Ravenports generated: 19 Jul 2021 04:13
[ravenports.git] / bucket_27 / vde2
1 # Buildsheet autogenerated by ravenadm tool -- Do not edit.
2
3 NAMEBASE=               vde2
4 VERSION=                2.3.2
5 KEYWORDS=               net
6 VARIANTS=               standard
7 SDESC[standard]=        User-mode virtual ethernet infrastructure
8 HOMEPAGE=               http://vde.sourceforge.net/
9 CONTACT=                nobody
10
11 DOWNLOAD_GROUPS=        main
12 SITES[main]=            SF/vde/vde2/2.3.2/
13 DISTFILE[1]=            vde2-2.3.2.tar.gz:main
14 DF_INDEX=               1
15 SPKGS[standard]=        single
16
17 OPTIONS_AVAILABLE=      none
18 OPTIONS_STANDARD=       none
19
20 BUILDRUN_DEPENDS=       libpcap:single:standard
21
22 USES=                   gmake libtool ssl
23
24 LICENSE=                GPLv2+:single CUSTOM1:single
25 LICENSE_TERMS=          single:{{WRKDIR}}/TERMS
26 LICENSE_NAME=           CUSTOM1:"Slirp License"
27 LICENSE_FILE=           GPLv2+:{{WRKSRC}}/COPYING
28                         CUSTOM1:{{WRKSRC}}/COPYING.slirpvde
29 LICENSE_AWK=            TERMS:"^$$"
30 LICENSE_SOURCE=         TERMS:{{WRKSRC}}/include/libvdemgmt.h
31 LICENSE_SCHEME=         multi
32
33 FPC_EQUIVALENT=         net/vde2
34
35 MUST_CONFIGURE=         gnu
36 CONFIGURE_ARGS=         --disable-python
37
38 MAKE_ENV=               V=1
39 SINGLE_JOB=             yes
40
41 INSTALL_TARGET=         install-strip
42 INSTALL_REQ_TOOLCHAIN=  yes
43
44 VAR_OPSYS[linux]=       CFLAGS=-D_BSD_SOURCE=1
45
46 post-patch:
47         ${REINPLACE_CMD} -e '/-Wall/s|-O2||g' ${WRKSRC}/configure
48         ${REINPLACE_CMD} -e 's|$$(MAKE).*install-data-hook||g' \
49                 ${WRKSRC}/man/Makefile.in
50         ${REINPLACE_CMD} -e 's|^AM_CFLAGS|#AM_CFLAGS|g' \
51                 ${WRKSRC}/src/slirpvde/Makefile.in
52
53 post-install:
54         ${LN} -sf unixcmd.1 ${STAGEDIR}${MANPREFIX}/man/man1/vdecmd.1
55         ${LN} -sf vdeq.1 ${STAGEDIR}${MANPREFIX}/man/man1/vdeqemu.1
56         ${LN} -sf vdeq.1 ${STAGEDIR}${MANPREFIX}/man/man1/vdekvm.1
57
58 [FILE:312:descriptions/desc.single]
59 Virtual Distributed Ethernet is a user-mode virtual network (layer2)
60 infrastructure.  It can be used for network simulations, joining multiple
61 qemu instances together in a shared virtual network, or tunneling over the
62 Internet.  Physical hosts can be joined to the virtual network by means of
63 the tap(4) driver.
64
65
66 [FILE:96:distinfo]
67 22df546a63dac88320d35d61b7833bbbcbef13529ad009c7ce3c5cb32250af93       770257 vde2-2.3.2.tar.gz
68
69
70 [FILE:1202:manifests/plist.single]
71 %%ONLY-LINUX%%lib/vde2/
72  libvdetap.a
73  libvdetap.so
74 %%ONLY-LINUX%%libexec/vdetap
75 %%ONLY-LINUX%%sbin/vde_tunctl
76 bin/
77  dpipe
78  slirpvde
79  unixcmd
80  unixterm
81  vde_autolink
82  vde_cryptcab
83  vde_l3
84  vde_over_ns
85  vde_pcapplug
86  vde_plug
87  vde_plug2tap
88  vde_switch
89  vdecmd
90  vdekvm
91  vdeq
92  vdeqemu
93  vdeterm
94  wirefilter
95 etc/vde2/vdecmd
96 etc/vde2/libvdemgmt/
97  asyncrecv.rc
98  closemachine.rc
99  openmachine.rc
100  sendcmd.rc
101 include/
102  libvdehist.h
103  libvdemgmt.h
104  libvdeplug.h
105  libvdeplug_dyn.h
106  libvdesnmp.h
107 lib/
108  libvdehist.a
109  libvdehist.so
110  libvdehist.so.0
111  libvdehist.so.0.0.1
112  libvdemgmt.a
113  libvdemgmt.so
114  libvdemgmt.so.0
115  libvdemgmt.so.0.0.1
116  libvdeplug.a
117  libvdeplug.so
118  libvdeplug.so.3
119  libvdeplug.so.3.0.1
120  libvdesnmp.a
121  libvdesnmp.so
122  libvdesnmp.so.0
123  libvdesnmp.so.0.0.1
124 lib/pkgconfig/
125  vdehist.pc
126  vdemgmt.pc
127  vdeplug.pc
128  vdesnmp.pc
129 lib/vde2/vde_l3/
130  bfifo.so
131  pfifo.so
132  tbf.so
133 share/man/man1/
134  dpipe.1.gz
135  slirpvde.1.gz
136  unixcmd.1.gz
137  unixterm.1.gz
138  vde_autolink.1.gz
139  vde_cryptcab.1.gz
140  vde_l3.1.gz
141  vde_over_ns.1.gz
142  vde_pcapplug.1.gz
143  vde_plug.1.gz
144  vde_plug2tap.1.gz
145  vde_switch.1.gz
146  vdecmd.1.gz
147  vdekvm.1.gz
148  vdeq.1.gz
149  vdeqemu.1.gz
150  vdetaplib.1.gz
151  vdeterm.1.gz
152  wirefilter.1.gz
153 share/man/man8/vde_tunctl.8.gz
154
155
156 [FILE:238:patches/patch-configure]
157 --- configure.orig      2019-01-04 20:38:31 UTC
158 +++ configure
159 @@ -17050,7 +17050,7 @@ $as_echo "#define VDE_DARWIN 1" >>confde
160  
161      darwin_gcc=yes
162    ;;
163 -  freebsd*)
164 +  freebsd*|dragonfly*)
165  
166  $as_echo "#define VDE_FREEBSD 1" >>confdefs.h
167  
168
169
170 [FILE:320:patches/patch-src_dpipe.c]
171 --- src/dpipe.c.orig    2011-11-23 16:41:18 UTC
172 +++ src/dpipe.c
173 @@ -201,7 +201,11 @@ int main(int argc, char *argv[])
174  
175         if (daemonize != 0)
176                 daemon(0,0);
177 +#ifdef __linux__
178         else if (setpgrp() != 0) {
179 +#else
180 +       else if (setpgrp(0,getpid()) != 0) {
181 +#endif
182                 fprintf(stderr,"Err: cannot create pgrp\n");
183                 exit(1);
184         }
185
186
187 [FILE:2723:patches/patch-src_vde__cryptcab_cryptcab.c]
188 --- src/vde_cryptcab/cryptcab.c.orig    2011-11-23 16:41:17 UTC
189 +++ src/vde_cryptcab/cryptcab.c
190 @@ -22,7 +22,11 @@ static void Usage(char *programname)
191         exit(1);
192  }
193         
194 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
195 +static EVP_CIPHER_CTX *ctx;
196 +#else
197  static EVP_CIPHER_CTX ctx;
198 +#endif
199  static int ctx_initialized = 0;
200  static int encryption_disabled = 0;
201  static int nfd;
202 @@ -103,19 +107,33 @@ int data_encrypt(unsigned char *src, uns
203         }
204  
205         if (!ctx_initialized) {
206 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
207 +               ctx = EVP_CIPHER_CTX_new();
208 +               EVP_CIPHER_CTX_init (ctx);
209 +#else
210                 EVP_CIPHER_CTX_init (&ctx);
211 +#endif
212                 ctx_initialized = 1;
213         }
214         
215 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
216 +       EVP_EncryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
217 +       if (EVP_EncryptUpdate (ctx, dst, &olen, src, len) != 1)
218 +#else
219         EVP_EncryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
220         if (EVP_EncryptUpdate (&ctx, dst, &olen, src, len) != 1)
221 +#endif
222         {
223                 fprintf (stderr,"error in encrypt update\n");
224                 olen = -1;
225                 goto cleanup;
226         }
227  
228 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
229 +       if (EVP_EncryptFinal (ctx, dst + olen, &tlen) != 1)
230 +#else
231         if (EVP_EncryptFinal (&ctx, dst + olen, &tlen) != 1)
232 +#endif
233         {
234                 fprintf (stderr,"error in encrypt final\n");
235                 olen = -1;
236 @@ -124,7 +142,12 @@ int data_encrypt(unsigned char *src, uns
237         olen += tlen;
238  
239  cleanup:
240 -       EVP_CIPHER_CTX_cleanup(&ctx);   
241 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
242 +       EVP_CIPHER_CTX_cleanup(ctx);    
243 +       EVP_CIPHER_CTX_free(ctx);
244 +#else
245 +       EVP_CIPHER_CTX_cleanup(&ctx);
246 +#endif
247         return olen;
248  }
249  
250 @@ -138,19 +161,33 @@ int data_decrypt(unsigned char *src, uns
251         }
252         
253         if (!ctx_initialized) {
254 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
255 +               ctx = EVP_CIPHER_CTX_new();
256 +               EVP_CIPHER_CTX_init(ctx);
257 +#else
258                 EVP_CIPHER_CTX_init (&ctx);
259 +#endif
260                 ctx_initialized = 1;
261         }
262  
263 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
264 +       EVP_DecryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
265 +       if (EVP_DecryptUpdate (ctx, dst, &olen, src, len) != 1)
266 +#else
267         EVP_DecryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
268         if (EVP_DecryptUpdate (&ctx, dst, &olen, src, len) != 1)
269 +#endif
270         {
271                 fprintf (stderr,"error in decrypt update\n");
272                 olen = -1;
273                 goto cleanup;
274         }
275  
276 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
277 +       if (EVP_DecryptFinal (ctx, dst + olen, &tlen) != 1)
278 +#else
279         if (EVP_DecryptFinal (&ctx, dst + olen, &tlen) != 1)
280 +#endif
281         {
282                 fprintf (stderr,"error in decrypt final\n");
283                 olen = -1;
284 @@ -159,7 +196,12 @@ int data_decrypt(unsigned char *src, uns
285         olen += tlen;
286  
287  cleanup:
288 -       EVP_CIPHER_CTX_cleanup(&ctx);   
289 +#if OPENSSL_VERSION_NUMBER >= 0x1010100fL
290 +       EVP_CIPHER_CTX_cleanup(ctx);    
291 +       EVP_CIPHER_CTX_free(ctx);
292 +#else
293 +       EVP_CIPHER_CTX_cleanup(&ctx);
294 +#endif
295         return olen;
296  }
297  
298
299
300 [FILE:388:patches/patch-src_vde__pcapplug.c]
301 --- src/vde_pcapplug.c.orig     2011-11-23 16:41:18 UTC
302 +++ src/vde_pcapplug.c
303 @@ -196,7 +196,7 @@ void pcap_callback(u_char *u, const stru
304  void setup_fd(int fd)
305  {
306  /* FreeBSD settings */
307 -#if defined(VDE_FREEBSD)
308 +#if 0 // BIOC* not defined by port libpcap 
309         /*
310          * Tell the kernel that the header is fully-formed when it gets it.
311          * This is required in order to fake the src address.
312
313
314 [FILE:313:patches/patch-src_vde__plug2tap.c]
315 --- src/vde_plug2tap.c.orig     2011-11-23 16:41:18 UTC
316 +++ src/vde_plug2tap.c
317 @@ -37,7 +37,11 @@
318  #ifdef VDE_FREEBSD
319  #include <sys/socket.h>
320  #include <net/if.h>
321 +# ifdef __DragonFly__
322 +#include <net/tun/if_tun.h>
323 +# else
324  #include <net/if_tun.h>
325 +# endif
326  #endif
327  
328  #if defined(VDE_DARWIN) || defined(VDE_FREEBSD)
329