Merge pull request #108591 from iblech/patch-24

dsniff: unbreak the build
This commit is contained in:
Guillaume Girol 2021-01-07 21:40:32 +00:00 committed by GitHub
commit d52f984624
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,6 +1,10 @@
{ stdenv, fetchFromGitLab, autoreconfHook, libpcap, db, glib, libnet, libnids, symlinkJoin, openssl { gcc9Stdenv, lib, fetchFromGitLab, autoreconfHook, libpcap, db, glib, libnet, libnids, symlinkJoin, openssl
, rpcsvc-proto, libtirpc, libnsl , rpcsvc-proto, libtirpc, libnsl
}: }:
# We compile with GCC 9 since GCC 10 segfaults on the code
# (see https://bugzilla.redhat.com/show_bug.cgi?id=1862809).
let let
/* /*
dsniff's build system unconditionnaly wants static libraries and does not dsniff's build system unconditionnaly wants static libraries and does not
@ -38,7 +42,7 @@ let
inherit (openssl) name; inherit (openssl) name;
paths = with openssl.override { static = true; }; [ out dev ]; paths = with openssl.override { static = true; }; [ out dev ];
}; };
in stdenv.mkDerivation rec { in gcc9Stdenv.mkDerivation rec {
pname = "dsniff"; pname = "dsniff";
version = "2.4b1"; version = "2.4b1";
# upstream is so old that nearly every distribution packages the beta version. # upstream is so old that nearly every distribution packages the beta version.
@ -71,7 +75,7 @@ in stdenv.mkDerivation rec {
"--with-openssl=${ssl}" "--with-openssl=${ssl}"
]; ];
meta = with stdenv.lib; { meta = with lib; {
description = "collection of tools for network auditing and penetration testing"; description = "collection of tools for network auditing and penetration testing";
longDescription = '' longDescription = ''
dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.