SHA256
1
0
forked from pool/wireshark

Accepting request 518967 from network:utilities

1

OBS-URL: https://build.opensuse.org/request/show/518967
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/wireshark?expand=0&rev=127
This commit is contained in:
Dominique Leuenberger 2017-08-28 13:18:18 +00:00 committed by Git OBS Bridge
commit ccbd6398b7
6 changed files with 140 additions and 86 deletions

View File

@ -1,48 +0,0 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-2.2.8.tar.bz2: 32331209 bytes
SHA256(wireshark-2.2.8.tar.bz2)=ecf02c148c9ab6e809026ad5743fe9be1739a9840ef6fece6837a7ddfbdf7edc
RIPEMD160(wireshark-2.2.8.tar.bz2)=58b46222b2a5cea2923c82f4eff95ad04b702f1a
SHA1(wireshark-2.2.8.tar.bz2)=605d4323e9ac0122eca47a5c17ec14daf34b1ea1
MD5(wireshark-2.2.8.tar.bz2)=bb81d0ecf3a8ed46bedfaeae6fd318a8
Wireshark-win32-2.2.8.exe: 44569240 bytes
SHA256(Wireshark-win32-2.2.8.exe)=7bfd50b9bbeeba6cc55c8f660e9e44c643791ee306227584299b560843f1564c
RIPEMD160(Wireshark-win32-2.2.8.exe)=5862ef866c657cedca6ee587a9e87387fd1bac8f
SHA1(Wireshark-win32-2.2.8.exe)=6c86be620ef189b5f1637b2c9f6bd576fee9894f
MD5(Wireshark-win32-2.2.8.exe)=65e04d901c65d704ab936d0f9ecfb0e2
Wireshark-win64-2.2.8.exe: 49409656 bytes
SHA256(Wireshark-win64-2.2.8.exe)=caa8e6b1a69964594cfc5d4ebd16255a8ba80f54044c0d9c9352a798bde2bc89
RIPEMD160(Wireshark-win64-2.2.8.exe)=9fd69129d4bd1a1c3b08396100eb000e109fd32b
SHA1(Wireshark-win64-2.2.8.exe)=23e3b2d6d917d60c106c9a52f1d603be7cef3e82
MD5(Wireshark-win64-2.2.8.exe)=60d00d0e82eacf9bad6cabf052356e3d
WiresharkPortable_2.2.8.paf.exe: 46164528 bytes
SHA256(WiresharkPortable_2.2.8.paf.exe)=510f9e1105e145739ee1cebfcad4ad8ab20d3336623ce807b3dd8d925dbebf8c
RIPEMD160(WiresharkPortable_2.2.8.paf.exe)=f9a4fc82a59c60b1d616c5df6515d553d1d2157a
SHA1(WiresharkPortable_2.2.8.paf.exe)=64bc24c167998323212abb8330ea1ab52de6122c
MD5(WiresharkPortable_2.2.8.paf.exe)=72c677725c9e218450dc2a63db5e11ba
Wireshark 2.2.8 Intel 64.dmg: 33444845 bytes
SHA256(Wireshark 2.2.8 Intel 64.dmg)=efc681a6ef2bb52e76e15853c5d1b143078c548951d256283a53cc61c894d77f
RIPEMD160(Wireshark 2.2.8 Intel 64.dmg)=c64e6ce2ce586a3ccdd179e265d1469a43b7883d
SHA1(Wireshark 2.2.8 Intel 64.dmg)=b066c7bf1c90b3287ab1ced3ea3e430e6e7c94d4
MD5(Wireshark 2.2.8 Intel 64.dmg)=3aca252edf8518be821ab100b8efdd0d
-----BEGIN PGP SIGNATURE-----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=5kXd
-----END PGP SIGNATURE-----

60
SIGNATURES-2.4.0.txt Normal file
View File

@ -0,0 +1,60 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
wireshark-2.4.0.tar.xz: 28755596 bytes
SHA256(wireshark-2.4.0.tar.xz)=890bb41b826ff04e98fb089446ab37e5871e16205278bfeffc2a7c7364de3b04
RIPEMD160(wireshark-2.4.0.tar.xz)=277b417c0e52f7e5ad9278c63a7d5ac74e552518
SHA1(wireshark-2.4.0.tar.xz)=aa8f53300f60956553902ccc755c0dfe86f768fc
MD5(wireshark-2.4.0.tar.xz)=655106f8cf3bb8f521336d3a8ab5b10b
Wireshark-win64-2.4.0.exe: 59110928 bytes
SHA256(Wireshark-win64-2.4.0.exe)=341f97b1d8fc25b4e149fb20b718451aa8646856faa0576071037e60ed47f8b0
RIPEMD160(Wireshark-win64-2.4.0.exe)=57c5eca5d4efcb1c2b8c80cd79e6cb4d505e9c03
SHA1(Wireshark-win64-2.4.0.exe)=0452d3aa7ad1cc1240c0cdd9457159de244ca8be
MD5(Wireshark-win64-2.4.0.exe)=f611afe4a6d59f7ad18fd573232e30fe
Wireshark-win32-2.4.0.exe: 53570224 bytes
SHA256(Wireshark-win32-2.4.0.exe)=971e6021d6ba214aa938ff43436b70525efc8f5286e556066dfa4863603e7c5e
RIPEMD160(Wireshark-win32-2.4.0.exe)=04cd96b19aff8375fe1217c1829a850d1a3753ca
SHA1(Wireshark-win32-2.4.0.exe)=6e8351cb2aba06173aabc907922338edbcda63d2
MD5(Wireshark-win32-2.4.0.exe)=d96a10a99ca06e36528a0e6c662c17e5
Wireshark-win32-2.4.0.msi: 43032576 bytes
SHA256(Wireshark-win32-2.4.0.msi)=b730430387efab0bc3b01e5f10a2e708672d75157663c251fcb20431d6649a9f
RIPEMD160(Wireshark-win32-2.4.0.msi)=d726fbb03f9fdf64771620955ec6ae1924b23fbf
SHA1(Wireshark-win32-2.4.0.msi)=fe3cb12f5efa30e0619e81ba81271b334e4cd053
MD5(Wireshark-win32-2.4.0.msi)=5cd3e1b7ed315c3f5e928c9c8001dbf9
Wireshark-win64-2.4.0.msi: 48455680 bytes
SHA256(Wireshark-win64-2.4.0.msi)=609262ab1ecdda6fd3ed3a5ccddfb5b8d939b7a28616c5dacddcb1528c2b02d9
RIPEMD160(Wireshark-win64-2.4.0.msi)=e74ec7c8892a9413074cb1474d9fa335829c05be
SHA1(Wireshark-win64-2.4.0.msi)=1f4437025097362c8e76841a7569bb72da6cd036
MD5(Wireshark-win64-2.4.0.msi)=6fb4c41eb8a5300e0b0200ea7c1d56a4
WiresharkPortable_2.4.0.paf.exe: 46243888 bytes
SHA256(WiresharkPortable_2.4.0.paf.exe)=76dfafd12ad82a19fffe0d99b48e9ba5dd1b77ce9c566dcf19cdf32fffb40f22
RIPEMD160(WiresharkPortable_2.4.0.paf.exe)=65cbdfca286976a652a931c8e0c989c4e431efbe
SHA1(WiresharkPortable_2.4.0.paf.exe)=8c84ecf4455f34f7624ae1056f1af568a02bd2e0
MD5(WiresharkPortable_2.4.0.paf.exe)=8544747f6a4a89ee88d965953a1ff8b1
Wireshark 2.4.0 Intel 64.dmg: 35144406 bytes
SHA256(Wireshark 2.4.0 Intel 64.dmg)=20c2e5fa8ec302fc47100ad42f8d2020e629a72b75a7343929206d3274bd08b2
RIPEMD160(Wireshark 2.4.0 Intel 64.dmg)=978eab476a2ab3dcae2080902dc3d8f223f21aed
SHA1(Wireshark 2.4.0 Intel 64.dmg)=5aecbddef5a762a0a4c36c9312b727bf671c0992
MD5(Wireshark 2.4.0 Intel 64.dmg)=2cf632f801dc810c5f0378fa983fc9e9
-----BEGIN PGP SIGNATURE-----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=DSoc
-----END PGP SIGNATURE-----

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:ecf02c148c9ab6e809026ad5743fe9be1739a9840ef6fece6837a7ddfbdf7edc
size 32331209

3
wireshark-2.4.0.tar.xz Normal file
View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:890bb41b826ff04e98fb089446ab37e5871e16205278bfeffc2a7c7364de3b04
size 28755596

View File

@ -1,3 +1,56 @@
-------------------------------------------------------------------
Sat Aug 26 15:11:56 UTC 2017 - jengelh@inai.de
- Trim filler wording from description.
-------------------------------------------------------------------
Mon Aug 21 12:48:39 UTC 2017 - tchvatal@suse.com
- Gcrypt is now default
- gtk switch was redone to accept value at the end instead of 2
options
-------------------------------------------------------------------
Thu Jul 27 08:21:59 UTC 2017 - astieger@suse.com
- Wireshark 2.4.0:
* SS7 Point Codes can now be resolved into names with a hosts-
like file.
* Wireshark can now go fullscreen to have more room for packets
* TShark can now export objects like the other GUI interfaces.
* Support for G.722 and G.726 codecs in the RTP Player (via the
SpanDSP library)
* You can now choose the output device when playing RTP streams
* Added support for dissectors to include a unit name natively
in their hf field. A field can now automatically append
"seconds" or "ms" to its value without additional printf-style
APIs
* The Default profile can now be reset to default values.
* You can move back and forth in the selection history in the
Qt UI.
* IEEE 802.15.4 dissector now uses an UAT for decryption keys.
The original decryption key preference has been obsoleted.
* Extcap utilities can now provide configuration for a GUI
interface toolbar to control the extcap utility while capturing.
* Extcap utilities can now validate the capture filter.
* Display filter function len() can now be used on all string and
byte fields.
* Added an experimental timeline view for 802.11 wireless packet
data which can be enabled via the "802.11 radio information
preferences.
* Added TLS 1.3 (draft 21) dissection and decryption support
* The (D)TLS Application Layer protocol (e.g. HTTP or CoAP) can
now be changed via the Decode As dialog.
* The RSA keys dialog for SSL keys has improved feedback for
invalid settings and no longer requires the IP address, Port or
Protocol fields to be set in addition to the Key File.
* TCP Analysis will detect and flag more spurious retransmissions.
* Many new and updated protocol support
* New and updated Capture File Support:
ERF, IxVeriWave, Libpcap, and Pcap-ng
* API changes: IEEE802.11: wlan_mgt display filter element got
renamed to wlan.
-------------------------------------------------------------------
Tue Jul 18 21:29:37 UTC 2017 - astieger@suse.com

View File

@ -17,10 +17,10 @@
# define libraries
%define libutil libwsutil7
%define libwire libwireshark8
%define libtap libwiretap6
%define libcodecs libwscodecs1
%define libutil libwsutil8
%define libwire libwireshark10
%define libtap libwiretap7
%define libcodecs libwscodecs0
# disable caps
%define use_caps 0
# Enable new Qt gui on new releases and build old GTK2 gui on old releases
@ -36,13 +36,13 @@
%bcond_with geoip
%endif
Name: wireshark
Version: 2.2.8
Version: 2.4.0
Release: 0
Summary: A Network Traffic Analyser
License: GPL-2.0+ and GPL-3.0+
License: GPL-2.0+ AND GPL-3.0+
Group: Productivity/Networking/Diagnostic
Url: https://www.wireshark.org/
Source: https://www.wireshark.org/download/src/%{name}-%{version}.tar.bz2
Source: https://www.wireshark.org/download/src/%{name}-%{version}.tar.xz
Source2: https://www.wireshark.org/download/SIGNATURES-%{version}.txt
Source3: https://www.wireshark.org/download/gerald_at_wireshark_dot_org.gpg#/wireshark.keyring
# PATCH-FIX-OPENSUSE wireshark-1.6.3-disable-warning-dialog.patch bnc#349782 prusnak@suse.cz -- don't show warning when running as root
@ -57,7 +57,7 @@ BuildRequires: glib2-devel
BuildRequires: hicolor-icon-theme
BuildRequires: krb5-devel
BuildRequires: libcares-devel
BuildRequires: libgcrypt-devel >= 1.1.92
BuildRequires: libgcrypt-devel >= 1.4.2
BuildRequires: libpcap-devel
BuildRequires: libsmi-devel
BuildRequires: libtool
@ -74,7 +74,6 @@ Requires(pre): shadow
Recommends: wireshark-ui = %{version}
Provides: ethereal = %{version}
Obsoletes: ethereal < %{version}
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%if %{with gnutls}
BuildRequires: libgnutls-devel >= 2.12.0
%endif
@ -108,14 +107,17 @@ BuildRequires: lua52-devel
%else
BuildRequires: lua-devel
%endif
%if 0%{?suse_version} <= 1110
BuildRequires: xz
%endif
%description
Wireshark is a free network protocol analyzer for Unix and Windows. It
allows you to examine data from a live network or from a capture file
on disk. You can interactively browse the capture data, viewing summary
and detail information for each packet. Wireshark has several powerful
features, including a rich display filter language and the ability to
view the reconstructed stream of a TCP session.
Wireshark is a network protocol analyzer. It allows examining data
from a live network or from a capture file on disk. You can
interactively browse the capture data, viewing summary and detailed
information for each packet. Wireshark has several features,
including a rich display filter language and the ability to view the
reconstructed stream of a TCP session.
%package -n %{libutil}
Summary: Library for wireshark utilities
@ -161,12 +163,8 @@ Provides: ethereal-devel = %{version}
Obsoletes: ethereal-devel < %{version}
%description devel
Wireshark is a free network protocol analyzer for Unix and Windows. It
allows you to examine data from a live network or from a capture file
on disk. You can interactively browse the capture data, viewing summary
and detail information for each packet. Wireshark has several powerful
features, including a rich display filter language and the ability to
view the reconstructed stream of a TCP session.
Wireshark is a network protocol analyzer. It allows examining data
from a live network or from a capture file on disk.
%if %{with gtk}
%package ui-gtk
@ -195,9 +193,9 @@ This package contains the Qt based UI for Wireshark.
%prep
# The publisher doesn't sign the source tarball, but a signatures file containing multiple hashes.
# Verify hashes in that file against source tarball.
echo "`grep %{name}-%{version}.tar.bz2 %{SOURCE2} | grep MD5 | head -n1 | cut -d= -f2` %{SOURCE0}" | md5sum -c
echo "`grep %{name}-%{version}.tar.bz2 %{SOURCE2} | grep SHA1 | head -n1 | cut -d= -f2` %{SOURCE0}" | sha1sum -c
echo "`grep %{name}-%{version}.tar.bz2 %{SOURCE2} | grep SHA256 | head -n1 | cut -d= -f2` %{SOURCE0}" | sha256sum -c
echo "`grep %{name}-%{version}.tar.xz %{SOURCE2} | grep MD5 | head -n1 | cut -d= -f2` %{SOURCE0}" | md5sum -c
echo "`grep %{name}-%{version}.tar.xz %{SOURCE2} | grep SHA1 | head -n1 | cut -d= -f2` %{SOURCE0}" | sha1sum -c
echo "`grep %{name}-%{version}.tar.xz %{SOURCE2} | grep SHA256 | head -n1 | cut -d= -f2` %{SOURCE0}" | sha256sum -c
%setup -q
%patch2 -p1
@ -228,8 +226,7 @@ export PATH="%{_libdir}/qt5/bin:$PATH"
%configure \
%if %{with gtk}
--with-gtk3=no \
--with-gtk2=yes \
--with-gtk=2 \
%endif
%if %{with qt}
--with-qt=yes \
@ -242,7 +239,6 @@ export PATH="%{_libdir}/qt5/bin:$PATH"
%else
--with-gnutls=no \
%endif
--with-gcrypt=yes \
--with-plugins=%{_libdir}/%{name}/plugins/%{version} \
--with-pic=yes
@ -348,7 +344,6 @@ exit 0
%postun -n %{libcodecs} -p /sbin/ldconfig
%files
%defattr(-,root,root)
%doc AUTHORS COPYING NEWS README README.linux README.vmware
%{_mandir}/man1/[^i]*
%{_mandir}/man4/*
@ -364,6 +359,7 @@ exit 0
%{_bindir}/tethereal
%{_bindir}/text2pcap
%{_bindir}/tshark
%{_bindir}/sharkd
%if %{use_caps}
%verify(not mode caps) %attr(0750,root,wireshark) %caps(cap_net_raw,cap_net_admin=eip) %{_bindir}/dumpcap
%else
@ -377,23 +373,18 @@ exit 0
%{_datadir}/mime/packages/wireshark.xml
%files -n %{libutil}
%defattr(-,root,root)
%{_libdir}/libwsutil*.so.*
%files -n %{libwire}
%defattr(-,root,root)
%{_libdir}/libwireshark.so.*
%files -n %{libtap}
%defattr(-,root,root)
%{_libdir}/libwiretap.so.*
%files -n %{libcodecs}
%defattr(-,root,root)
%{_libdir}/libwscodecs.so.*
%files devel
%defattr(-,root,root)
%doc doc/README.*
%{_includedir}/wireshark
%{_libdir}/lib*.so
@ -401,7 +392,6 @@ exit 0
%if %{with gtk}
%files ui-gtk
%defattr(-,root,root)
%{_bindir}/wireshark-gtk
%{_bindir}/ethereal
%{_datadir}/applications/wireshark-gtk.desktop
@ -425,7 +415,6 @@ test -f /sbin/conf.d/SuSEconfig.glib2 && SuSEconfig --module glib2 > /dev/null |
%if %{with qt}
%files ui-qt
%defattr(-,root,root)
%{_bindir}/wireshark
%{_bindir}/ethereal
%dir %{_datadir}/appdata