diff options
author | 2015-08-08 13:49:04 -0700 | |
---|---|---|
committer | 2015-08-08 17:38:18 -0700 | |
commit | 56bd759df1d0c750a065b8c845e93d5dfa6b549d (patch) | |
tree | 3f91093cdb475e565ae857f1c5a7fd339e2d781e /net-analyzer/sslsniff | |
download | gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.gz gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.bz2 gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.zip |
proj/gentoo: Initial commit
This commit represents a new era for Gentoo:
Storing the gentoo-x86 tree in Git, as converted from CVS.
This commit is the start of the NEW history.
Any historical data is intended to be grafted onto this point.
Creation process:
1. Take final CVS checkout snapshot
2. Remove ALL ChangeLog* files
3. Transform all Manifests to thin
4. Remove empty Manifests
5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$
5.1. Do not touch files with -kb/-ko keyword flags.
Signed-off-by: Robin H. Johnson <robbat2@gentoo.org>
X-Thanks: Alec Warner <antarus@gentoo.org> - did the GSoC 2006 migration tests
X-Thanks: Robin H. Johnson <robbat2@gentoo.org> - infra guy, herding this project
X-Thanks: Nguyen Thai Ngoc Duy <pclouds@gentoo.org> - Former Gentoo developer, wrote Git features for the migration
X-Thanks: Brian Harring <ferringb@gentoo.org> - wrote much python to improve cvs2svn
X-Thanks: Rich Freeman <rich0@gentoo.org> - validation scripts
X-Thanks: Patrick Lauer <patrick@gentoo.org> - Gentoo dev, running new 2014 work in migration
X-Thanks: Michał Górny <mgorny@gentoo.org> - scripts, QA, nagging
X-Thanks: All of other Gentoo developers - many ideas and lots of paint on the bikeshed
Diffstat (limited to 'net-analyzer/sslsniff')
6 files changed, 147 insertions, 0 deletions
diff --git a/net-analyzer/sslsniff/Manifest b/net-analyzer/sslsniff/Manifest new file mode 100644 index 000000000000..9367a795fa5c --- /dev/null +++ b/net-analyzer/sslsniff/Manifest @@ -0,0 +1 @@ +DIST sslsniff-0.8.tar.gz 207858 SHA256 50b4283a3e80fa4b4f3f684c4e76348aba8e257cbaa85e4f4cb7a4062cf091d5 SHA512 4ac1bcff8f396d868b2381bc73bb0307022e9a7d5228c83722abde8d4d01e4c6273042763c1e003c8e60f606d60923a573122d33680f5d892b4ef7b62f02009f WHIRLPOOL d97d6cd55324f84353dad7f7defbb7b1e619acdf8df13b74f752198ad18ebcae1bddd0680f581bc66ebd8c0326cf4f09badc683ca0dc4ada2ed14f8351a10d57 diff --git a/net-analyzer/sslsniff/files/sslsniff-0.6-asneeded.patch b/net-analyzer/sslsniff/files/sslsniff-0.6-asneeded.patch new file mode 100644 index 000000000000..db629b3c4a25 --- /dev/null +++ b/net-analyzer/sslsniff/files/sslsniff-0.6-asneeded.patch @@ -0,0 +1,10 @@ +--- sslsniff-0.6.orig/Makefile.am 2009-08-04 03:48:58.000000000 +0200 ++++ sslsniff-0.6/Makefile.am 2009-12-06 20:39:02.066902985 +0100 +@@ -4,6 +4,6 @@ + + sslsniff_SOURCES = Bridge.hpp SSLConnectionManager.cpp FingerprintManager.hpp FirefoxAddonUpdater.hpp FirefoxUpdater.hpp HTTPSBridge.hpp Logger.hpp RawBridge.hpp SessionCache.hpp SSLBridge.hpp SSLConnectionManager.hpp sslsniff.hpp UpdateManager.hpp certificate/AuthorityCertificateManager.hpp certificate/Certificate.hpp certificate/CertificateManager.hpp certificate/TargetedCertificateManager.hpp http/HttpBridge.hpp http/HttpConnectionManager.hpp http/HttpHeaders.hpp http/OCSPDenier.hpp util/Destination.hpp util/Util.hpp FirefoxUpdater.cpp Logger.cpp SessionCache.cpp SSLBridge.cpp HTTPSBridge.cpp sslsniff.cpp FingerprintManager.cpp certificate/AuthorityCertificateManager.cpp certificate/TargetedCertificateManager.cpp certificate/CertificateManager.cpp http/HttpBridge.cpp http/HttpConnectionManager.cpp http/HttpHeaders.cpp UpdateManager.cpp http/OCSPDenier.cpp FirefoxAddonUpdater.cpp + +-sslsniff_LDFLAGS = -lssl -lboost_filesystem -lpthread -lboost_thread -llog4cpp ++sslsniff_LDADD = -lssl -lboost_filesystem -lpthread -lboost_thread -llog4cpp + + EXTRA_DIST = certs/wildcard IPSCACLASEA1.crt leafcert.pem updates/Darwin_Universal-gcc3.xml updates/Linux_x86-gcc3.xml updates/WINNT_x86-msvc.xml diff --git a/net-analyzer/sslsniff/files/sslsniff-0.8-fix-compatibility-with-boost-1.47-and-higher.patch b/net-analyzer/sslsniff/files/sslsniff-0.8-fix-compatibility-with-boost-1.47-and-higher.patch new file mode 100644 index 000000000000..eb0a052c7988 --- /dev/null +++ b/net-analyzer/sslsniff/files/sslsniff-0.8-fix-compatibility-with-boost-1.47-and-higher.patch @@ -0,0 +1,53 @@ +Index: sslsniff/SSLConnectionManager.cpp +=================================================================== +--- sslsniff.orig/SSLConnectionManager.cpp 2011-12-31 09:25:04.000000000 +0100 ++++ sslsniff/SSLConnectionManager.cpp 2011-12-31 09:26:14.394534948 +0100 +@@ -44,7 +44,7 @@ + } + + void SSLConnectionManager::acceptIncomingConnection() { +- boost::shared_ptr<ip::tcp::socket> socket(new ip::tcp::socket(acceptor.io_service())); ++ boost::shared_ptr<ip::tcp::socket> socket(new ip::tcp::socket(acceptor.get_io_service())); + + acceptor.async_accept(*socket, boost::bind(&SSLConnectionManager::handleClientConnection, + this, socket, placeholders::error)); +@@ -76,7 +76,7 @@ + ip::tcp::endpoint &destination) + + { +- Bridge::ptr bridge = RawBridge::create(clientSocket, destination, acceptor.io_service()); ++ Bridge::ptr bridge = RawBridge::create(clientSocket, destination, acceptor.get_io_service()); + bridge->shuttle(); + } + +@@ -134,7 +134,7 @@ + ip::tcp::endpoint &destination, + bool wildcardOK) + { +- ip::tcp::socket serverSocket(acceptor.io_service()); ++ ip::tcp::socket serverSocket(acceptor.get_io_service()); + boost::system::error_code error; + serverSocket.connect(destination, error); + +Index: sslsniff/http/HttpConnectionManager.cpp +=================================================================== +--- sslsniff.orig/http/HttpConnectionManager.cpp 2011-05-14 11:37:52.000000000 +0200 ++++ sslsniff/http/HttpConnectionManager.cpp 2011-12-31 09:26:28.442534999 +0100 +@@ -53,7 +53,7 @@ + } + + void HttpConnectionManager::acceptIncomingConnection() { +- boost::shared_ptr<ip::tcp::socket> socket(new ip::tcp::socket(acceptor_.io_service())); ++ boost::shared_ptr<ip::tcp::socket> socket(new ip::tcp::socket(acceptor_.get_io_service())); + + acceptor_.async_accept(*socket, boost::bind(&HttpConnectionManager::handleClientConnection, + this, socket, placeholders::error)); +@@ -63,7 +63,7 @@ + void HttpConnectionManager::bridgeHttpRequest(boost::shared_ptr<ip::tcp::socket> socket, + ip::tcp::endpoint destination) + { +- Bridge::ptr bridge = HttpBridge::create(socket, acceptor_.io_service(), ++ Bridge::ptr bridge = HttpBridge::create(socket, acceptor_.get_io_service(), + FingerprintManager::getInstance()); + + bridge->getServerSocket(). diff --git a/net-analyzer/sslsniff/files/sslsniff-0.8-underlinking.patch b/net-analyzer/sslsniff/files/sslsniff-0.8-underlinking.patch new file mode 100644 index 000000000000..049ee5f293a0 --- /dev/null +++ b/net-analyzer/sslsniff/files/sslsniff-0.8-underlinking.patch @@ -0,0 +1,21 @@ +--- a/configure.ac ++++ b/configure.ac +@@ -16,7 +16,7 @@ + AC_CHECK_HEADER([boost/thread.hpp], + [], + AC_MSG_ERROR([libboost-thread1.35-dev library is not installed.])) +-AC_CHECK_HEADER([openssl/ssl.h], ++PKG_CHECK_MODULES(openssl,openssl, + [], + AC_MSG_ERROR([openssl (libssl-dev) library not installed.])) + AC_OUTPUT(Makefile) +--- a/Makefile.am ++++ b/Makefile.am +@@ -4,6 +4,6 @@ + + sslsniff_SOURCES = Bridge.hpp SSLConnectionManager.cpp FingerprintManager.hpp FirefoxAddonUpdater.hpp FirefoxUpdater.hpp HTTPSBridge.hpp Logger.hpp RawBridge.hpp SessionCache.hpp SSLBridge.hpp SSLConnectionManager.hpp sslsniff.hpp UpdateManager.hpp certificate/AuthorityCertificateManager.hpp certificate/Certificate.hpp certificate/CertificateManager.hpp certificate/TargetedCertificateManager.hpp http/HttpBridge.hpp http/HttpConnectionManager.hpp http/HttpHeaders.hpp http/OCSPDenier.hpp util/Destination.cpp util/Destination.hpp util/Util.hpp FirefoxUpdater.cpp Logger.cpp SessionCache.cpp SSLBridge.cpp HTTPSBridge.cpp sslsniff.cpp FingerprintManager.cpp certificate/AuthorityCertificateManager.cpp certificate/TargetedCertificateManager.cpp certificate/CertificateManager.cpp http/HttpBridge.cpp http/HttpConnectionManager.cpp http/HttpHeaders.cpp UpdateManager.cpp http/OCSPDenier.cpp FirefoxAddonUpdater.cpp + +-sslsniff_LDADD = -lssl -lboost_filesystem -lpthread -lboost_thread -llog4cpp ++sslsniff_LDADD = $(openssl_LIBS) -lboost_system -lboost_filesystem -lpthread -lboost_thread -llog4cpp + + EXTRA_DIST = certs/wildcard IPSCACLASEA1.crt leafcert.pem updates/Darwin_Universal-gcc3.xml updates/Linux_x86-gcc3.xml updates/WINNT_x86-msvc.xml diff --git a/net-analyzer/sslsniff/metadata.xml b/net-analyzer/sslsniff/metadata.xml new file mode 100644 index 000000000000..ac4283867e48 --- /dev/null +++ b/net-analyzer/sslsniff/metadata.xml @@ -0,0 +1,15 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<maintainer> + <email>robbat2@gentoo.org</email> +</maintainer> +<maintainer> + <email>prometheanfire@gentoo.org</email> +</maintainer> +<maintainer> + <email>zerochaos@gentoo.org</email> + <name>Rick Farina</name> + <description>co-maintainer</description> +</maintainer> +</pkgmetadata> diff --git a/net-analyzer/sslsniff/sslsniff-0.8-r1.ebuild b/net-analyzer/sslsniff/sslsniff-0.8-r1.ebuild new file mode 100644 index 000000000000..90d7c8a83fa6 --- /dev/null +++ b/net-analyzer/sslsniff/sslsniff-0.8-r1.ebuild @@ -0,0 +1,47 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=5 +PYTHON_DEPEND="2" + +inherit autotools eutils + +DESCRIPTION="MITM all SSL connections on a LAN and dynamically generates certs" +HOMEPAGE="http://thoughtcrime.org/software/sslsniff/" +SRC_URI="http://thoughtcrime.org/software/sslsniff/${P}.tar.gz" + +LICENSE="GPL-3" # plus OpenSSL exception +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="" + +DEPEND="dev-libs/boost:= + dev-libs/log4cpp + dev-libs/openssl" +RDEPEND="${DEPEND}" + +src_prepare() { + epatch "${FILESDIR}"/${PN}-0.6-asneeded.patch + + #stolen from http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652756 + epatch \ + "${FILESDIR}"/${P}-fix-compatibility-with-boost-1.47-and-higher.patch \ + "${FILESDIR}"/${P}-underlinking.patch + + eautoreconf +} + +src_install() { + emake DESTDIR="${D}" install || die + dodoc AUTHORS README + + insinto /usr/share/sslsniff + doins leafcert.pem IPSCACLASEA1.crt + + insinto /usr/share/sslsniff/updates + doins updates/*xml + + insinto /usr/share/sslsniff/certs + doins certs/* +} |