15 Commits

Author SHA1 Message Date
sthen
dae9f91e31 bump for MODPY_DEFAULT_VERSION_3 change 2022-11-13 15:28:39 +00:00
naddy
3f5796b9fd drop RCS Ids 2022-03-11 19:45:43 +00:00
sthen
3fb7cdbcf6 bump REVISION for switch from Python 3.8 -> 3.9 2021-11-02 00:01:35 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
kn
d63327a39a Move scapy to python 3 only
Now that base regress is fully converted to using the Python 3 version
merge scapy (Python 2) and py3-scapy into scapy (Python 3).

OK bluhm sthen
2020-12-30 21:38:58 +00:00
sthen
292712e33e replace the old EFF pcapdiff (which seems to be broken following various
changes in python network tools, and also has been discontinued upstream)
with a similarly named similar alternative, the script itself is fairly
simple as scapy is used to do much of the work.
2020-12-10 22:02:02 +00:00
sthen
48b0b9660c replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:48:23 +00:00
bentley
3556d57ae0 Update homepage, switch master_sites to https. 2015-12-19 00:13:35 +00:00
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
espie
d0fa01c846 normalize pkgpath 2011-09-16 11:13:37 +00:00
jasper
88f8f0add6 bump after default python version switch 2011-06-08 18:00:49 +00:00
espie
0397d65db0 new depends 2010-11-19 22:31:32 +00:00
sthen
d9ad2d3e07 bumps for python 2010-08-30 21:14:34 +00:00
sthen
8ab072726c import pcapdiff:
Pcapdiff is a tool developed by the EFF to compare two packet captures
and identify potentially forged, dropped, or mangled packets.

Two technically-inclined friends can set up packet captures on their
own computers and produce network traffic between their two computers
over the Internet.

Later, they can run pcapdiff on the two packet capture files to
identify suspicious packets for further investigation.


(second attempt in the right dir... no cookie for me)
2009-04-21 16:36:23 +00:00