8ab072726c
Pcapdiff is a tool developed by the EFF to compare two packet captures and identify potentially forged, dropped, or mangled packets. Two technically-inclined friends can set up packet captures on their own computers and produce network traffic between their two computers over the Internet. Later, they can run pcapdiff on the two packet capture files to identify suspicious packets for further investigation. (second attempt in the right dir... no cookie for me)
36 lines
696 B
Makefile
36 lines
696 B
Makefile
# $OpenBSD: Makefile,v 1.1.1.1 2009/04/21 16:36:23 sthen Exp $
|
|
|
|
COMMENT = compare pcap dump files
|
|
|
|
MODPY_EGG_VERSION = 0.1
|
|
DISTNAME = pcapdiff-${MODPY_EGG_VERSION}
|
|
|
|
CATEGORIES = net security
|
|
|
|
HOMEPAGE = http://www.eff.org/testyourisp/pcapdiff/
|
|
|
|
# GPLv2/GPLv3 (only)
|
|
PERMIT_PACKAGE_CDROM = Yes
|
|
PERMIT_PACKAGE_FTP = Yes
|
|
PERMIT_DISTFILES_CDROM =Yes
|
|
PERMIT_DISTFILES_FTP = Yes
|
|
|
|
MASTER_SITES = http://www.eff.org/files/
|
|
|
|
MODULES = lang/python
|
|
RUN_DEPENDS = ::net/py-pcapy
|
|
|
|
NO_REGRESS = Yes
|
|
|
|
WRKDIST = ${WRKDIR}/pcapdiff
|
|
|
|
pre-configure:
|
|
@cp ${FILESDIR}/setup.py ${WRKSRC}
|
|
|
|
post-install:
|
|
.for i in pcapdiff printpackets
|
|
mv ${PREFIX}/bin/$i.py ${PREFIX}/bin/$i
|
|
.endfor
|
|
|
|
.include <bsd.port.mk>
|