+++ /dev/null
-#
-# Copyright (c) 2019 OpenWrt.org
-#
-# This is free software, licensed under the BSD 2-Clause License.
-#
-
-include $(TOPDIR)/rules.mk
-
-PKG_NAME:=port-mirroring
-PKG_VERSION:=1.4.4
-PKG_RELEASE:=4
-
-PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
-PKG_SOURCE_URL:=https://codeload.github.com/mmaraya/port-mirroring/tar.gz/v$(PKG_VERSION)?
-PKG_HASH:=9fb259d24cee4fe1bed1a51c49e52a8eb05b692ba1b5debb75fdf54957cc8ed1
-
-PKG_LICENSE:=BSD-2-Clause
-PKG_LICENSE_FILES:=LICENSE
-
-PKG_FIXUP:=autoreconf
-
-include $(INCLUDE_DIR)/package.mk
-
-define Package/port-mirroring
- SECTION:=net
- CATEGORY:=Network
- DEPENDS:=+libpcap +libpthread
- TITLE:=Copy network packets with optional support for TaZmen Sniffer Protocol (TZSP)
- URL:=https://github.com/mmaraya/port-mirroring
- MENU:=1
-endef
-
-define Package/port-mirroring/conffiles
-/etc/config/port-mirroring
-endef
-
-define Package/port-mirroring/install
- $(INSTALL_DIR) $(1)/usr/sbin
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/bin/port-mirroring $(1)/usr/sbin/
- $(INSTALL_DIR) $(1)/etc/config
- $(INSTALL_CONF) $(PKG_BUILD_DIR)/openwrt/port-mirroring.conf $(1)/etc/config/port-mirroring
- $(INSTALL_DIR) $(1)/etc/init.d
- $(INSTALL_BIN) $(PKG_BUILD_DIR)/openwrt/port-mirroringd $(1)/etc/init.d/port_mirroring
-endef
-
-$(eval $(call BuildPackage,port-mirroring))
-
+++ /dev/null
---- a/src/main.c
-+++ b/src/main.c
-@@ -90,7 +90,7 @@ int loadCfg(const char *fpath)
- }
- else
- {
-- snprintf(cfg.dst_if, IFNAMSIZ, "%s", value);
-+ strncpy(cfg.dst_if, value, IFNAMSIZ);
- cfg.flags |= PM_DST_IF;
- }
- }
-@@ -104,7 +104,7 @@ int loadCfg(const char *fpath)
- }
- else if (strcmp(option, "filter") == 0)
- {
-- snprintf(cfg.pfe, PFE_MAX, "%s", value);
-+ strncpy(cfg.pfe, value, PFE_MAX);
- }
- else if (strcmp(option, "promiscuous") == 0)
- {
+++ /dev/null
---- a/src/main.c
-+++ b/src/main.c
-@@ -252,7 +252,7 @@ void packet_handler_ex(const struct pcap
- if (handle == NULL || pcap_sendpacket(handle, pkt_data, header->len) != 0)
- {
- //error detected
-- long nowTime;
-+ time_t nowTime;
- time(&nowTime);
- if (nowTime - cfg.init_time > ERRTIMEOUT && header->len < 1500)
- {
-@@ -282,7 +282,7 @@ void packet_handler_ex(const struct pcap
- if (handle == NULL || pcap_sendpacket(handle, buf, header->len) != 0)
- {
- //error detected
-- long nowTime;
-+ time_t nowTime;
- time(&nowTime);
- if (nowTime - cfg.init_time > ERRTIMEOUT && header->len < 1500)
- {