Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F110044972
D38725.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
6 KB
Referenced Files
None
Subscribers
None
D38725.diff
View Options
diff --git a/security/0d1n/Makefile b/security/0d1n/Makefile
--- a/security/0d1n/Makefile
+++ b/security/0d1n/Makefile
@@ -1,14 +1,16 @@
PORTNAME= 0d1n
-PORTVERSION= 3.8
+DISTVERSION= 3.8
+PORTREVISION= 1
CATEGORIES= security
MAINTAINER= zackj901@yandex.com
COMMENT= Open source web HTTP fuzzing tool and bruteforcer
WWW= https://github.com/CoolerVoid/0d1n
-LICENSE= GPLv3
-
-BROKEN= fails to build
+LICENSE= BSD3CLAUSE GPLv3
+LICENSE_COMB= dual
+LICENSE_FILE_BSD3CLAUSE= ${WRKSRC}/LICENSE
+LICENSE_FILE_GPLv3= ${WRKSRC}/LICENSE.txt
LIB_DEPENDS= libcurl.so:ftp/curl
@@ -16,14 +18,14 @@
GH_ACCOUNT= CoolerVoid
GH_TAGNAME= OdinV38
-PLIST_FILES= bin/0d1n
-PORTDOCS= README.txt
-
OPTIONS_DEFINE= DOCS
-post-patch:
- @${REINPLACE_CMD} -e '/^#include <alloca\.h>/d' \
- ${WRKSRC}/src/headers/spider.h ${WRKSRC}/src/headers/results.h
+pre-configure:
+ ${REINPLACE_CMD} -e 's,/opt/0d1n,${DATADIR},g' \
+ ${WRKSRC}/src/headers/file_ops.h \
+ ${WRKSRC}/src/file_ops.c \
+ ${WRKSRC}/src/opt_extract.c \
+ ${WRKSRC}/src/results.c
do-install:
${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${STAGEDIR}${PREFIX}/bin
diff --git a/security/0d1n/files/patch-0d1n__viewer_lib_krypton_krypton.c b/security/0d1n/files/patch-0d1n__viewer_lib_krypton_krypton.c
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-0d1n__viewer_lib_krypton_krypton.c
@@ -0,0 +1,14 @@
+--- 0d1n_viewer/lib/krypton/krypton.c.orig 2023-02-20 12:36:21 UTC
++++ 0d1n_viewer/lib/krypton/krypton.c
+@@ -112,11 +112,6 @@ typedef struct {
+ #define NS_INTERNAL
+ #endif
+
+-/* C99 and later requires alloca.h. */
+-#if defined(__STDC_VERSION__) && __STDC_VERSION__ > 199900L
+-#include <alloca.h>
+-#endif
+-
+ #include <assert.h>
+ #include <ctype.h>
+ #include <errno.h>
diff --git a/security/0d1n/files/patch-0d1n__viewer_lib_krypton_src_ktypes.h b/security/0d1n/files/patch-0d1n__viewer_lib_krypton_src_ktypes.h
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-0d1n__viewer_lib_krypton_src_ktypes.h
@@ -0,0 +1,14 @@
+--- 0d1n_viewer/lib/krypton/src/ktypes.h.orig 2023-02-20 12:36:40 UTC
++++ 0d1n_viewer/lib/krypton/src/ktypes.h
+@@ -18,11 +18,6 @@
+ #define NS_INTERNAL
+ #endif
+
+-/* C99 and later requires alloca.h. */
+-#if defined(__STDC_VERSION__) && __STDC_VERSION__ > 199900L
+-#include <alloca.h>
+-#endif
+-
+ #include <assert.h>
+ #include <ctype.h>
+ #include <errno.h>
diff --git a/security/0d1n/files/patch-src_0d1n.c b/security/0d1n/files/patch-src_0d1n.c
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_0d1n.c
@@ -0,0 +1,12 @@
+--- src/0d1n.c.orig 2023-02-20 12:38:21 UTC
++++ src/0d1n.c
+@@ -62,8 +62,7 @@ main (int argc, char ** argv)
+ /* remove comment to test the patch
+ */
+ #ifdef __GNUC__
+-# if __GNUC_PREREQ(10,0)
+-
++# if __GNUC__ >= 10
+ scan_gcc_new();
+ # else
+ scan_gcc_old();
diff --git a/security/0d1n/files/patch-src_headers_file__ops.h b/security/0d1n/files/patch-src_headers_file__ops.h
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_headers_file__ops.h
@@ -0,0 +1,10 @@
+--- src/headers/file_ops.h.orig 2023-02-20 12:35:55 UTC
++++ src/headers/file_ops.h
+@@ -12,7 +12,6 @@
+ #include <stdlib.h>
+ #include <unistd.h>
+ #include <errno.h>
+-#include <alloca.h>
+ #include "opt_extract.h"
+
+ void end_datatable(char * path);
diff --git a/security/0d1n/files/patch-src_headers_results.h b/security/0d1n/files/patch-src_headers_results.h
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_headers_results.h
@@ -0,0 +1,10 @@
+--- src/headers/results.h.orig 2023-02-20 12:35:39 UTC
++++ src/headers/results.h
+@@ -4,7 +4,6 @@
+ #include <string.h>
+ #include <stdlib.h>
+ #include <stdbool.h>
+-#include <alloca.h>
+ #include <unistd.h>
+ #include <sys/stat.h>
+ #include <time.h>
diff --git a/security/0d1n/files/patch-src_headers_spider.h b/security/0d1n/files/patch-src_headers_spider.h
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_headers_spider.h
@@ -0,0 +1,10 @@
+--- src/headers/spider.h.orig 2023-02-20 12:36:07 UTC
++++ src/headers/spider.h
+@@ -4,7 +4,6 @@
+ #include <string.h>
+ #include <stdlib.h>
+ #include <stdbool.h>
+-#include <alloca.h>
+ #include <unistd.h>
+ #include <sys/stat.h>
+ #include <time.h>
diff --git a/security/0d1n/files/patch-src_mem__ops.c b/security/0d1n/files/patch-src_mem__ops.c
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_mem__ops.c
@@ -0,0 +1,11 @@
+--- src/mem_ops.c.orig 2023-02-20 12:57:16 UTC
++++ src/mem_ops.c
+@@ -17,7 +17,7 @@ static void *
+ xmalloc_fatal(size_t size)
+ {
+
+- DEBUG("\n Memory FAILURE...\n size dbg: %lu\n",size);
++ DEBUG("\n Memory FAILURE...\n size dbg: %zu\n",size);
+
+ exit(0);
+ }
diff --git a/security/0d1n/files/patch-src_opt__extract.c b/security/0d1n/files/patch-src_opt__extract.c
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_opt__extract.c
@@ -0,0 +1,11 @@
+--- src/opt_extract.c.orig 2023-02-20 12:39:15 UTC
++++ src/opt_extract.c
+@@ -164,7 +164,7 @@ void
+ parser_opts (int argc, char **argv)
+ {
+
+- char c;
++ int c;
+
+ static struct option long_options[] =
+ {
diff --git a/security/0d1n/files/patch-src_strsec.c b/security/0d1n/files/patch-src_strsec.c
new file mode 100644
--- /dev/null
+++ b/security/0d1n/files/patch-src_strsec.c
@@ -0,0 +1,15 @@
+--- src/strsec.c.orig 2023-02-20 12:39:57 UTC
++++ src/strsec.c
+@@ -16,11 +16,11 @@
+ * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+ */
+
++#include "strsec.h"
+
+ #if !defined(__FreeBSD__) && !defined(__OpenBSD__) && !defined(__NetBSD__) && \
+ !defined(__bsdi__) && !defined(__APPLE__)
+
+-#include "strsec.h"
+ /*
+ * Copy src to string dst of size siz. At most siz-1 characters
+ * will be copied. Always NUL terminates (unless siz == 0).
diff --git a/security/0d1n/pkg-plist b/security/0d1n/pkg-plist
new file mode 100644
--- /dev/null
+++ b/security/0d1n/pkg-plist
@@ -0,0 +1,28 @@
+bin/0d1n
+%%DATADIR%%/payloads/crlfinjection.txt
+%%DATADIR%%/payloads/dir_brute.txt
+%%DATADIR%%/payloads/find_responses.txt
+%%DATADIR%%/payloads/js_inject.txt
+%%DATADIR%%/payloads/ldap_injection.txt
+%%DATADIR%%/payloads/list.txt
+%%DATADIR%%/payloads/openredirect.txt
+%%DATADIR%%/payloads/passive_sqli.txt
+%%DATADIR%%/payloads/password_brute.txt
+%%DATADIR%%/payloads/path_traversal.txt
+%%DATADIR%%/payloads/path_traversal_win32.txt
+%%DATADIR%%/payloads/proxy.txt
+%%DATADIR%%/payloads/proxy_list.txt
+%%DATADIR%%/payloads/sqli.txt
+%%DATADIR%%/payloads/useragents.txt
+%%DATADIR%%/payloads/wordlist.txt
+%%DATADIR%%/payloads/xml_attack.txt
+%%DATADIR%%/payloads/xml_attacks.txt
+%%DATADIR%%/payloads/xpath_injection.txt
+%%DATADIR%%/payloads/xss.txt
+%%DATADIR%%/payloads/xss_robertux.txt
+%%DATADIR%%/payloads/xxe_fuzz.txt
+%%DATADIR%%/templates/hammer1.conf
+%%DATADIR%%/templates/hammer2.conf
+%%DATADIR%%/templates/template.conf
+%%PORTDOCS%%%%DOCSDIR%%/README.txt
+@dir %%DATADIR%%/view/response_sources
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Thu, Feb 13, 10:12 PM (18 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
16633840
Default Alt Text
D38725.diff (6 KB)
Attached To
Mode
D38725: security/0d1n: fix build
Attached
Detach File
Event Timeline
Log In to Comment