head 1.10; access; symbols pkgsrc-2015Q3:1.9.0.10 pkgsrc-2015Q3-base:1.9 pkgsrc-2015Q2:1.9.0.8 pkgsrc-2015Q2-base:1.9 pkgsrc-2015Q1:1.9.0.6 pkgsrc-2015Q1-base:1.9 pkgsrc-2014Q4:1.9.0.4 pkgsrc-2014Q4-base:1.9 pkgsrc-2014Q3:1.9.0.2 pkgsrc-2014Q3-base:1.9 pkgsrc-2014Q2:1.8.0.2 pkgsrc-2014Q2-base:1.8 pkgsrc-2014Q1:1.7.0.38 pkgsrc-2014Q1-base:1.7 pkgsrc-2013Q4:1.7.0.36 pkgsrc-2013Q4-base:1.7 pkgsrc-2013Q3:1.7.0.34 pkgsrc-2013Q3-base:1.7 pkgsrc-2013Q2:1.7.0.32 pkgsrc-2013Q2-base:1.7 pkgsrc-2013Q1:1.7.0.30 pkgsrc-2013Q1-base:1.7 pkgsrc-2012Q4:1.7.0.28 pkgsrc-2012Q4-base:1.7 pkgsrc-2012Q3:1.7.0.26 pkgsrc-2012Q3-base:1.7 pkgsrc-2012Q2:1.7.0.24 pkgsrc-2012Q2-base:1.7 pkgsrc-2012Q1:1.7.0.22 pkgsrc-2012Q1-base:1.7 pkgsrc-2011Q4:1.7.0.20 pkgsrc-2011Q4-base:1.7 pkgsrc-2011Q3:1.7.0.18 pkgsrc-2011Q3-base:1.7 pkgsrc-2011Q2:1.7.0.16 pkgsrc-2011Q2-base:1.7 pkgsrc-2011Q1:1.7.0.14 pkgsrc-2011Q1-base:1.7 pkgsrc-2010Q4:1.7.0.12 pkgsrc-2010Q4-base:1.7 pkgsrc-2010Q3:1.7.0.10 pkgsrc-2010Q3-base:1.7 pkgsrc-2010Q2:1.7.0.8 pkgsrc-2010Q2-base:1.7 pkgsrc-2010Q1:1.7.0.6 pkgsrc-2010Q1-base:1.7 pkgsrc-2009Q4:1.7.0.4 pkgsrc-2009Q4-base:1.7 pkgsrc-2009Q3:1.7.0.2 pkgsrc-2009Q3-base:1.7 pkgsrc-2008Q4:1.6.0.8 pkgsrc-2008Q4-base:1.6 pkgsrc-2008Q3:1.6.0.6 pkgsrc-2008Q3-base:1.6 cube-native-xorg:1.6.0.4 cube-native-xorg-base:1.6 pkgsrc-2008Q2:1.6.0.2 pkgsrc-2008Q2-base:1.6 pkgsrc-2008Q1:1.5.0.12 pkgsrc-2008Q1-base:1.5 pkgsrc-2007Q4:1.5.0.10 pkgsrc-2007Q4-base:1.5 pkgsrc-2007Q3:1.5.0.8 pkgsrc-2007Q3-base:1.5 pkgsrc-2007Q2:1.5.0.6 pkgsrc-2007Q2-base:1.5 pkgsrc-2007Q1:1.5.0.4 pkgsrc-2007Q1-base:1.5 pkgsrc-2006Q4:1.5.0.2 pkgsrc-2006Q4-base:1.5 pkgsrc-2006Q3:1.4.0.24 pkgsrc-2006Q3-base:1.4 pkgsrc-2006Q2:1.4.0.22 pkgsrc-2006Q2-base:1.4 pkgsrc-2006Q1:1.4.0.20 pkgsrc-2006Q1-base:1.4 pkgsrc-2005Q4:1.4.0.18 pkgsrc-2005Q4-base:1.4 pkgsrc-2005Q3:1.4.0.16 pkgsrc-2005Q3-base:1.4 pkgsrc-2005Q2:1.4.0.14 pkgsrc-2005Q2-base:1.4 pkgsrc-2005Q1:1.4.0.12 pkgsrc-2005Q1-base:1.4 pkgsrc-2004Q4:1.4.0.10 pkgsrc-2004Q4-base:1.4 pkgsrc-2004Q3:1.4.0.8 pkgsrc-2004Q3-base:1.4 pkgsrc-2004Q2:1.4.0.6 pkgsrc-2004Q2-base:1.4 pkgsrc-2004Q1:1.4.0.4 pkgsrc-2004Q1-base:1.4 pkgsrc-2003Q4:1.4.0.2 pkgsrc-2003Q4-base:1.4 pkgviews:1.3.0.4 pkgviews-base:1.3 buildlink2:1.3.0.2 buildlink2-base:1.3 netbsd-1-5-PATCH003:1.3 netbsd-1-5-PATCH001:1.1 netbsd-1-5-RELEASE:1.1 netbsd-1-4-PATCH003:1.1; locks; strict; comment @# @; 1.10 date 2015.11.20.15.37.40; author adam; state dead; branches; next 1.9; commitid hWRJNoWNPxVeuQJy; 1.9 date 2014.09.05.11.51.41; author adam; state Exp; branches; next 1.8; commitid op1Z276UmGyBp9Px; 1.8 date 2014.06.07.23.12.16; author rodent; state Exp; branches; next 1.7; commitid Iix0mzCa8NKD4EDx; 1.7 date 2009.07.20.19.40.08; author adrianp; state Exp; branches; next 1.6; 1.6 date 2008.06.08.18.12.52; author adrianp; state dead; branches; next 1.5; 1.5 date 2006.10.11.19.23.53; author rillig; state Exp; branches; next 1.4; 1.4 date 2002.08.03.12.24.00; author hubertf; state dead; branches; next 1.3; 1.3 date 2001.08.24.11.23.16; author abs; state Exp; branches; next 1.2; 1.2 date 2001.08.24.11.05.36; author abs; state Exp; branches; next 1.1; 1.1 date 2000.10.08.15.06.09; author hubertf; state Exp; branches; next ; desc @@ 1.10 log @Changes 7.00: * Major Nmap Scripting Engine (NSE) Expansion * Mature IPv6 support * Infrastructure Upgrades * Faster Scans * SSL/TLS scanning solution of choice * Ncat Enhanced * Extreme Portability @ text @$NetBSD: patch-ac,v 1.9 2014/09/05 11:51:41 adam Exp $ Use PKGMANDIR. --- ndiff/setup.py.orig 2014-04-12 01:24:32.000000000 +0000 +++ ndiff/setup.py @@@@ -112,5 +112,5 @@@@ Installing your distribution's python-de distutils.core.setup(name=u"ndiff", scripts=[u"scripts/ndiff"], py_modules=[u"ndiff"], - data_files=[(u"share/man/man1", [u"docs/ndiff.1"])], + data_files=[(u"@@@@PKGMANDIR@@@@/man1", [u"docs/ndiff.1"])], cmdclass={"install_egg_info": null_command, "install": checked_install}) @ 1.9 log @Changes 6.47: o Integrated all of your IPv4 OS fingerprint submissions since June 2013 (2700+ of them). Added 366 fingerprints, bringing the new total to 4485. Additions include Linux 3.10 - 3.14, iOS 7, OpenBSD 5.4 - 5.5, FreeBSD 9.2, OS X 10.9, Android 4.3, and more. Many existing fingerprints were improved. Highlights: http://seclists.org/nmap-dev/2014/q3/325 o (Windows) Upgraded the included OpenSSL to version 1.0.1i. o (Windows) Upgraded the included Python to version 2.7.8. o Removed the External Entity Declaration from the DOCTYPE in Nmap's XML. This was added in 6.45, and resulted in trouble for Nmap XML parsers without network access, as well as increased traffic to Nmap's servers. The doctype is now: o [Ndiff] Fixed the installation process on Windows, which was missing the actual Ndiff Python module since we separated it from the driver script. o [Ndiff] Fixed the ndiff.bat wrapper in the zipfile Windows distribution, which was giving the error, "\Microsoft was unexpected at this time." See https://support.microsoft.com/kb/2524009 o [Zenmap] Fixed the Zenmap .dmg installer for OS X. Zenmap failed to launch, producing this error: Could not import the zenmapGUI.App module: 'dlopen(/Applications/Zenmap.app/Contents/Resources/lib/python2.6/lib-dynload/glib/_glib.so, 2): Library not loaded: /Users/david/macports-10.5/lib/libffi.5.dylib\n Referenced from: /Applications/Zenmap.app/Contents/Resources/lib/python2.6/lib-dynload/glib/_glib.so\n Reason: image not found'. o [Ncat] Fixed SOCKS5 username/password authentication. The password length was being written in the wrong place, so authentication could not succeed. o Avoid formatting NULL as "%s" when running nmap --iflist. GNU libc converts this to the string "(null)", but it caused segfault on Solaris. o [Zenmap][Ndiff] Avoid crashing when users have the antiquated PyXML package installed. Python tries to be nice and loads it when we import xml, but it isn't compatible. Instead, we force Python to use the standard library xml module. o Handle ICMP admin-prohibited messages when doing service version detection. Crash reported by Nathan Stocks was: Unexpected error in NSE_TYPE_READ callback. Error code: 101 (Network is unreachable) o [NSE] Fix a bug causing http.head to not honor redirects. o [Zenmap] Fix a bug in DiffViewer causing this crash: TypeError: GtkTextBuffer.set_text() argument 1 must be string or read-only buffer, not NmapParserSAX Crash happened when trying to compare two scans within Zenmap. @ text @d1 1 a1 1 $NetBSD$ @ 1.8 log @Fix build on OpenBSD. Defuzz patches. Problem reported to nmap-dev. @ text @d1 1 a1 1 $NetBSD: patch-ac,v 1.7 2009/07/20 19:40:08 adrianp Exp $ d3 3 a5 1 --- ndiff/setup.py.orig 2009-04-20 19:15:00.000000000 +0000 d7 1 a7 2 @@@@ -29,5 +29,5 @@@@ class checked_install(distutils.command. + "Installing your distribution's python-dev package may solve this problem.") d9 5 a13 4 distutils.core.setup(name = u"ndiff", scripts = [u"ndiff"], - data_files = [(u"share/man/man1", [u"docs/ndiff.1"])], + data_files = [(u"@@@@PKGMANDIR@@@@/man1", [u"docs/ndiff.1"])], cmdclass = {"install_egg_info": null_command, "install": checked_install}) @ 1.7 log @Update to 5.00 Fix for PR#41506 Fix missing @@dirrm entries from PLIST* Before we go into the detailed changes, here are the top 5 improvements in Nmap 5: 1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat. 2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer. 3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify. 4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition. 5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal. Details are here: http://nmap.org/changelog.html @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- ndiff/setup.py.orig 2009-06-24 22:35:54.000000000 +0100 @ 1.6 log @Update to 4.65 Take MAINTAINER (agreed with salo@@) o Updated to include the latest MAC Address prefixes from the IEEE in nmap-mac-prefixes [Fyodor] o NSE engine was cleaned up significantly. o Nmap now understands the RFC 4007 percent syntax for IPv6 Zone IDs. o Updated IANA assignment IP list for random IP (-iR) generation. [Kris] o NmapFE is now gone. (zenmap is the replacement) o Added the NSE library (NSELib) which is a library of useful functions (which can be implemented in LUA or as loadable C/C++ modules) for use by NSE scripts. o Integrated the Nmap Scripting Engine (NSE) into mainline Nmap. @ text @d1 1 a1 1 $NetBSD: patch-ac,v 1.5 2006/10/11 19:23:53 rillig Exp $ d3 4 a6 10 --- libpcre/configure.orig 2006-10-11 21:21:25.000000000 +0200 +++ libpcre/configure 2006-10-11 21:22:47.000000000 +0200 @@@@ -3450,7 +3450,7 @@@@ fi; # Check whether --enable-ebcdic or --disable-ebcdic was given. if test "${enable_ebcdic+set}" = set; then enableval="$enable_ebcdic" - if test "$enableval" == "yes"; then + if test "$enableval" = "yes"; then EBCDIC=-DEBCDIC=1 fi d8 4 @ 1.5 log @Fixed "test ==". @ text @d1 1 a1 1 $NetBSD$ @ 1.4 log @Update nmap to 3.00. Changes: * Added protocol scan (-sO), which determines what IP protocols (TCP, IGMP, GRE, UDP, ICMP, etc) are supported by a given host. This uses a clever technique designed and implemented by Gerhard Rieger . * Nmap now recognizes more than 700 operating system versions and network devices (printers, webcams, routers, etc) thanks to thousands of contributions from the user community! Many operating systems were even recognized by Nmap prior to their official release. Nmap3 also recognizes 2148 port assignments, 451 SunRPC services, and 144 IP protocols. * Added Idlescan (-sI), which bounces the scan off a "zombie" machine. This can be used to bypass certain (poorly configured) firewalls and packet filters. In addition, this is the most stealthy Nmap scan mode, as no packets are sent to the target from your true IP address. * The base Nmap package now builds and functions under Windows! It is distributed in three forms: build-it-yourself source code, a simple command-line package, or along with a nice GUI interface (NmapWin) and a fancy installer. This is due to the hard work of Ryan Permeh (from eEye), Andy Lutomirski, and Jens Vogt. * Mac OS X is now supported, as well as the latest versions of Linux, OpenBSD, Solaris, FreeBSD, and most other UNIX platforms. Nmap has also been ported to several handheld devices -- see the Related Projects page for further information. * XML output (-oX) is now available for smooth interoperability between Nmap and other tools. * Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. Nmap still allows TCP "ping" as well. * Nmap can now detect the uptime of many hosts when the OS Scan option (-O) is used. * Several new tests have been added to make OS detection more accurate and provide more granular version information. * Removed 128.210.*.* addresses from Nmap man page examples due to complaints from Purdue security staff. * The --data_length option was added, allowing for longer probe packets. Among other uses, this defeats certain simplistic IDS signatures. * You can now specify distinct port UDP and TCP port numbers in a single scan command using a command like 'nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com'. See the man page for more usage info. * Added mysterious, undocumented --scanflags and --fuzzy options. * Nmap now provides IPID as well as TCP ISN sequence predictability reports if you use -v and -O. * SYN scan is now the default scan type for privileged (root) users. This is usually offers greater performance while reducing network traffic. * Capitalized all references to God in error messages. * Added List scan (-sL) which enumerates targets without scanning them. * The Nmap "random IP" scanning mode is now smart enough to skip many unallocated netblocks. * Tons of more minor features, bugfixes, and portability enhancements. @ text @d1 1 a1 1 $NetBSD: patch-ac,v 1.3 2001/08/24 11:23:16 abs Exp $ d3 10 a12 9 --- libpcap-possiblymodified/bpf/net/bpf.h.orig Wed Oct 14 22:27:16 1998 +++ libpcap-possiblymodified/bpf/net/bpf.h @@@@ -52,7 +52,7 @@@@ * Alignment macros. BPF_WORDALIGN rounds up to the next * even multiple of BPF_ALIGNMENT. */ -#define BPF_ALIGNMENT sizeof(bpf_int32) +#define BPF_ALIGNMENT sizeof(long) #define BPF_WORDALIGN(x) (((x)+(BPF_ALIGNMENT-1))&~(BPF_ALIGNMENT-1)) a13 1 #define BPF_MAXINSNS 512 @ 1.3 log @Fix fo linux a different way - make more like NetBSD configuration and use net/libpcap. Also fix DEPENDS for Solaris and Linux @ text @d1 1 a1 1 $NetBSD$ @ 1.2 log @Rework NetBSD hack to not break Linux build @ text @@ 1.1 log @Fix nmap to work with our non-standard DLT_PPP_* values. Patches mostly by Itojun. @ text @d2 12 a13 6 --- configure- Sun Oct 8 23:15:09 2000 +++ configure Sun Oct 8 23:15:35 2000 @@@@ -1509,2 +1509,3 @@@@ int major, minor; + exit(0); /*fool it*/ sscanf(pcap_version,"%d.%d", &major, &minor); @