diff options
author | Rene Ladan <rene@FreeBSD.org> | 2018-12-21 13:19:02 +0000 |
---|---|---|
committer | Rene Ladan <rene@FreeBSD.org> | 2018-12-21 13:19:02 +0000 |
commit | e5aaf05932b27919e9237fe077f607ac0f0d8e91 (patch) | |
tree | 094c99154e533e4d74dec6f4cc4c2f945ffea1b1 /security/stegdetect | |
parent | 5f1feec64d3df4447b1b8c5fd03f70f6b745b8ba (diff) |
Notes
Diffstat (limited to 'security/stegdetect')
-rw-r--r-- | security/stegdetect/Makefile | 38 | ||||
-rw-r--r-- | security/stegdetect/distinfo | 2 | ||||
-rw-r--r-- | security/stegdetect/files/patch-Makefile.in | 47 | ||||
-rw-r--r-- | security/stegdetect/files/patch-break_jsteg.c | 11 | ||||
-rw-r--r-- | security/stegdetect/files/patch-common.c | 47 | ||||
-rw-r--r-- | security/stegdetect/files/patch-stegdeimage.c | 12 | ||||
-rw-r--r-- | security/stegdetect/files/patch-stegdetect.c | 37 | ||||
-rw-r--r-- | security/stegdetect/files/patch-xsteg.c | 32 | ||||
-rw-r--r-- | security/stegdetect/pkg-descr | 13 | ||||
-rw-r--r-- | security/stegdetect/pkg-plist | 7 |
10 files changed, 0 insertions, 246 deletions
diff --git a/security/stegdetect/Makefile b/security/stegdetect/Makefile deleted file mode 100644 index ac2d8101f47e..000000000000 --- a/security/stegdetect/Makefile +++ /dev/null @@ -1,38 +0,0 @@ -# Created by: Mark Pulford <mark@kyne.com.au> -# $FreeBSD$ - -PORTNAME= stegdetect -PORTVERSION= 0.6 -PORTREVISION= 15 -CATEGORIES= security -MASTER_SITES= http://www.sourcefiles.org/Graphics/Tools/Miscellaneous/ - -MAINTAINER= ports@FreeBSD.org -COMMENT= Automated tool for detecting steganographic content in JPEGs - -DEPRECATED= Uses obsolete glib12 -EXPIRATION_DATE= 2018-12-20 - -OPTIONS_DEFINE= X11 -OPTIONS_DEFAULT= X11 - -OPTIONS_SUB= yes - -X11_LIB_DEPENDS= libevent.so:devel/libevent -X11_USE= GNOME=gtk12 XORG=x11,xext,xi -X11_CONFIGURE_ENV+= PATH_GTKCONFIG="${GTK_CONFIG}" - -# Note: stegdetect includes a modified version of jpeg-6b linked statically -GNU_CONFIGURE= yes -USES= gmake ssl -CONFIGURE_ARGS+=--program-prefix='' -CFLAGS+= -I${OPENSSLINC} -LDFLAGS+= -L${OPENSSLLIB} - -post-patch: - @${REINPLACE_CMD} 's;/usr/include/event;${LOCALBASE}/include;g' \ - ${WRKSRC}/configure -post-patch-X11-on: - @${REINPLACE_CMD} 's/gtk-config//g' ${WRKSRC}/configure - -.include <bsd.port.mk> diff --git a/security/stegdetect/distinfo b/security/stegdetect/distinfo deleted file mode 100644 index 614d17bbcc7a..000000000000 --- a/security/stegdetect/distinfo +++ /dev/null @@ -1,2 +0,0 @@ -SHA256 (stegdetect-0.6.tar.gz) = 71149fc9fc58c44a49a38c7013d22d8a861e45acb1074b6c3004b314c8e81a8d -SIZE (stegdetect-0.6.tar.gz) = 1269001 diff --git a/security/stegdetect/files/patch-Makefile.in b/security/stegdetect/files/patch-Makefile.in deleted file mode 100644 index 6b9361d548d8..000000000000 --- a/security/stegdetect/files/patch-Makefile.in +++ /dev/null @@ -1,47 +0,0 @@ ---- Makefile.in.orig 2004-08-31 14:59:42 UTC -+++ Makefile.in -@@ -70,7 +70,7 @@ AUTOMAKE_OPTIONS = foreign no-dependenci - - JPEGDIR = ./jpeg-6b - JPEGINC = -I$(JPEGDIR) --JPEGLIB = -L$(JPEGDIR) -ljpeg -+JPEGLIB = -L$(JPEGDIR) -ljpeg -lcrypto - JPEGDEP = $(JPEGDIR)/libjpeg.a - - FILEDIR = ./file -@@ -330,19 +330,23 @@ check-recursive installcheck-recursive i - @set fnord $(MAKEFLAGS); amf=$$2; \ - dot_seen=no; \ - target=`echo $@ | sed s/-recursive//`; \ -- list='$(SUBDIRS)'; for subdir in $$list; do \ -- echo "Making $$target in $$subdir"; \ -- if test "$$subdir" = "."; then \ -- dot_seen=yes; \ -- local_target="$$target-am"; \ -- else \ -- local_target="$$target"; \ -+ if test "$$target" = "install"; then \ -+ ($(MAKE) $(AM_MAKEFLAGS) $$target-am) || exit 1; \ -+ else \ -+ list='$(SUBDIRS)'; for subdir in $$list; do \ -+ echo "Making $$target in $$subdir"; \ -+ if test "$$subdir" = "."; then \ -+ dot_seen=yes; \ -+ local_target="$$target-am"; \ -+ else \ -+ local_target="$$target"; \ -+ fi; \ -+ (cd $$subdir && $(MAKE) $(AM_MAKEFLAGS) $$local_target) \ -+ || case "$$amf" in *=*) exit 1;; *k*) fail=yes;; *) exit 1;; esac; \ -+ done; \ -+ if test "$$dot_seen" = "no"; then \ -+ $(MAKE) $(AM_MAKEFLAGS) "$$target-am" || exit 1; \ - fi; \ -- (cd $$subdir && $(MAKE) $(AM_MAKEFLAGS) $$local_target) \ -- || case "$$amf" in *=*) exit 1;; *k*) fail=yes;; *) exit 1;; esac; \ -- done; \ -- if test "$$dot_seen" = "no"; then \ -- $(MAKE) $(AM_MAKEFLAGS) "$$target-am" || exit 1; \ - fi; test -z "$$fail" - - mostlyclean-recursive clean-recursive distclean-recursive \ diff --git a/security/stegdetect/files/patch-break_jsteg.c b/security/stegdetect/files/patch-break_jsteg.c deleted file mode 100644 index 9dbe0fdab5e6..000000000000 --- a/security/stegdetect/files/patch-break_jsteg.c +++ /dev/null @@ -1,11 +0,0 @@ ---- break_jsteg.c.orig 2004-08-29 23:11:00 UTC -+++ break_jsteg.c -@@ -162,7 +162,7 @@ break_jsteg_prepare(char *filename, shor - jstegob->skip = bytes - sizeof(jstegob->coeff); - - if (jsbits < max || off + jsbits > bits) { -- warnx("%s: bad size in bits, %d", __FUNCTION__, bits); -+ warnx("break_jsteg_prepare: bad size in bits, %d", bits); - return (NULL); - } - diff --git a/security/stegdetect/files/patch-common.c b/security/stegdetect/files/patch-common.c deleted file mode 100644 index 6c29c8067a57..000000000000 --- a/security/stegdetect/files/patch-common.c +++ /dev/null @@ -1,47 +0,0 @@ ---- common.c.orig 2004-08-29 23:11:00 UTC -+++ common.c -@@ -85,7 +85,7 @@ jpeg_getc(j_decompress_ptr cinfo) - - if (datasrc->bytes_in_buffer == 0) { - if (! (*datasrc->fill_input_buffer) (cinfo)) -- err(1, "%s: fill_input", __FUNCTION__); -+ err(1, "jpeg_getc: fill_input"); - } - datasrc->bytes_in_buffer--; - return GETJOCTET(*datasrc->next_input_byte++); -@@ -308,7 +308,7 @@ prepare_all_gradx(short **pdcts, int *pb - - dcts = malloc(bits * sizeof (short)); - if (dcts == NULL) { -- warn("%s: malloc", __FUNCTION__); -+ warn("prepare_all: malloc"); - return (-1); - } - -@@ -374,7 +374,7 @@ prepare_normal(short **pdcts, int *pbits - if (pdcts != NULL) { - dcts = malloc(bits * sizeof (short)); - if (dcts == NULL) { -- warn("%s: malloc", __FUNCTION__); -+ warn("prepare_normal: malloc"); - return (-1); - } - } -@@ -422,7 +422,7 @@ prepare_jphide(short **pdcts, int *pbits - /* XXX - wasteful */ - back[comp] = calloc(off, sizeof (char)); - if (back[comp] == NULL) { -- warn("%s: calloc", __FUNCTION__); -+ warn("prepare_jphide: calloc"); - goto err; - } - } -@@ -430,7 +430,7 @@ prepare_jphide(short **pdcts, int *pbits - if (pdcts != NULL) { - dcts = malloc(mbits * sizeof (short)); - if (dcts == NULL) { -- warn("%s: malloc", __FUNCTION__); -+ warn("prepare_jphide: malloc"); - goto err; - } - } diff --git a/security/stegdetect/files/patch-stegdeimage.c b/security/stegdetect/files/patch-stegdeimage.c deleted file mode 100644 index d3ffb0094765..000000000000 --- a/security/stegdetect/files/patch-stegdeimage.c +++ /dev/null @@ -1,12 +0,0 @@ ---- stegdeimage.c.orig 2004-08-29 23:11:00 UTC -+++ stegdeimage.c -@@ -70,9 +70,6 @@ dodeimage(char *file1, char *file2) - struct jpeg_error_mgr dsterr; - FILE *fp; - -- if (jpg_open("/home/stego_analysis/compress/dscf0033.jpg") == -1) -- return; -- - for (comp = 0; comp < 3; comp++) { - ohib[comp] = hib[comp]; - owib[comp] = wib[comp]; diff --git a/security/stegdetect/files/patch-stegdetect.c b/security/stegdetect/files/patch-stegdetect.c deleted file mode 100644 index 921c7d6357b3..000000000000 --- a/security/stegdetect/files/patch-stegdetect.c +++ /dev/null @@ -1,37 +0,0 @@ ---- stegdetect.c.orig 2004-09-03 04:01:35 UTC -+++ stegdetect.c -@@ -78,7 +78,6 @@ char *progname; - float DCThist[257]; - float scale = 1; /* Sensitivity scaling */ - --static int debug = 0; - static int quiet = 0; - static int ispositive = 0; /* Current images contain stego */ - static char *transformname; /* Current transform name */ -@@ -1227,7 +1226,7 @@ detect(char *filename, int scans) - strlcat(outbuf, quality(tmp, stars), sizeof(outbuf)); - flag = 1; - } -- no_f5: -+ no_f5:; - a_wasted_var = 0; - } - -@@ -1267,7 +1266,7 @@ detect(char *filename, int scans) - strlcat(outbuf, tmp, sizeof(outbuf)); - } - -- no_invisiblesecrets: -+ no_invisiblesecrets:; - a_wasted_var = 0; - } - -@@ -1332,7 +1331,7 @@ detect(char *filename, int scans) - } - - free(dcts); -- jsteg_error: -+ jsteg_error:; - a_wasted_var = 0; - } - diff --git a/security/stegdetect/files/patch-xsteg.c b/security/stegdetect/files/patch-xsteg.c deleted file mode 100644 index 6ac76e028cd2..000000000000 --- a/security/stegdetect/files/patch-xsteg.c +++ /dev/null @@ -1,32 +0,0 @@ ---- xsteg.c.orig 2004-08-31 14:58:21 UTC -+++ xsteg.c -@@ -56,9 +56,6 @@ - #define FLAG_DOINVIS 0x0008 - #define FLAG_DOF5 0x0010 - --extern int (*event_sigcb)(void); --extern int event_gotsig; -- - struct event start_ev; - struct event gtk_ev; - int quit = 0; -@@ -744,8 +741,7 @@ chld_handler(int sig) - sigprocmask(SIG_BLOCK, &set, &oldset); - - while ((pid = waitpid(-1, &status, WNOHANG)) > 0) { -- if (WIFEXITED(status) || WIFSIGNALED(status)) -- event_gotsig = 1; -+ ; - } - - signal(SIGCHLD, chld_handler); -@@ -1106,8 +1102,7 @@ main(int argc, char *argv[] ) - gtk_widget_show(window); - - event_init(); -- event_sigcb = signal_cb; -- -+ - add_gtk_timeout(); - - event_dispatch(); diff --git a/security/stegdetect/pkg-descr b/security/stegdetect/pkg-descr deleted file mode 100644 index c182f3de1329..000000000000 --- a/security/stegdetect/pkg-descr +++ /dev/null @@ -1,13 +0,0 @@ -Stegdetect is an automated tool for detecting steganographic content -in images. It is capable of detecting several different -steganographic methods to embed hidden information in JPEG images. -Currently, the detectable schemes are: - - * jsteg - * jphide (Unix and Windows) - * invisible secrets - * outguess 01.3b - * F5 - * appendX and camouflage - -WWW: http://www.outguess.org/detection.php diff --git a/security/stegdetect/pkg-plist b/security/stegdetect/pkg-plist deleted file mode 100644 index 71a66f3e8b10..000000000000 --- a/security/stegdetect/pkg-plist +++ /dev/null @@ -1,7 +0,0 @@ -bin/stegdetect -bin/stegbreak -bin/stegcompare -bin/stegdeimage -%%X11%%bin/xsteg -man/man1/stegbreak.1.gz -man/man1/stegdetect.1.gz |