplit/repos/community-staging-x86_64/PKGBUILD
    (from rev 164265, sslsplit/trunk/PKGBUILD)
  sslsplit/repos/community-staging-x86_64/no-ssl3.patch
    (from rev 164265, sslsplit/trunk/no-ssl3.patch)

----------------------------------------+
 community-staging-i686/PKGBUILD        |   42 +++++++++++++++++++
 community-staging-i686/no-ssl3.patch   |   66 +++++++++++++++++++++++++++++++
 community-staging-x86_64/PKGBUILD      |   42 +++++++++++++++++++
 community-staging-x86_64/no-ssl3.patch |   66 +++++++++++++++++++++++++++++++
 4 files changed, 216 insertions(+)

Copied: sslsplit/repos/community-staging-i686/PKGBUILD (from rev 164265, sslsplit/trunk/PKGBUILD)
===================================================================
--- community-staging-i686/PKGBUILD	                        (rev 0)
+++ community-staging-i686/PKGBUILD	2016-03-03 00:07:03 UTC (rev 164266)
@@ -0,0 +1,42 @@
+# Maintainer: Levente Polyak <anthraxx[at]archlinux[dot]org>
+
+pkgname=sslsplit
+pkgver=0.4.11
+pkgrel=4
+pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections"
+url="https://www.roe.ch/SSLsplit"
+arch=('i686' 'x86_64')
+license=('BSD')
+depends=('libevent' 'openssl')
+checkdepends=('check')
+source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}
+        no-ssl3.patch)
+sha512sums=('c3339b4d22eb8f94ad1bc161b2c2d9efcb2f2828985712a5580437077f4c0bd74657d42274c4a9118c92721b9bd1d8150cf83d89afef6144b20aba497ac1d69a'
+            'SKIP'
+            '0c80471a881d29d285385e00dc1d36d27d796648b0327748263b7b78dfa6d728f0d7feaca719df3b74c0741740a350604173c9cb6f44ba5e68e34bd47a293856')
+validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger <daniel at roe.ch>
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 < "${srcdir}/no-ssl3.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  make
+}
+
+check() {
+  cd ${pkgname}-${pkgver}
+  make -j1 test
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make PREFIX="${pkgdir}/usr" install
+  install -Dm 644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+  install -Dm 644 README.md "${pkgdir}/usr/share/doc/${pkgname}/README.md"
+  install -Dm 644 NEWS.md "${pkgdir}/usr/share/doc/${pkgname}/NEWS.md"
+}
+
+# vim: ts=2 sw=2 et:

Copied: sslsplit/repos/community-staging-i686/no-ssl3.patch (from rev 164265, sslsplit/trunk/no-ssl3.patch)
===================================================================
--- community-staging-i686/no-ssl3.patch	                        (rev 0)
+++ community-staging-i686/no-ssl3.patch	2016-03-03 00:07:03 UTC (rev 164266)
@@ -0,0 +1,66 @@
+From: Hilko Bengen <bengen at debian.org>
+Date: Sun, 22 Nov 2015 14:25:42 +0100
+Subject: Use OPENSSL_NO_SSL3_METHOD to determine whether SSLv3_method is
+ available
+
+As suggested by Kurt Roeckx
+---
+ opts.c | 16 ++++++++--------
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/opts.c b/opts.c
+index 0189af8..f23b357 100644
+--- a/opts.c
++++ b/opts.c
+@@ -143,11 +143,11 @@ opts_proto_force(opts_t *opts, const char *optarg, const char *argv0)
+ 		opts->sslmethod = SSLv2_method;
+ 	} else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	if (!strcmp(optarg, "ssl3")) {
+ 		opts->sslmethod = SSLv3_method;
+ 	} else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+ 		opts->sslmethod = TLSv1_method;
+@@ -182,11 +182,11 @@ opts_proto_disable(opts_t *opts, const char *optarg, const char *argv0)
+ 		opts->no_ssl2 = 1;
+ 	} else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	if (!strcmp(optarg, "ssl3")) {
+ 		opts->no_ssl3 = 1;
+ 	} else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+ 		opts->no_tls10 = 1;
+@@ -219,9 +219,9 @@ opts_proto_dbg_dump(opts_t *opts)
+ #if defined(SSL_OP_NO_SSLv2) && defined(WITH_SSLV2)
+ 	               (opts->sslmethod == SSLv2_method) ? "nossl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	               (opts->sslmethod == SSLv3_method) ? "ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	               (opts->sslmethod == TLSv1_method) ? "tls10" :
+ #endif /* SSL_OP_NO_TLSv1 */
+@@ -236,9 +236,9 @@ opts_proto_dbg_dump(opts_t *opts)
+ 	               opts->no_ssl2 ? " -ssl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+ 	               "",
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	               opts->no_ssl3 ? " -ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ 	               "",
+ #ifdef SSL_OP_NO_TLSv1
+ 	               opts->no_tls10 ? " -tls10" :

Copied: sslsplit/repos/community-staging-x86_64/PKGBUILD (from rev 164265, sslsplit/trunk/PKGBUILD)
===================================================================
--- community-staging-x86_64/PKGBUILD	                        (rev 0)
+++ community-staging-x86_64/PKGBUILD	2016-03-03 00:07:03 UTC (rev 164266)
@@ -0,0 +1,42 @@
+# Maintainer: Levente Polyak <anthraxx[at]archlinux[dot]org>
+
+pkgname=sslsplit
+pkgver=0.4.11
+pkgrel=4
+pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections"
+url="https://www.roe.ch/SSLsplit"
+arch=('i686' 'x86_64')
+license=('BSD')
+depends=('libevent' 'openssl')
+checkdepends=('check')
+source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}
+        no-ssl3.patch)
+sha512sums=('c3339b4d22eb8f94ad1bc161b2c2d9efcb2f2828985712a5580437077f4c0bd74657d42274c4a9118c92721b9bd1d8150cf83d89afef6144b20aba497ac1d69a'
+            'SKIP'
+            '0c80471a881d29d285385e00dc1d36d27d796648b0327748263b7b78dfa6d728f0d7feaca719df3b74c0741740a350604173c9cb6f44ba5e68e34bd47a293856')
+validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger <daniel at roe.ch>
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -p1 < "${srcdir}/no-ssl3.patch"
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  make
+}
+
+check() {
+  cd ${pkgname}-${pkgver}
+  make -j1 test
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make PREFIX="${pkgdir}/usr" install
+  install -Dm 644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE"
+  install -Dm 644 README.md "${pkgdir}/usr/share/doc/${pkgname}/README.md"
+  install -Dm 644 NEWS.md "${pkgdir}/usr/share/doc/${pkgname}/NEWS.md"
+}
+
+# vim: ts=2 sw=2 et:

Copied: sslsplit/repos/community-staging-x86_64/no-ssl3.patch (from rev 164265, sslsplit/trunk/no-ssl3.patch)
===================================================================
--- community-staging-x86_64/no-ssl3.patch	                        (rev 0)
+++ community-staging-x86_64/no-ssl3.patch	2016-03-03 00:07:03 UTC (rev 164266)
@@ -0,0 +1,66 @@
+From: Hilko Bengen <bengen at debian.org>
+Date: Sun, 22 Nov 2015 14:25:42 +0100
+Subject: Use OPENSSL_NO_SSL3_METHOD to determine whether SSLv3_method is
+ available
+
+As suggested by Kurt Roeckx
+---
+ opts.c | 16 ++++++++--------
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/opts.c b/opts.c
+index 0189af8..f23b357 100644
+--- a/opts.c
++++ b/opts.c
+@@ -143,11 +143,11 @@ opts_proto_force(opts_t *opts, const char *optarg, const char *argv0)
+ 		opts->sslmethod = SSLv2_method;
+ 	} else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	if (!strcmp(optarg, "ssl3")) {
+ 		opts->sslmethod = SSLv3_method;
+ 	} else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+ 		opts->sslmethod = TLSv1_method;
+@@ -182,11 +182,11 @@ opts_proto_disable(opts_t *opts, const char *optarg, const char *argv0)
+ 		opts->no_ssl2 = 1;
+ 	} else
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	if (!strcmp(optarg, "ssl3")) {
+ 		opts->no_ssl3 = 1;
+ 	} else
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	if (!strcmp(optarg, "tls10") || !strcmp(optarg, "tls1")) {
+ 		opts->no_tls10 = 1;
+@@ -219,9 +219,9 @@ opts_proto_dbg_dump(opts_t *opts)
+ #if defined(SSL_OP_NO_SSLv2) && defined(WITH_SSLV2)
+ 	               (opts->sslmethod == SSLv2_method) ? "nossl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	               (opts->sslmethod == SSLv3_method) ? "ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ #ifdef SSL_OP_NO_TLSv1
+ 	               (opts->sslmethod == TLSv1_method) ? "tls10" :
+ #endif /* SSL_OP_NO_TLSv1 */
+@@ -236,9 +236,9 @@ opts_proto_dbg_dump(opts_t *opts)
+ 	               opts->no_ssl2 ? " -ssl2" :
+ #endif /* SSL_OP_NO_SSLv2 && WITH_SSLV2 */
+ 	               "",
+-#ifdef SSL_OP_NO_SSLv3
++#ifndef OPENSSL_NO_SSL3_METHOD
+ 	               opts->no_ssl3 ? " -ssl3" :
+-#endif /* SSL_OP_NO_SSLv3 */
++#endif /* OPENSSL_NO_SSL3_METHOD */
+ 	               "",
+ #ifdef SSL_OP_NO_TLSv1
+ 	               opts->no_tls10 ? " -tls10" :



More information about the arch-commits mailing list