openbsd-ports/net/socat/Makefile
sthen 887c043498 SECURITY update to socat 1.7.2.1, CVE-2012-0219: heap based buffer overflow
with potential for arbitrary code execution if malicious data is output to
READLINE without option "prompt" or "noprompt".  OK nigel@
2012-05-14 20:58:13 +00:00

41 lines
927 B
Makefile

# $OpenBSD: Makefile,v 1.13 2012/05/14 20:58:13 sthen Exp $
COMMENT= relay for bidirectional data transfer
DISTNAME= socat-1.7.2.1
CATEGORIES= net
HOMEPAGE= http://www.dest-unreach.org/socat/
MAINTAINER= Nigel Taylor <nigel@openbsd.org>
# GPLv2
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
MASTER_SITES= ${HOMEPAGE}/download/
WANTLIB= curses c readline crypto util ssl wrap
NO_REGRESS= Yes
CONFIGURE_STYLE=gnu
pre-build:
${SUBST_CMD} ${WRKSRC}/doc/socat.1
post-install:
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/socat
.for file in FAQ README SECURITY doc/xio.help doc/*.html doc/dest-unreach.css
${INSTALL_DATA} ${WRKSRC}/${file} ${PREFIX}/share/doc/socat
.endfor
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/socat
.for file in EXAMPLES testcert.conf *.sh
${INSTALL_DATA} ${WRKSRC}/${file} ${PREFIX}/share/examples/socat
.endfor
.include <bsd.port.mk>