Received: by mail.netbsd.org (Postfix, from userid 605) id 695CE84DCB; Fri, 16 Apr 2021 06:55:36 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id A100A84D16 for ; Fri, 16 Apr 2021 06:55:35 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id vwe9iLBoJvgx for ; Fri, 16 Apr 2021 06:55:33 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id D458B84CE0 for ; Fri, 16 Apr 2021 06:55:33 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id CD66CFA95; Fri, 16 Apr 2021 06:55:33 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1618556133139310" MIME-Version: 1.0 Date: Fri, 16 Apr 2021 06:55:33 +0000 From: "Adam Ciarcinski" Subject: CVS commit: pkgsrc/net To: pkgsrc-changes@NetBSD.org Reply-To: adam@netbsd.org X-Mailer: log_accum Message-Id: <20210416065533.CD66CFA95@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1618556133139310 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="UTF-8" Module Name: pkgsrc Committed By: adam Date: Fri Apr 16 06:55:33 UTC 2021 Modified Files: pkgsrc/net/ndiff: distinfo pkgsrc/net/nmap: Makefile Makefile.common PLIST distinfo pkgsrc/net/zenmap: PLIST distinfo Log Message: nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva] To generate a diff of this commit: cvs rdiff -u -r1.2 -r1.3 pkgsrc/net/ndiff/distinfo cvs rdiff -u -r1.145 -r1.146 pkgsrc/net/nmap/Makefile cvs rdiff -u -r1.3 -r1.4 pkgsrc/net/nmap/Makefile.common cvs rdiff -u -r1.30 -r1.31 pkgsrc/net/nmap/PLIST cvs rdiff -u -r1.79 -r1.80 pkgsrc/net/nmap/distinfo cvs rdiff -u -r1.2 -r1.3 pkgsrc/net/zenmap/PLIST pkgsrc/net/zenmap/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1618556133139310 Content-Disposition: inline Content-Length: 7291 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/ndiff/distinfo diff -u pkgsrc/net/ndiff/distinfo:1.2 pkgsrc/net/ndiff/distinfo:1.3 --- pkgsrc/net/ndiff/distinfo:1.2 Wed Aug 28 13:55:44 2019 +++ pkgsrc/net/ndiff/distinfo Fri Apr 16 06:55:33 2021 @@ -1,6 +1,6 @@ -$NetBSD: distinfo,v 1.2 2019/08/28 13:55:44 adam Exp $ +$NetBSD: distinfo,v 1.3 2021/04/16 06:55:33 adam Exp $ -SHA1 (nmap-7.80.tar.bz2) = cfd8162192cfe2623f5770b8ed3c6237791ff6bf -RMD160 (nmap-7.80.tar.bz2) = f9e2a71733fd25db98681286c9c2bf23d41bdd71 -SHA512 (nmap-7.80.tar.bz2) = d4384d3ebf4f3abf3588eed5433f733874ecdceb9342a718dc36db19634b0cc819d73399974eb0a9a9c9dd9e5c88473e07644ec91db28b0c072552b54430be6b -Size (nmap-7.80.tar.bz2) = 10550327 bytes +SHA1 (nmap-7.91.tar.bz2) = e72198f463ee9d557e4c5c9444cc5a0e5c36b00c +RMD160 (nmap-7.91.tar.bz2) = 3e011fdd6fb3b391a3cbfc6e4c7ec35ccfe1819b +SHA512 (nmap-7.91.tar.bz2) = 9d59f031b5f748311e9f9a0b9d05ad4a7a70fc6ac17598d7c4c81a4825c95d53817d74435d839e67b9379a052f2d37889fd634f9c75301a851f465d60fb9974d +Size (nmap-7.91.tar.bz2) = 10503500 bytes Index: pkgsrc/net/nmap/Makefile diff -u pkgsrc/net/nmap/Makefile:1.145 pkgsrc/net/nmap/Makefile:1.146 --- pkgsrc/net/nmap/Makefile:1.145 Fri Mar 19 08:50:57 2021 +++ pkgsrc/net/nmap/Makefile Fri Apr 16 06:55:33 2021 @@ -1,6 +1,5 @@ -# $NetBSD: Makefile,v 1.145 2021/03/19 08:50:57 sborrill Exp $ +# $NetBSD: Makefile,v 1.146 2021/04/16 06:55:33 adam Exp $ -PKGREVISION= 2 .include "Makefile.common" COMMENT= Network/port scanner with OS detection Index: pkgsrc/net/nmap/Makefile.common diff -u pkgsrc/net/nmap/Makefile.common:1.3 pkgsrc/net/nmap/Makefile.common:1.4 --- pkgsrc/net/nmap/Makefile.common:1.3 Fri Mar 13 08:55:37 2020 +++ pkgsrc/net/nmap/Makefile.common Fri Apr 16 06:55:33 2021 @@ -1,9 +1,9 @@ -# $NetBSD: Makefile.common,v 1.3 2020/03/13 08:55:37 tnn Exp $ +# $NetBSD: Makefile.common,v 1.4 2021/04/16 06:55:33 adam Exp $ # used by net/ndiff/Makefile # used by net/nmap/Makefile # used by net/zenmap/Makefile -DISTNAME= nmap-7.80 +DISTNAME= nmap-7.91 CATEGORIES= net security MASTER_SITES= http://nmap.org/dist/ EXTRACT_SUFX= .tar.bz2 Index: pkgsrc/net/nmap/PLIST diff -u pkgsrc/net/nmap/PLIST:1.30 pkgsrc/net/nmap/PLIST:1.31 --- pkgsrc/net/nmap/PLIST:1.30 Wed Aug 28 13:55:44 2019 +++ pkgsrc/net/nmap/PLIST Fri Apr 16 06:55:33 2021 @@ -1,4 +1,4 @@ -@comment $NetBSD: PLIST,v 1.30 2019/08/28 13:55:44 adam Exp $ +@comment $NetBSD: PLIST,v 1.31 2021/04/16 06:55:33 adam Exp $ bin/ncat bin/nmap bin/nping @@ -99,6 +99,7 @@ ${PLIST.lua}share/nmap/nselib/datafiles. ${PLIST.lua}share/nmap/nselib/datetime.lua ${PLIST.lua}share/nmap/nselib/dhcp.lua ${PLIST.lua}share/nmap/nselib/dhcp6.lua +${PLIST.lua}share/nmap/nselib/dicom.lua ${PLIST.lua}share/nmap/nselib/dns.lua ${PLIST.lua}share/nmap/nselib/dnsbl.lua ${PLIST.lua}share/nmap/nselib/dnssd.lua @@ -157,6 +158,7 @@ ${PLIST.lua}share/nmap/nselib/omp2.lua ${PLIST.lua}share/nmap/nselib/oops.lua ${PLIST.lua}share/nmap/nselib/openssl.luadoc ${PLIST.lua}share/nmap/nselib/ospf.lua +${PLIST.lua}share/nmap/nselib/outlib.lua ${PLIST.lua}share/nmap/nselib/packet.lua ${PLIST.lua}share/nmap/nselib/pcre.luadoc ${PLIST.lua}share/nmap/nselib/pgsql.lua @@ -300,6 +302,8 @@ ${PLIST.lua}share/nmap/scripts/daytime.n ${PLIST.lua}share/nmap/scripts/db2-das-info.nse ${PLIST.lua}share/nmap/scripts/deluge-rpc-brute.nse ${PLIST.lua}share/nmap/scripts/dhcp-discover.nse +${PLIST.lua}share/nmap/scripts/dicom-brute.nse +${PLIST.lua}share/nmap/scripts/dicom-ping.nse ${PLIST.lua}share/nmap/scripts/dict-info.nse ${PLIST.lua}share/nmap/scripts/distcc-cve2004-2687.nse ${PLIST.lua}share/nmap/scripts/dns-blacklist.nse @@ -790,6 +794,7 @@ ${PLIST.lua}share/nmap/scripts/ubiquiti- ${PLIST.lua}share/nmap/scripts/unittest.nse ${PLIST.lua}share/nmap/scripts/unusual-port.nse ${PLIST.lua}share/nmap/scripts/upnp-info.nse +${PLIST.lua}share/nmap/scripts/uptime-agent-info.nse ${PLIST.lua}share/nmap/scripts/url-snarf.nse ${PLIST.lua}share/nmap/scripts/ventrilo-info.nse ${PLIST.lua}share/nmap/scripts/versant-info.nse Index: pkgsrc/net/nmap/distinfo diff -u pkgsrc/net/nmap/distinfo:1.79 pkgsrc/net/nmap/distinfo:1.80 --- pkgsrc/net/nmap/distinfo:1.79 Wed Mar 18 17:58:43 2020 +++ pkgsrc/net/nmap/distinfo Fri Apr 16 06:55:33 2021 @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.79 2020/03/18 17:58:43 joerg Exp $ +$NetBSD: distinfo,v 1.80 2021/04/16 06:55:33 adam Exp $ -SHA1 (nmap-7.80.tar.bz2) = cfd8162192cfe2623f5770b8ed3c6237791ff6bf -RMD160 (nmap-7.80.tar.bz2) = f9e2a71733fd25db98681286c9c2bf23d41bdd71 -SHA512 (nmap-7.80.tar.bz2) = d4384d3ebf4f3abf3588eed5433f733874ecdceb9342a718dc36db19634b0cc819d73399974eb0a9a9c9dd9e5c88473e07644ec91db28b0c072552b54430be6b -Size (nmap-7.80.tar.bz2) = 10550327 bytes +SHA1 (nmap-7.91.tar.bz2) = e72198f463ee9d557e4c5c9444cc5a0e5c36b00c +RMD160 (nmap-7.91.tar.bz2) = 3e011fdd6fb3b391a3cbfc6e4c7ec35ccfe1819b +SHA512 (nmap-7.91.tar.bz2) = 9d59f031b5f748311e9f9a0b9d05ad4a7a70fc6ac17598d7c4c81a4825c95d53817d74435d839e67b9379a052f2d37889fd634f9c75301a851f465d60fb9974d +Size (nmap-7.91.tar.bz2) = 10503500 bytes SHA1 (patch-configure) = 5fc39f084eadd6ea0560cd8e6f52074113566600 SHA1 (patch-libdnet-stripped_src_arp-bsd.c) = c56c4e70eca2fa04dd8aab38ed2c3f4cac83f5e3 SHA1 (patch-libnetutil_netutil.cc) = 7bd1059d6cbcf4f6d129730d6c6f6bc3ab54c0a0 Index: pkgsrc/net/zenmap/PLIST diff -u pkgsrc/net/zenmap/PLIST:1.2 pkgsrc/net/zenmap/PLIST:1.3 --- pkgsrc/net/zenmap/PLIST:1.2 Wed Aug 28 13:55:44 2019 +++ pkgsrc/net/zenmap/PLIST Fri Apr 16 06:55:33 2021 @@ -1,4 +1,4 @@ -@comment $NetBSD: PLIST,v 1.2 2019/08/28 13:55:44 adam Exp $ +@comment $NetBSD: PLIST,v 1.3 2021/04/16 06:55:33 adam Exp $ bin/zenmap ${PYSITELIB}/${EGG_FILE} ${PYSITELIB}/radialnet/__init__.py @@ -319,9 +319,6 @@ ${PYSITELIB}/zenmapGUI/higwidgets/higtex ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.py ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.pyo -${PYSITELIB}/zenmapGUI/higwidgets/utils.py -${PYSITELIB}/zenmapGUI/higwidgets/utils.pyc -${PYSITELIB}/zenmapGUI/higwidgets/utils.pyo share/zenmap/config/scan_profile.usp share/zenmap/config/zenmap.conf share/zenmap/config/zenmap_version Index: pkgsrc/net/zenmap/distinfo diff -u pkgsrc/net/zenmap/distinfo:1.2 pkgsrc/net/zenmap/distinfo:1.3 --- pkgsrc/net/zenmap/distinfo:1.2 Wed Aug 28 13:55:44 2019 +++ pkgsrc/net/zenmap/distinfo Fri Apr 16 06:55:33 2021 @@ -1,7 +1,7 @@ -$NetBSD: distinfo,v 1.2 2019/08/28 13:55:44 adam Exp $ +$NetBSD: distinfo,v 1.3 2021/04/16 06:55:33 adam Exp $ -SHA1 (nmap-7.80.tar.bz2) = cfd8162192cfe2623f5770b8ed3c6237791ff6bf -RMD160 (nmap-7.80.tar.bz2) = f9e2a71733fd25db98681286c9c2bf23d41bdd71 -SHA512 (nmap-7.80.tar.bz2) = d4384d3ebf4f3abf3588eed5433f733874ecdceb9342a718dc36db19634b0cc819d73399974eb0a9a9c9dd9e5c88473e07644ec91db28b0c072552b54430be6b -Size (nmap-7.80.tar.bz2) = 10550327 bytes +SHA1 (nmap-7.91.tar.bz2) = e72198f463ee9d557e4c5c9444cc5a0e5c36b00c +RMD160 (nmap-7.91.tar.bz2) = 3e011fdd6fb3b391a3cbfc6e4c7ec35ccfe1819b +SHA512 (nmap-7.91.tar.bz2) = 9d59f031b5f748311e9f9a0b9d05ad4a7a70fc6ac17598d7c4c81a4825c95d53817d74435d839e67b9379a052f2d37889fd634f9c75301a851f465d60fb9974d +Size (nmap-7.91.tar.bz2) = 10503500 bytes SHA1 (patch-zenmapCore_Paths.py) = 55ccc83a8f7dd302e4b0ffc1df0837ff651ba913 --_----------=_1618556133139310--