Import scapy 1.0.4

Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.

from uwe@
This commit is contained in:
alek 2006-04-19 17:36:58 +00:00
parent aaa2632ed5
commit 0630c21feb
4 changed files with 72 additions and 0 deletions

46
net/scapy/Makefile Normal file
View File

@ -0,0 +1,46 @@
# $OpenBSD: Makefile,v 1.1.1.1 2006/04/19 17:36:58 alek Exp $
COMMENT= "powerful interactive packet manipulation in python"
DISTNAME= scapy-1.0.4
CATEGORIES= net
HOMEPAGE= http://secdev.org/projects/scapy/
# GPLv2
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
MASTER_SITES= ${HOMEPAGE}/files/
DISTFILES= ${DISTNAME}${EXTRACT_SUFX} ethertypes
EXTRACT_ONLY= ${DISTNAME}${EXTRACT_SUFX}
EXTRACT_SUFX= .tar.gz
MODULES= lang/python
RUN_DEPENDS= :py-libdnet-*:net/libdnet,-python \
:py-libpcap-*:net/py-libpcap \
:py-crypto-*:security/py-crypto \
:py-gnuplot-*:math/py-gnuplot
PKG_ARCH= *
NO_REGRESS= Yes
do-build:
gunzip < ${WRKSRC}/scapy.1.gz > ${WRKBUILD}/scapy.1
perl -p -i -e "s,^(\#\S+ \S+ )python\$$,#!${MODPY_BIN}," \
${WRKSRC}/*.py
perl -p -i -e "s,/etc/ethertypes,${SYSCONFDIR}/ethertypes,g" \
${WRKSRC}/*.py
do-install:
${INSTALL_DATA_DIR} ${WRKINST}${MODPY_SITEPKG}
${INSTALL_SCRIPT} ${WRKSRC}/scapy.py ${WRKINST}${MODPY_SITEPKG}
ln -s ${MODPY_SITEPKG}/scapy.py ${PREFIX}/bin/scapy
${INSTALL_MAN} ${WRKBUILD}/scapy.1 ${PREFIX}/man/man1
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/scapy
${INSTALL_DATA} ${DISTDIR}/ethertypes ${PREFIX}/share/examples/scapy
.include <bsd.port.mk>

8
net/scapy/distinfo Normal file
View File

@ -0,0 +1,8 @@
MD5 (ethertypes) = 94bffde8f75a1b8f891fb780bfe15ca2
MD5 (scapy-1.0.4.tar.gz) = c156668cfab4c1fde276f81e0b85b5d9
RMD160 (ethertypes) = 296b88fed911b25398b5f657cd6bb5c91e72e288
RMD160 (scapy-1.0.4.tar.gz) = 2618548042f65b0d02461623fece93d4c2588959
SHA1 (ethertypes) = 6ed0fe2446666876d77b8971fd8edf495a9c0be3
SHA1 (scapy-1.0.4.tar.gz) = abe7cc242af4f20ef016557800e2e521c2e14a1b
SIZE (ethertypes) = 1317
SIZE (scapy-1.0.4.tar.gz) = 132677

11
net/scapy/pkg/DESCR Normal file
View File

@ -0,0 +1,11 @@
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.

7
net/scapy/pkg/PLIST Normal file
View File

@ -0,0 +1,7 @@
@comment $OpenBSD: PLIST,v 1.1.1.1 2006/04/19 17:36:58 alek Exp $
bin/scapy
lib/python${MODPY_VERSION}/site-packages/scapy.py
@man man/man1/scapy.1
share/examples/scapy/
share/examples/scapy/ethertypes
@sample ${SYSCONFDIR}/ethertypes