svn commit: r507955 - in head/security/sandsifter: . files
Rene Ladan
rene at FreeBSD.org
Sat Aug 3 11:12:12 UTC 2019
Author: rene
Date: Sat Aug 3 11:12:11 2019
New Revision: 507955
URL: https://svnweb.freebsd.org/changeset/ports/507955
Log:
security/sandsifter: update to 1.04
Restrict this port to Python 2.7 for now, work to get it running
with Python 3.6 is in progress upstream.
Pet portlint (remove an extraneous spacae from pkg-descr)
Reported by: upstream / portscout
Added:
head/security/sandsifter/files/patch-sifter.py (contents, props changed)
Deleted:
head/security/sandsifter/files/patch-injector.c
Modified:
head/security/sandsifter/Makefile
head/security/sandsifter/distinfo
head/security/sandsifter/pkg-descr
Modified: head/security/sandsifter/Makefile
==============================================================================
--- head/security/sandsifter/Makefile Sat Aug 3 11:08:59 2019 (r507954)
+++ head/security/sandsifter/Makefile Sat Aug 3 11:12:11 2019 (r507955)
@@ -1,7 +1,7 @@
# $FreeBSD$
PORTNAME= sandsifter
-PORTVERSION= 1.03
+PORTVERSION= 1.04
DISTVERSIONPREFIX=v
CATEGORIES= security
@@ -17,7 +17,7 @@ ONLY_FOR_ARCHS_REASON=Designed for x86
BUILD_DEPENDS= ${LOCALBASE}/include/capstone/capstone.h:devel/capstone3
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}capstone>0:devel/py-capstone@${PY_FLAVOR}
-USES= gmake python localbase shebangfix
+USES= gmake python:2.7 localbase shebangfix
USE_GITHUB= yes
GH_ACCOUNT= rigred
@@ -28,9 +28,7 @@ OPTIONS_DEFINE= DOCS
PORTDOCS= references/*
post-patch:
- ${REINPLACE_CMD} -e 's,/proc/cpuinfo,/compat/linux/proc/cpuinfo,' \
- -e 's,/usr/sbin,${PREFIX}/sbin,' \
- ${WRKSRC}/sifter.py
+ ${REINPLACE_CMD} -e 's,/usr/sbin,${PREFIX}/sbin,' ${WRKSRC}/sifter.py
do-install:
(cd ${WRKSRC} && ${COPYTREE_SHARE} gui ${STAGEDIR}${DATADIR})
Modified: head/security/sandsifter/distinfo
==============================================================================
--- head/security/sandsifter/distinfo Sat Aug 3 11:08:59 2019 (r507954)
+++ head/security/sandsifter/distinfo Sat Aug 3 11:12:11 2019 (r507955)
@@ -1,3 +1,3 @@
-TIMESTAMP = 1547931250
-SHA256 (rigred-sandsifter-v1.03_GH0.tar.gz) = aece752dbe1831b2c215d9345b124ad9fb0180996dc81bff34fdc3a609332e9c
-SIZE (rigred-sandsifter-v1.03_GH0.tar.gz) = 5288254
+TIMESTAMP = 1564689727
+SHA256 (rigred-sandsifter-v1.04_GH0.tar.gz) = c62087155077190f7abe3e2646595b336b8f7f626e7fae63af5dbcc7c66f33be
+SIZE (rigred-sandsifter-v1.04_GH0.tar.gz) = 5288475
Added: head/security/sandsifter/files/patch-sifter.py
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/security/sandsifter/files/patch-sifter.py Sat Aug 3 11:12:11 2019 (r507955)
@@ -0,0 +1,50 @@
+--- sifter.py.orig 2019-07-31 14:21:48 UTC
++++ sifter.py
+@@ -59,7 +59,7 @@ class InjectorResults(Structure):
+ ('signum', c_int),
+ ('sicode', c_int),
+ ('siaddr', c_int),
+- ]
++ ]
+
+ class Settings:
+ SYNTH_MODE_RANDOM = "r"
+@@ -643,8 +643,8 @@ class Gui:
+ # red. doesn't happen if using a new random string each
+ # time; doesn't happen if using a constant string each
+ # time. only happens with the specific implementation below.
+- #TODO: on systems with limited color settings, this
+- # makes the background look like random characters
++ #TODO: on systems with limited color settings, this
++ # makes the background look like random characters
+ random_string = ("%02x" % random.randint(0,100)) * (raw_width-2)
+ self.stdscr.addstr(top + 1 + y, left, random_string, curses.color_pair(self.BLACK))
+
+@@ -709,7 +709,7 @@ class Gui:
+
+ def get_cpu_info():
+ cpu_path = "/proc/cpuinfo"
+- if platform.system == "FreeBSD":
++ if platform.system() == "FreeBSD":
+ cpu_path = "/compat/linux%s" % cpu_path
+ with open(cpu_path, "r") as f:
+ cpu = [l.strip() for l in f.readlines()[:7]]
+@@ -790,7 +790,8 @@ def main():
+ # Pick the first valid injector entry, this is not ideal but it should work fine
+ INJECTOR = INJECTOR[0]
+ print("Using injector from: %s" % INJECTOR)
+- print("Injector BuildID: %s" % subprocess.check_output(['eu-readelf', '-n', INJECTOR]).split()[-1])
++ if platform.system() != "FreeBSD":
++ print("Injector BuildID: %s" % subprocess.check_output(['eu-readelf', '-n', INJECTOR]).split()[-1])
+
+
+ parser = argparse.ArgumentParser()
+@@ -851,7 +852,7 @@ def main():
+ TICK = os.path.join(OUTPUT, "tick")
+ LAST = os.path.join(OUTPUT, "last")
+ else:
+- print("warning: no log output path (--out) specified, results will be recorded to %s \nManualy specify a (--out) output path if you want your results recorded elsewhere." % OUTPUT)
++ print("warning: no log output path (--out) specified, results will be recorded to %s \nManualy specify a (--out) output path if you want your results recorded elsewhere." % OUTPUT)
+ # Wait to show message to user.
+ time.sleep(3)
+ # Create /tmp directory if it does not exist already, here we use much less strict checks.
Modified: head/security/sandsifter/pkg-descr
==============================================================================
--- head/security/sandsifter/pkg-descr Sat Aug 3 11:08:59 2019 (r507954)
+++ head/security/sandsifter/pkg-descr Sat Aug 3 11:12:11 2019 (r507955)
@@ -1,4 +1,4 @@
-The sandsifter audits x86 processors for hidden instructions and
+The sandsifter audits x86 processors for hidden instructions and
hardware bugs, by systematically generating machine code to search
through a processor's instruction set, and monitoring execution for
anomalies. Sandsifter has uncovered secret processor instructions from
More information about the svn-ports-all
mailing list