[arch-commits] Commit in tcpflow/repos (3 files)

Evangelos Foutras foutrelis at archlinux.org
Fri Nov 9 21:27:05 UTC 2018


    Date: Friday, November 9, 2018 @ 21:27:04
  Author: foutrelis
Revision: 404637

archrelease: copy trunk to community-staging-x86_64

Added:
  tcpflow/repos/community-staging-x86_64/
  tcpflow/repos/community-staging-x86_64/PKGBUILD
    (from rev 404636, tcpflow/trunk/PKGBUILD)
  tcpflow/repos/community-staging-x86_64/tcpflow-openssl-1.1.patch
    (from rev 404636, tcpflow/trunk/tcpflow-openssl-1.1.patch)

---------------------------+
 PKGBUILD                  |   49 ++++++++++++++++++++++++++++++++
 tcpflow-openssl-1.1.patch |   67 ++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 116 insertions(+)

Copied: tcpflow/repos/community-staging-x86_64/PKGBUILD (from rev 404636, tcpflow/trunk/PKGBUILD)
===================================================================
--- community-staging-x86_64/PKGBUILD	                        (rev 0)
+++ community-staging-x86_64/PKGBUILD	2018-11-09 21:27:04 UTC (rev 404637)
@@ -0,0 +1,49 @@
+# Maintainer: Felix Yan <felixonmars at archlinux.org>
+# Contributor: Chris Brannon <cmbrannon79 at gmail.com>
+# Contributor: Jeff Mickey <jeff at archlinux.org>
+
+pkgname=tcpflow
+pkgver=1.4.5
+pkgrel=4
+pkgdesc="Captures data transmitted as part of TCP connections then stores the data conveniently"
+arch=('x86_64')
+url="https://github.com/simsong/tcpflow"
+license=('GPL')
+depends=('libpcap' 'cairo' 'openssl' 'sqlite')
+makedepends=('git' 'boost')
+source=("git+https://github.com/simsong/$pkgname.git#tag=$pkgname-$pkgver"
+        'git+https://github.com/simsong/be13_api.git'
+        'git+https://github.com/simsong/dfxml.git'
+        'git+https://github.com/joyent/http-parser.git'
+        tcpflow-openssl-1.1.patch)
+md5sums=('SKIP'
+         'SKIP'
+         'SKIP'
+         'SKIP'
+         'bd2f6fd8df59a0e93fde5fcb8098398a')
+
+prepare() {
+  cd $pkgname
+  git submodule init
+  git config submodule."src/be13_api".url "$srcdir/be13_api"
+  git config submodule."src/dfxml".url "$srcdir/dfxml"
+  git config submodule."src/http-parser".url "$srcdir/http-parser"
+  git submodule update
+
+ # Fix build with openssl 1.1
+  patch -p1 -i ../tcpflow-openssl-1.1.patch
+  autoreconf -vi
+}
+
+build() {
+  cd $pkgname
+  sh bootstrap.sh
+  ./configure --prefix=/usr --mandir=/usr/share/man
+  make
+}
+
+package() {
+  cd $pkgname
+  make DESTDIR="$pkgdir" install
+}
+

Copied: tcpflow/repos/community-staging-x86_64/tcpflow-openssl-1.1.patch (from rev 404636, tcpflow/trunk/tcpflow-openssl-1.1.patch)
===================================================================
--- community-staging-x86_64/tcpflow-openssl-1.1.patch	                        (rev 0)
+++ community-staging-x86_64/tcpflow-openssl-1.1.patch	2018-11-09 21:27:04 UTC (rev 404637)
@@ -0,0 +1,67 @@
+--- tcpflow/configure.ac.orig	2017-03-07 07:59:04.852848391 +0000
++++ tcpflow/configure.ac	2017-03-07 07:59:22.136158400 +0000
+@@ -214,7 +214,7 @@
+ AC_CHECK_LIB([dl],[dlopen])                   dnl apparently OpenSSL now needs -ldl on some Linux
+ AC_CHECK_LIB([crypto],[EVP_get_digestbyname])	# if crypto is available, get it
+ AC_CHECK_LIB([md],[MD5])                        # if libmd is available, get it 
+-AC_CHECK_LIB([ssl],[SSL_library_init],,
++AC_CHECK_LIB([ssl],[SSL_CTX_new],,
+      AC_MSG_ERROR([OpenSSL developer library 'libssl-dev' or 'openssl-devel' not installed]))
+ AC_CHECK_FUNCS([MD5_Init EVP_get_digestbyname])
+ 
+--- tcpflow.orig/src/dfxml/src/hash_t.h
++++ tcpflow/src/dfxml/src/hash_t.h
+@@ -189,7 +189,7 @@ inline std::string digest_name<sha512_t>
+ 
+ template<const EVP_MD *md(),size_t SIZE> 
+ class hash_generator__ { 			/* generates the hash */
+-    EVP_MD_CTX mdctx;	     /* the context for computing the value */
++    EVP_MD_CTX* mdctx;	     /* the context for computing the value */
+     bool initialized;	       /* has the context been initialized? */
+     bool finalized;
+     /* Static function to determine if something is zero */
+@@ -202,21 +202,21 @@ class hash_generator__ { 			/* generates
+ public:
+     int64_t hashed_bytes;
+     /* This function takes advantage of the fact that different hash functions produce residues with different sizes */
+-    hash_generator__():mdctx(),initialized(false),finalized(false),hashed_bytes(0){ }
++    hash_generator__():mdctx(NULL),initialized(false),finalized(false),hashed_bytes(0){ }
+     ~hash_generator__(){
+ 	release();
+     }
+     void release(){			/* free allocated memory */
+ 	if(initialized){
+-	    EVP_MD_CTX_cleanup(&mdctx);
++	    EVP_MD_CTX_destroy(mdctx);
+ 	    initialized = false;
+ 	    hashed_bytes = 0;
+ 	}
+     }
+     void init(){
+ 	if(initialized==false){
+-	    EVP_MD_CTX_init(&mdctx);
+-	    EVP_DigestInit_ex(&mdctx, md(), NULL);
++	    mdctx = EVP_MD_CTX_create();
++	    EVP_DigestInit_ex(mdctx, md(), NULL);
+ 	    initialized = true;
+ 	    finalized = false;
+ 	    hashed_bytes = 0;
+@@ -228,7 +228,7 @@ public:
+ 	    std::cerr << "hashgen_t::update called after finalized\n";
+ 	    exit(1);
+ 	}
+-	EVP_DigestUpdate(&mdctx,buf,bufsize);
++	EVP_DigestUpdate(mdctx,buf,bufsize);
+ 	hashed_bytes += bufsize;
+     }
+     hash__<md,SIZE> final() {
+@@ -242,7 +242,7 @@ public:
+ 	}
+ 	hash__<md,SIZE> val;
+ 	unsigned int len = sizeof(val.digest);
+-	EVP_DigestFinal(&mdctx,val.digest,&len);
++	EVP_DigestFinal(mdctx,val.digest,&len);
+ 	finalized = true;
+ 	return val;
+     }
+



More information about the arch-commits mailing list