In this version:
- A new generation os detection system with a lot of new signatures
- Nmap can now handle many tergets in parallel
- Ip options support added
- Updated nmap-mac-prefixes db to latest version
- A lot of bug fixes
 Tested @i386
  Comments ? OK ?
   Giovanni
diff -urNx CVS net/nmap/Makefile mystuff/net/nmap/Makefile
--- net/nmap/Makefile   Sun Mar 18 11:25:15 2007
+++ mystuff/net/nmap/Makefile   Sun Mar 18 11:30:43 2007
@@ -2,8 +2,8 @@
 
 COMMENT=       "scan ports and fingerprint stack of network hosts"
 
-DISTNAME=      nmap-4.11
-PKGNAME=       ${DISTNAME}p1
+DISTNAME=      nmap-4.20
+PKGNAME=       ${DISTNAME}
 CATEGORIES=    net security
 MASTER_SITES=  ${HOMEPAGE}dist/
 EXTRACT_SUFX=  .tgz
diff -urNx CVS net/nmap/distinfo mystuff/net/nmap/distinfo
--- net/nmap/distinfo   Sun Mar 18 11:25:15 2007
+++ mystuff/net/nmap/distinfo   Sun Mar 18 11:27:41 2007
@@ -1,4 +1,5 @@
-MD5 (nmap-4.11.tgz) = 07e68b1c4a85ad9012f68bbaefa9ce1f
-RMD160 (nmap-4.11.tgz) = d5c903f01a5e4075f431517bb9188817d30614f2
-SHA1 (nmap-4.11.tgz) = 3dcc9d1fb5ef2836c199510ea6393e594b85cfb1
-SIZE (nmap-4.11.tgz) = 2660928
+MD5 (nmap-4.20.tgz) = 93e3b2b6b11092a587c69b67cf27555f
+RMD160 (nmap-4.20.tgz) = b141a35adc05171bf2c176519659bf0d04372230
+SHA1 (nmap-4.20.tgz) = 8d2962f0371de6cfa466f6ce2389e40ca5be2443
+SHA256 (nmap-4.20.tgz) = 
eecb276af0d7e63530f92ed924b25f34ce0731b9cbaa8b16cbe7179077b93159
+SIZE (nmap-4.20.tgz) = 2704981
diff -urNx CVS net/nmap/patches/patch-configure 
mystuff/net/nmap/patches/patch-configure
--- net/nmap/patches/patch-configure    Thu Jan  1 01:00:00 1970
+++ mystuff/net/nmap/patches/patch-configure    Sun Mar 18 11:26:54 2007
@@ -0,0 +1,14 @@
+$OpenBSD$
+--- configure.orig     Sun Feb  4 15:58:01 2007
++++ configure  Sun Feb  4 15:58:40 2007
+@@ -5882,9 +5882,7 @@ int main() {
+   sscanf(pcap_version,"%d.%d.%d", &major, &minor1, &minor2);
+   if (major > 0)
+     exit(0);
+-  if (minor1 < 9)
+-    exit(1);
+-  if (minor2 < 4)
++  if (minor1 < 5)
+     exit(1);
+   exit(0);
+ }
diff -urNx CVS net/nmap/patches/patch-tcpip_cc 
mystuff/net/nmap/patches/patch-tcpip_cc
--- net/nmap/patches/patch-tcpip_cc     Thu Jan  1 01:00:00 1970
+++ mystuff/net/nmap/patches/patch-tcpip_cc     Sun Mar 18 11:26:54 2007
@@ -0,0 +1,30 @@
+$OpenBSD$
+--- tcpip.cc.orig      Sun Feb  4 16:06:01 2007
++++ tcpip.cc   Sun Feb  4 16:08:26 2007
+@@ -99,6 +99,8 @@
+  ***************************************************************************/
+ 
+ /* $Id: tcpip.cc 4228 2006-12-08 03:01:08Z fyodor $ */
++#include <sys/param.h>
++
+ #ifdef WIN32
+ #include "nmap_winconfig.h"
+ #endif
+@@ -1959,7 +1961,7 @@ if (timedout) {
+ 
+ // Returns whether the system supports pcap_get_selectable_fd() properly
+ bool pcap_selectable_fd_valid() {
+-#if defined(WIN32) || defined(MACOSX)
++#if defined(WIN32) || defined(MACOSX) || (defined(BSD) && BSD >= 199306)
+   return false;
+ #endif
+   return true;
+@@ -1972,7 +1974,7 @@ bool pcap_selectable_fd_valid() {
+    results.  If you just want to test whether the function is supported,
+    use pcap_selectable_fd_valid() instead. */
+ int my_pcap_get_selectable_fd(pcap_t *p) {
+-#if defined(WIN32) || defined(MACOSX)
++#if defined(WIN32) || defined(MACOSX) || (defined(BSD) && BSD >= 199306)
+   return -1;
+ #else
+   assert(pcap_selectable_fd_valid());
diff -urNx CVS net/nmap/pkg/PLIST mystuff/net/nmap/pkg/PLIST
--- net/nmap/pkg/PLIST  Sun Mar 18 11:25:15 2007
+++ mystuff/net/nmap/pkg/PLIST  Sun Mar 18 11:26:54 2007
@@ -1,8 +1,9 @@
[EMAIL PROTECTED] $OpenBSD: PLIST,v 1.13 2005/02/08 19:06:42 sturm Exp $
[EMAIL PROTECTED] $OpenBSD$
 bin/nmap
 @man man/man1/nmap.1
 share/nmap/
 share/nmap/nmap-mac-prefixes
+share/nmap/nmap-os-db
 share/nmap/nmap-os-fingerprints
 share/nmap/nmap-protocols
 share/nmap/nmap-rpc

Reply via email to