From owner-svn-ports-head@freebsd.org Mon Oct 29 19:12:30 2018 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B86C010E3569; Mon, 29 Oct 2018 19:12:29 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 660467E181; Mon, 29 Oct 2018 19:12:29 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 45E4D12921; Mon, 29 Oct 2018 19:12:29 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id w9TJCTIH085123; Mon, 29 Oct 2018 19:12:29 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id w9TJCSgL085121; Mon, 29 Oct 2018 19:12:28 GMT (envelope-from pi@FreeBSD.org) Message-Id: <201810291912.w9TJCSgL085121@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Mon, 29 Oct 2018 19:12:28 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r483399 - in head/net-mgmt/kismet: . files X-SVN-Group: ports-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/net-mgmt/kismet: . files X-SVN-Commit-Revision: 483399 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Oct 2018 19:12:30 -0000 Author: pi Date: Mon Oct 29 19:12:28 2018 New Revision: 483399 URL: https://svnweb.freebsd.org/changeset/ports/483399 Log: net-mgmt/kismet: fix build on 12 with OpenSSL 1.1.1 PR: 232140 Submitted by: Nathan Added: head/net-mgmt/kismet/files/extra-patch-restricted-plugin-ptw_aircrack-crypto.cc - copied, changed from r483398, head/net-mgmt/kismet/files/patch-restricted-plugin-ptw_aircrack-crypto.cc Deleted: head/net-mgmt/kismet/files/patch-restricted-plugin-ptw_aircrack-crypto.cc Modified: head/net-mgmt/kismet/Makefile Modified: head/net-mgmt/kismet/Makefile ============================================================================== --- head/net-mgmt/kismet/Makefile Mon Oct 29 18:45:50 2018 (r483398) +++ head/net-mgmt/kismet/Makefile Mon Oct 29 19:12:28 2018 (r483399) @@ -3,7 +3,7 @@ PORTNAME= kismet DISTVERSION= 2016-07-R1 -PORTREVISION= 1 +PORTREVISION= 2 PORTEPOCH= 1 CATEGORIES= net-mgmt MASTER_SITES= http://www.kismetwireless.net/code/ @@ -13,8 +13,9 @@ COMMENT= 802.11 layer2 wireless network detector, snif LICENSE= GPLv2 -GNU_CONFIGURE= yes USES= gmake tar:xz + +GNU_CONFIGURE= yes CPPFLAGS+= -I${LOCALBASE}/include LDFLAGS+= -L${LOCALBASE}/lib @@ -63,6 +64,12 @@ PLIST_SUB+= PLUGINS="" PLIST_SUB+= PLUGINS="@comment " .endif +.include + +.if ${OPSYS} == FreeBSD && ${OSVERSION} >= 1200000 +EXTRA_PATCHES=${FILESDIR}/extra-patch-restricted-plugin-ptw_aircrack-crypto.cc +.endif + post-patch: @${REINPLACE_CMD} -e "/gps=/s/true/false/" \ -e "/ouifile=/{/wireshark/d;s|/etc|${DOCSDIR}|;}" \ @@ -99,4 +106,4 @@ post-install: ${MV} ${STAGEDIR}${PREFIX}/etc/kismet_drone.conf \ ${STAGEDIR}${PREFIX}/etc/kismet_drone.conf.sample -.include +.include Copied and modified: head/net-mgmt/kismet/files/extra-patch-restricted-plugin-ptw_aircrack-crypto.cc (from r483398, head/net-mgmt/kismet/files/patch-restricted-plugin-ptw_aircrack-crypto.cc) ============================================================================== --- head/net-mgmt/kismet/files/patch-restricted-plugin-ptw_aircrack-crypto.cc Mon Oct 29 18:45:50 2018 (r483398, copy source) +++ head/net-mgmt/kismet/files/extra-patch-restricted-plugin-ptw_aircrack-crypto.cc Mon Oct 29 19:12:28 2018 (r483399) @@ -1,10 +1,66 @@ ---- restricted-plugin-ptw/aircrack-crypto.cc.orig 2016-07-02 18:06:10 UTC +--- restricted-plugin-ptw/aircrack-crypto.cc.orig 2018-10-10 00:29:38 UTC +++ restricted-plugin-ptw/aircrack-crypto.cc -@@ -21,6 +21,7 @@ - #include - #include - #include -+#include - #include "aircrack-crypto.h" - #include "aircrack-crctable.h" - #include "aircrack-ptw2-lib.h" +@@ -232,7 +232,7 @@ void calc_pmk( char *key, char *essid_pre, uchar pmk[4 + // void calc_ptk (struct WPA_hdsk *wpa, unsigned char bssid[6], unsigned char pmk[32], unsigned char ptk[80]) { + // int i; + // uchar pke[100]; +-// HMAC_CTX ctx; ++// HMAC_CTX *ctx; + // + // memcpy( pke, "Pairwise key expansion", 23 ); + // +@@ -258,23 +258,23 @@ void calc_pmk( char *key, char *essid_pre, uchar pmk[4 + // memcpy( pke + 67, wpa->snonce, 32 ); + // } + // +-// HMAC_CTX_init(&ctx); +-// HMAC_Init_ex(&ctx, pmk, 32, EVP_sha1(), NULL); ++// ctx = HMAC_CTX_new(); ++// HMAC_Init_ex(ctx, pmk, 32, EVP_sha1(), NULL); + // for(i = 0; i < 4; i++ ) + // { + // pke[99] = i; + // //HMAC(EVP_sha1(), values[0], 32, pke, 100, ptk + i * 20, NULL); +-// HMAC_Init_ex(&ctx, 0, 0, 0, 0); +-// HMAC_Update(&ctx, pke, 100); +-// HMAC_Final(&ctx, ptk + i*20, NULL); ++// HMAC_Init_ex(ctx, 0, 0, 0, 0); ++// HMAC_Update(ctx, pke, 100); ++// HMAC_Final(ctx, ptk + i*20, NULL); + // } +-// HMAC_CTX_cleanup(&ctx); ++// HMAC_CTX_free(ctx); + // } + + void calc_mic (struct AP_info *ap, unsigned char pmk[32], unsigned char ptk[80], unsigned char mic[20]) { + int i; + uchar pke[100]; +- HMAC_CTX ctx; ++ HMAC_CTX *ctx; + + memcpy( pke, "Pairwise key expansion", 23 ); + +@@ -300,17 +300,17 @@ void calc_mic (struct AP_info *ap, unsigned char pmk[3 + memcpy( pke + 67, ap->wpa.snonce, 32 ); + } + +- HMAC_CTX_init(&ctx); +- HMAC_Init_ex(&ctx, pmk, 32, EVP_sha1(), NULL); ++ ctx = HMAC_CTX_new(); ++ HMAC_Init_ex(ctx, pmk, 32, EVP_sha1(), NULL); + for(i = 0; i < 4; i++ ) + { + pke[99] = i; + //HMAC(EVP_sha1(), values[0], 32, pke, 100, ptk + i * 20, NULL); +- HMAC_Init_ex(&ctx, 0, 0, 0, 0); +- HMAC_Update(&ctx, pke, 100); +- HMAC_Final(&ctx, ptk + i*20, NULL); ++ HMAC_Init_ex(ctx, 0, 0, 0, 0); ++ HMAC_Update(ctx, pke, 100); ++ HMAC_Final(ctx, ptk + i*20, NULL); + } +- HMAC_CTX_cleanup(&ctx); ++ HMAC_CTX_free(ctx); + + if( ap->wpa.keyver == 1 ) + {