[arch-commits] Commit in tcpflow/repos (6 files)
Antonio Rojas
arojas at archlinux.org
Tue Mar 7 08:09:22 UTC 2017
Date: Tuesday, March 7, 2017 @ 08:09:22
Author: arojas
Revision: 215223
archrelease: copy trunk to community-staging-i686, community-staging-x86_64
Added:
tcpflow/repos/community-staging-i686/
tcpflow/repos/community-staging-i686/PKGBUILD
(from rev 215222, tcpflow/trunk/PKGBUILD)
tcpflow/repos/community-staging-i686/tcpflow-openssl-1.1.patch
(from rev 215222, tcpflow/trunk/tcpflow-openssl-1.1.patch)
tcpflow/repos/community-staging-x86_64/
tcpflow/repos/community-staging-x86_64/PKGBUILD
(from rev 215222, tcpflow/trunk/PKGBUILD)
tcpflow/repos/community-staging-x86_64/tcpflow-openssl-1.1.patch
(from rev 215222, tcpflow/trunk/tcpflow-openssl-1.1.patch)
----------------------------------------------------+
community-staging-i686/PKGBUILD | 50 ++++++++++++++
community-staging-i686/tcpflow-openssl-1.1.patch | 67 +++++++++++++++++++
community-staging-x86_64/PKGBUILD | 50 ++++++++++++++
community-staging-x86_64/tcpflow-openssl-1.1.patch | 67 +++++++++++++++++++
4 files changed, 234 insertions(+)
Copied: tcpflow/repos/community-staging-i686/PKGBUILD (from rev 215222, tcpflow/trunk/PKGBUILD)
===================================================================
--- community-staging-i686/PKGBUILD (rev 0)
+++ community-staging-i686/PKGBUILD 2017-03-07 08:09:22 UTC (rev 215223)
@@ -0,0 +1,50 @@
+# $Id$
+# Maintainer: Felix Yan <felixonmars at archlinux.org>
+# Contributor: Chris Brannon <cmbrannon79 at gmail.com>
+# Contributor: Jeff Mickey <jeff at archlinux.org>
+
+pkgname=tcpflow
+pkgver=1.4.5
+pkgrel=3
+pkgdesc="Captures data transmitted as part of TCP connections then stores the data conveniently"
+arch=('i686' 'x86_64')
+url="https://github.com/simsong/tcpflow"
+license=('GPL')
+depends=('libpcap' 'cairo' 'openssl' 'sqlite')
+makedepends=('git' 'boost')
+source=("git+https://github.com/simsong/$pkgname.git#tag=$pkgname-$pkgver"
+ 'git+https://github.com/simsong/be13_api.git'
+ 'git+https://github.com/simsong/dfxml.git'
+ 'git+https://github.com/joyent/http-parser.git'
+ tcpflow-openssl-1.1.patch)
+md5sums=('SKIP'
+ 'SKIP'
+ 'SKIP'
+ 'SKIP'
+ 'bd2f6fd8df59a0e93fde5fcb8098398a')
+
+prepare() {
+ cd $pkgname
+ git submodule init
+ git config submodule."src/be13_api".url "$srcdir/be13_api"
+ git config submodule."src/dfxml".url "$srcdir/dfxml"
+ git config submodule."src/http-parser".url "$srcdir/http-parser"
+ git submodule update
+
+ # Fix build with openssl 1.1
+ patch -p1 -i ../tcpflow-openssl-1.1.patch
+ autoreconf -vi
+}
+
+build() {
+ cd $pkgname
+ sh bootstrap.sh
+ ./configure --prefix=/usr --mandir=/usr/share/man
+ make
+}
+
+package() {
+ cd $pkgname
+ make DESTDIR="$pkgdir" install
+}
+
Copied: tcpflow/repos/community-staging-i686/tcpflow-openssl-1.1.patch (from rev 215222, tcpflow/trunk/tcpflow-openssl-1.1.patch)
===================================================================
--- community-staging-i686/tcpflow-openssl-1.1.patch (rev 0)
+++ community-staging-i686/tcpflow-openssl-1.1.patch 2017-03-07 08:09:22 UTC (rev 215223)
@@ -0,0 +1,67 @@
+--- tcpflow/configure.ac.orig 2017-03-07 07:59:04.852848391 +0000
++++ tcpflow/configure.ac 2017-03-07 07:59:22.136158400 +0000
+@@ -214,7 +214,7 @@
+ AC_CHECK_LIB([dl],[dlopen]) dnl apparently OpenSSL now needs -ldl on some Linux
+ AC_CHECK_LIB([crypto],[EVP_get_digestbyname]) # if crypto is available, get it
+ AC_CHECK_LIB([md],[MD5]) # if libmd is available, get it
+-AC_CHECK_LIB([ssl],[SSL_library_init],,
++AC_CHECK_LIB([ssl],[SSL_CTX_new],,
+ AC_MSG_ERROR([OpenSSL developer library 'libssl-dev' or 'openssl-devel' not installed]))
+ AC_CHECK_FUNCS([MD5_Init EVP_get_digestbyname])
+
+--- tcpflow.orig/src/dfxml/src/hash_t.h
++++ tcpflow/src/dfxml/src/hash_t.h
+@@ -189,7 +189,7 @@ inline std::string digest_name<sha512_t>
+
+ template<const EVP_MD *md(),size_t SIZE>
+ class hash_generator__ { /* generates the hash */
+- EVP_MD_CTX mdctx; /* the context for computing the value */
++ EVP_MD_CTX* mdctx; /* the context for computing the value */
+ bool initialized; /* has the context been initialized? */
+ bool finalized;
+ /* Static function to determine if something is zero */
+@@ -202,21 +202,21 @@ class hash_generator__ { /* generates
+ public:
+ int64_t hashed_bytes;
+ /* This function takes advantage of the fact that different hash functions produce residues with different sizes */
+- hash_generator__():mdctx(),initialized(false),finalized(false),hashed_bytes(0){ }
++ hash_generator__():mdctx(NULL),initialized(false),finalized(false),hashed_bytes(0){ }
+ ~hash_generator__(){
+ release();
+ }
+ void release(){ /* free allocated memory */
+ if(initialized){
+- EVP_MD_CTX_cleanup(&mdctx);
++ EVP_MD_CTX_destroy(mdctx);
+ initialized = false;
+ hashed_bytes = 0;
+ }
+ }
+ void init(){
+ if(initialized==false){
+- EVP_MD_CTX_init(&mdctx);
+- EVP_DigestInit_ex(&mdctx, md(), NULL);
++ mdctx = EVP_MD_CTX_create();
++ EVP_DigestInit_ex(mdctx, md(), NULL);
+ initialized = true;
+ finalized = false;
+ hashed_bytes = 0;
+@@ -228,7 +228,7 @@ public:
+ std::cerr << "hashgen_t::update called after finalized\n";
+ exit(1);
+ }
+- EVP_DigestUpdate(&mdctx,buf,bufsize);
++ EVP_DigestUpdate(mdctx,buf,bufsize);
+ hashed_bytes += bufsize;
+ }
+ hash__<md,SIZE> final() {
+@@ -242,7 +242,7 @@ public:
+ }
+ hash__<md,SIZE> val;
+ unsigned int len = sizeof(val.digest);
+- EVP_DigestFinal(&mdctx,val.digest,&len);
++ EVP_DigestFinal(mdctx,val.digest,&len);
+ finalized = true;
+ return val;
+ }
+
Copied: tcpflow/repos/community-staging-x86_64/PKGBUILD (from rev 215222, tcpflow/trunk/PKGBUILD)
===================================================================
--- community-staging-x86_64/PKGBUILD (rev 0)
+++ community-staging-x86_64/PKGBUILD 2017-03-07 08:09:22 UTC (rev 215223)
@@ -0,0 +1,50 @@
+# $Id$
+# Maintainer: Felix Yan <felixonmars at archlinux.org>
+# Contributor: Chris Brannon <cmbrannon79 at gmail.com>
+# Contributor: Jeff Mickey <jeff at archlinux.org>
+
+pkgname=tcpflow
+pkgver=1.4.5
+pkgrel=3
+pkgdesc="Captures data transmitted as part of TCP connections then stores the data conveniently"
+arch=('i686' 'x86_64')
+url="https://github.com/simsong/tcpflow"
+license=('GPL')
+depends=('libpcap' 'cairo' 'openssl' 'sqlite')
+makedepends=('git' 'boost')
+source=("git+https://github.com/simsong/$pkgname.git#tag=$pkgname-$pkgver"
+ 'git+https://github.com/simsong/be13_api.git'
+ 'git+https://github.com/simsong/dfxml.git'
+ 'git+https://github.com/joyent/http-parser.git'
+ tcpflow-openssl-1.1.patch)
+md5sums=('SKIP'
+ 'SKIP'
+ 'SKIP'
+ 'SKIP'
+ 'bd2f6fd8df59a0e93fde5fcb8098398a')
+
+prepare() {
+ cd $pkgname
+ git submodule init
+ git config submodule."src/be13_api".url "$srcdir/be13_api"
+ git config submodule."src/dfxml".url "$srcdir/dfxml"
+ git config submodule."src/http-parser".url "$srcdir/http-parser"
+ git submodule update
+
+ # Fix build with openssl 1.1
+ patch -p1 -i ../tcpflow-openssl-1.1.patch
+ autoreconf -vi
+}
+
+build() {
+ cd $pkgname
+ sh bootstrap.sh
+ ./configure --prefix=/usr --mandir=/usr/share/man
+ make
+}
+
+package() {
+ cd $pkgname
+ make DESTDIR="$pkgdir" install
+}
+
Copied: tcpflow/repos/community-staging-x86_64/tcpflow-openssl-1.1.patch (from rev 215222, tcpflow/trunk/tcpflow-openssl-1.1.patch)
===================================================================
--- community-staging-x86_64/tcpflow-openssl-1.1.patch (rev 0)
+++ community-staging-x86_64/tcpflow-openssl-1.1.patch 2017-03-07 08:09:22 UTC (rev 215223)
@@ -0,0 +1,67 @@
+--- tcpflow/configure.ac.orig 2017-03-07 07:59:04.852848391 +0000
++++ tcpflow/configure.ac 2017-03-07 07:59:22.136158400 +0000
+@@ -214,7 +214,7 @@
+ AC_CHECK_LIB([dl],[dlopen]) dnl apparently OpenSSL now needs -ldl on some Linux
+ AC_CHECK_LIB([crypto],[EVP_get_digestbyname]) # if crypto is available, get it
+ AC_CHECK_LIB([md],[MD5]) # if libmd is available, get it
+-AC_CHECK_LIB([ssl],[SSL_library_init],,
++AC_CHECK_LIB([ssl],[SSL_CTX_new],,
+ AC_MSG_ERROR([OpenSSL developer library 'libssl-dev' or 'openssl-devel' not installed]))
+ AC_CHECK_FUNCS([MD5_Init EVP_get_digestbyname])
+
+--- tcpflow.orig/src/dfxml/src/hash_t.h
++++ tcpflow/src/dfxml/src/hash_t.h
+@@ -189,7 +189,7 @@ inline std::string digest_name<sha512_t>
+
+ template<const EVP_MD *md(),size_t SIZE>
+ class hash_generator__ { /* generates the hash */
+- EVP_MD_CTX mdctx; /* the context for computing the value */
++ EVP_MD_CTX* mdctx; /* the context for computing the value */
+ bool initialized; /* has the context been initialized? */
+ bool finalized;
+ /* Static function to determine if something is zero */
+@@ -202,21 +202,21 @@ class hash_generator__ { /* generates
+ public:
+ int64_t hashed_bytes;
+ /* This function takes advantage of the fact that different hash functions produce residues with different sizes */
+- hash_generator__():mdctx(),initialized(false),finalized(false),hashed_bytes(0){ }
++ hash_generator__():mdctx(NULL),initialized(false),finalized(false),hashed_bytes(0){ }
+ ~hash_generator__(){
+ release();
+ }
+ void release(){ /* free allocated memory */
+ if(initialized){
+- EVP_MD_CTX_cleanup(&mdctx);
++ EVP_MD_CTX_destroy(mdctx);
+ initialized = false;
+ hashed_bytes = 0;
+ }
+ }
+ void init(){
+ if(initialized==false){
+- EVP_MD_CTX_init(&mdctx);
+- EVP_DigestInit_ex(&mdctx, md(), NULL);
++ mdctx = EVP_MD_CTX_create();
++ EVP_DigestInit_ex(mdctx, md(), NULL);
+ initialized = true;
+ finalized = false;
+ hashed_bytes = 0;
+@@ -228,7 +228,7 @@ public:
+ std::cerr << "hashgen_t::update called after finalized\n";
+ exit(1);
+ }
+- EVP_DigestUpdate(&mdctx,buf,bufsize);
++ EVP_DigestUpdate(mdctx,buf,bufsize);
+ hashed_bytes += bufsize;
+ }
+ hash__<md,SIZE> final() {
+@@ -242,7 +242,7 @@ public:
+ }
+ hash__<md,SIZE> val;
+ unsigned int len = sizeof(val.digest);
+- EVP_DigestFinal(&mdctx,val.digest,&len);
++ EVP_DigestFinal(mdctx,val.digest,&len);
+ finalized = true;
+ return val;
+ }
+
More information about the arch-commits
mailing list