mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
* [ptxdist] [PATCH] netcat: version bump 1.228 -> 1.234
@ 2025-10-24 13:30 Sven Püschel
  0 siblings, 0 replies; only message in thread
From: Sven Püschel @ 2025-10-24 13:30 UTC (permalink / raw)
  To: ptxdist; +Cc: Sven Püschel

Tested the license included in netcat.c with the SPDX Online Tool [1]
and adjusted the license to the 3 clause variant accordingly.

[1] https://tools.spdx.org/app/check_license/

Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
---
 .../0001-Port-to-linux-with-libbsd.patch      |  69 +++++-----
 .../0002-Build-without-TLS-support.patch      | 123 +++++++++---------
 .../0003-Fix-connect-timeout.patch            |  15 ++-
 ...to-specify-destination-ports-by-name.patch |  11 +-
 ...ranslate-terminal-line-feeds-to-CRLF.patch |  35 ++---
 ...6-New-flag-q-to-specify-a-quit-timer.patch |  29 +++--
 .../0007-Fix-UDP-scan-timeout.patch           |  11 +-
 .../0008-New-flag-Z-for-DCCP-support.patch    |  43 +++---
 ...009-New-flag-b-for-broadcast-support.patch |  19 +--
 ...ialized-handling-of-multiple-clients.patch |  15 ++-
 ...ix-TCP-MD5SIG-for-client-connections.patch |  23 ++--
 ...-specify-a-list-of-destination-ports.patch |  23 ++--
 ...se-s-p-flags-to-specify-listening-ad.patch |  13 +-
 ...fo-3-errors-non-fatal-in-report_sock.patch |   8 +-
 ...-abstract-UNIX-domain-socket-support.patch |  21 +--
 .../0016-Misc-failures-and-features.patch     |  25 ++--
 .../series                                    |   3 +-
 rules/netcat.make                             |  10 +-
 18 files changed, 273 insertions(+), 223 deletions(-)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0001-Port-to-linux-with-libbsd.patch (87%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0002-Build-without-TLS-support.patch (86%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0003-Fix-connect-timeout.patch (89%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0004-Add-ability-to-specify-destination-ports-by-name.patch (69%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch (85%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0006-New-flag-q-to-specify-a-quit-timer.patch (87%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0007-Fix-UDP-scan-timeout.patch (80%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0008-New-flag-Z-for-DCCP-support.patch (84%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0009-New-flag-b-for-broadcast-support.patch (82%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0010-Serialized-handling-of-multiple-clients.patch (70%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0011-Fix-TCP-MD5SIG-for-client-connections.patch (80%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0012-Add-ability-to-specify-a-list-of-destination-ports.patch (90%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch (88%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch (80%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0015-Add-abstract-UNIX-domain-socket-support.patch (89%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/0016-Misc-failures-and-features.patch (86%)
 rename patches/{netcat-openbsd-1.228 => netcat-openbsd-1.234}/series (90%)

diff --git a/patches/netcat-openbsd-1.228/0001-Port-to-linux-with-libbsd.patch b/patches/netcat-openbsd-1.234/0001-Port-to-linux-with-libbsd.patch
similarity index 87%
rename from patches/netcat-openbsd-1.228/0001-Port-to-linux-with-libbsd.patch
rename to patches/netcat-openbsd-1.234/0001-Port-to-linux-with-libbsd.patch
index 3488d2be7..0bfb49f9d 100644
--- a/patches/netcat-openbsd-1.228/0001-Port-to-linux-with-libbsd.patch
+++ b/patches/netcat-openbsd-1.234/0001-Port-to-linux-with-libbsd.patch
@@ -1,12 +1,15 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 15:59:31 +0800
 Subject: [PATCH] Port to linux with libbsd
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
 Forwarded: not-needed
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  Makefile |  16 +++++++-
  nc.1     |   3 +-
@@ -39,7 +42,7 @@ index 5f20c40cf75c..93ca5ee64cd9 100644
 +clean:
 +	rm -f $(OBJS) nc
 diff --git a/nc.1 b/nc.1
-index 76b6dc018ea3..596bd8e21694 100644
+index 2ffdcd1ea602..75ac68bb5ed5 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -213,8 +213,6 @@ Proxy authentication is only supported for HTTP CONNECT proxies at present.
@@ -51,7 +54,7 @@ index 76b6dc018ea3..596bd8e21694 100644
  .It Fl R Ar CAfile
  Load the root CA bundle for TLS certificate verification from
  .Ar CAfile ,
-@@ -273,6 +271,7 @@ For the IPv4 TOS/IPv6 traffic class value,
+@@ -277,6 +275,7 @@ For the IPv4 TOS/IPv6 traffic class value,
  may be one of
  .Cm critical ,
  .Cm inetcontrol ,
@@ -60,7 +63,7 @@ index 76b6dc018ea3..596bd8e21694 100644
  .Cm netcontrol ,
  .Cm throughput ,
 diff --git a/netcat.c b/netcat.c
-index a25c4f175ae1..216d3ec21503 100644
+index e3c9c939e246..d235c55f5108 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -32,6 +32,8 @@
@@ -131,7 +134,7 @@ index a25c4f175ae1..216d3ec21503 100644
  
  #include "atomicio.h"
  
-@@ -269,10 +316,14 @@ main(int argc, char *argv[])
+@@ -272,10 +319,14 @@ main(int argc, char *argv[])
  			uflag = 1;
  			break;
  		case 'V':
@@ -146,7 +149,7 @@ index a25c4f175ae1..216d3ec21503 100644
  			break;
  		case 'v':
  			vflag = 1;
-@@ -321,7 +372,11 @@ main(int argc, char *argv[])
+@@ -324,7 +375,11 @@ main(int argc, char *argv[])
  			oflag = optarg;
  			break;
  		case 'S':
@@ -158,7 +161,7 @@ index a25c4f175ae1..216d3ec21503 100644
  			break;
  		case 'T':
  			errstr = NULL;
-@@ -346,13 +401,22 @@ main(int argc, char *argv[])
+@@ -349,13 +404,22 @@ main(int argc, char *argv[])
  	argc -= optind;
  	argv += optind;
  
@@ -181,7 +184,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	} else if (argc == 1 && lflag) {
  		uport = argv[0];
  	} else if (argc == 2) {
-@@ -396,33 +460,6 @@ main(int argc, char *argv[])
+@@ -399,33 +463,6 @@ main(int argc, char *argv[])
  		}
  	}
  
@@ -215,7 +218,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	if (!lflag && kflag)
  		errx(1, "must use -l with -k");
  	if (uflag && usetls)
-@@ -579,10 +616,6 @@ main(int argc, char *argv[])
+@@ -584,10 +621,6 @@ main(int argc, char *argv[])
  			if (s == -1)
  				err(1, NULL);
  			if (uflag && kflag) {
@@ -226,7 +229,7 @@ index a25c4f175ae1..216d3ec21503 100644
  				/*
  				 * For UDP and -k, don't connect the socket,
  				 * let it receive datagrams from multiple
-@@ -609,10 +642,6 @@ main(int argc, char *argv[])
+@@ -614,10 +647,6 @@ main(int argc, char *argv[])
  				if (rv == -1)
  					err(1, "connect");
  
@@ -237,7 +240,7 @@ index a25c4f175ae1..216d3ec21503 100644
  				if (vflag)
  					report_sock("Connection received",
  					    (struct sockaddr *)&z, len,
-@@ -938,8 +967,10 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
+@@ -943,8 +972,10 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
  		if (sflag || pflag) {
  			struct addrinfo ahints, *ares;
  
@@ -248,7 +251,7 @@ index a25c4f175ae1..216d3ec21503 100644
  			memset(&ahints, 0, sizeof(struct addrinfo));
  			ahints.ai_family = res->ai_family;
  			ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM;
-@@ -1052,9 +1083,15 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
+@@ -1057,9 +1088,15 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
  		    res->ai_protocol)) == -1)
  			continue;
  
@@ -264,7 +267,7 @@ index a25c4f175ae1..216d3ec21503 100644
  
  		set_common_sockopts(s, res->ai_family);
  
-@@ -1559,11 +1596,13 @@ set_common_sockopts(int s, int af)
+@@ -1564,11 +1601,13 @@ set_common_sockopts(int s, int af)
  {
  	int x = 1;
  
@@ -278,7 +281,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	if (Dflag) {
  		if (setsockopt(s, SOL_SOCKET, SO_DEBUG,
  		    &x, sizeof(x)) == -1)
-@@ -1574,9 +1613,14 @@ set_common_sockopts(int s, int af)
+@@ -1579,9 +1618,14 @@ set_common_sockopts(int s, int af)
  		    IP_TOS, &Tflag, sizeof(Tflag)) == -1)
  			err(1, "set IP ToS");
  
@@ -293,7 +296,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	}
  	if (Iflag) {
  		if (setsockopt(s, SOL_SOCKET, SO_RCVBUF,
-@@ -1594,19 +1638,34 @@ set_common_sockopts(int s, int af)
+@@ -1599,19 +1643,34 @@ set_common_sockopts(int s, int af)
  		    IP_TTL, &ttl, sizeof(ttl)))
  			err(1, "set IP TTL");
  
@@ -328,7 +331,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	}
  }
  
-@@ -1641,6 +1700,7 @@ process_tos_opt(char *s, int *val)
+@@ -1646,6 +1705,7 @@ process_tos_opt(char *s, int *val)
  		{ "cs7",		IPTOS_DSCP_CS7 },
  		{ "ef",			IPTOS_DSCP_EF },
  		{ "inetcontrol",	IPTOS_PREC_INTERNETCONTROL },
@@ -336,7 +339,7 @@ index a25c4f175ae1..216d3ec21503 100644
  		{ "lowdelay",		IPTOS_LOWDELAY },
  		{ "netcontrol",		IPTOS_PREC_NETCONTROL },
  		{ "reliability",	IPTOS_RELIABILITY },
-@@ -1805,6 +1865,9 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
+@@ -1815,6 +1875,9 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
  void
  help(void)
  {
@@ -346,7 +349,7 @@ index a25c4f175ae1..216d3ec21503 100644
  	usage(0);
  	fprintf(stderr, "\tCommand Summary:\n\
  	\t-4		Use IPv4\n\
-@@ -1847,7 +1910,7 @@ help(void)
+@@ -1857,7 +1920,7 @@ help(void)
  	\t-Z		Peer certificate file\n\
  	\t-z		Zero-I/O mode [used for scanning]\n\
  	Port numbers can be individual or ranges: lo-hi [inclusive]\n");
@@ -356,7 +359,7 @@ index a25c4f175ae1..216d3ec21503 100644
  
  void
 diff --git a/socks.c b/socks.c
-index 7c7448c9c5ff..8db10d496efa 100644
+index 1f1fb96e2afe..d2bcfda6114e 100644
 --- a/socks.c
 +++ b/socks.c
 @@ -38,7 +38,7 @@
@@ -411,8 +414,8 @@ index 7c7448c9c5ff..8db10d496efa 100644
  			break;
  		default:
  			errx(1, "connection failed, unsupported address type");
-@@ -308,11 +308,11 @@ socks_connect(const char *host, const char *port,
- 
+@@ -322,11 +322,11 @@ socks_connect(const char *host, const char *port,
+ 		}
  		cnt = atomicio(vwrite, proxyfd, buf, wlen);
  		if (cnt != wlen)
 -			err(1, "write failed (%zu/%zu)", cnt, wlen);
@@ -425,7 +428,7 @@ index 7c7448c9c5ff..8db10d496efa 100644
  		if (buf[1] != 90) {
  			errx(1, "connection failed, SOCKSv4 error: %s",
  			    socks4_strerror(buf[1]));
-@@ -326,21 +326,21 @@ socks_connect(const char *host, const char *port,
+@@ -340,21 +340,21 @@ socks_connect(const char *host, const char *port,
  
  		/* Try to be sane about numeric IPv6 addresses */
  		if (strchr(host, ':') != NULL) {
@@ -451,7 +454,7 @@ index 7c7448c9c5ff..8db10d496efa 100644
  
  		if (authretry > 1) {
  			char proxypass[256];
-@@ -348,20 +348,20 @@ socks_connect(const char *host, const char *port,
+@@ -362,20 +362,20 @@ socks_connect(const char *host, const char *port,
  
  			getproxypass(proxyuser, proxyhost,
  			    proxypass, sizeof proxypass);
@@ -477,27 +480,27 @@ index 7c7448c9c5ff..8db10d496efa 100644
  			explicit_bzero(proxypass, sizeof proxypass);
  			explicit_bzero(buf, sizeof buf);
  		}
-@@ -371,23 +371,23 @@ socks_connect(const char *host, const char *port,
+@@ -385,23 +385,23 @@ socks_connect(const char *host, const char *port,
  			err(1, "write failed (%zu/2)", cnt);
  
  		/* Read status reply */
 -		proxy_read_line(proxyfd, buf, sizeof(buf));
 +		proxy_read_line(proxyfd, (char*)buf, sizeof(buf));
  		if (proxyuser != NULL &&
--		    (strncmp(buf, "HTTP/1.0 407 ", 12) == 0 ||
--		    strncmp(buf, "HTTP/1.1 407 ", 12) == 0)) {
-+		    (strncmp((char*)buf, "HTTP/1.0 407 ", 12) == 0 ||
-+		    strncmp((char*)buf, "HTTP/1.1 407 ", 12) == 0)) {
+-		    (strncmp(buf, "HTTP/1.0 407 ", 13) == 0 ||
+-		    strncmp(buf, "HTTP/1.1 407 ", 13) == 0)) {
++		    (strncmp((char*)buf, "HTTP/1.0 407 ", 13) == 0 ||
++		    strncmp((char*)buf, "HTTP/1.1 407 ", 13) == 0)) {
  			if (authretry > 1) {
  				fprintf(stderr, "Proxy authentication "
  				    "failed\n");
  			}
  			close(proxyfd);
  			goto again;
--		} else if (strncmp(buf, "HTTP/1.0 200 ", 12) != 0 &&
--		    strncmp(buf, "HTTP/1.1 200 ", 12) != 0)
-+		} else if (strncmp((char*)buf, "HTTP/1.0 200 ", 12) != 0 &&
-+		    strncmp((char*)buf, "HTTP/1.1 200 ", 12) != 0)
+-		} else if (strncmp(buf, "HTTP/1.0 200 ", 13) != 0 &&
+-		    strncmp(buf, "HTTP/1.1 200 ", 13) != 0)
++		} else if (strncmp((char*)buf, "HTTP/1.0 200 ", 13) != 0 &&
++		    strncmp((char*)buf, "HTTP/1.1 200 ", 13) != 0)
  			errx(1, "Proxy error: \"%s\"", buf);
  
  		/* Headers continue until we hit an empty line */
diff --git a/patches/netcat-openbsd-1.228/0002-Build-without-TLS-support.patch b/patches/netcat-openbsd-1.234/0002-Build-without-TLS-support.patch
similarity index 86%
rename from patches/netcat-openbsd-1.228/0002-Build-without-TLS-support.patch
rename to patches/netcat-openbsd-1.234/0002-Build-without-TLS-support.patch
index ca18ed1fd..2be68a7e2 100644
--- a/patches/netcat-openbsd-1.228/0002-Build-without-TLS-support.patch
+++ b/patches/netcat-openbsd-1.234/0002-Build-without-TLS-support.patch
@@ -1,20 +1,23 @@
 From: Guilhem Moulin <guilhem@debian.org>
 Date: Fri, 9 Jun 2017 13:21:23 +0200
 Subject: [PATCH] Build without TLS support
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
 tls.h isn't available in libbsd-dev, and TLS supports adds options (-C, -Z)
 that are already used by our Debian-specific patches.
 
 Forwarded: not-needed
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  Makefile |   2 -
- nc.1     | 114 +++---------------------------------------
+ nc.1     | 118 +++----------------------------------------
  netcat.c | 172 +++++++++++++++++++++++++++++++++++++++++++++++++++++----------
- 3 files changed, 153 insertions(+), 135 deletions(-)
+ 3 files changed, 153 insertions(+), 139 deletions(-)
 
 diff --git a/Makefile b/Makefile
 index 93ca5ee64cd9..31d7536ee8ba 100644
@@ -30,7 +33,7 @@ index 93ca5ee64cd9..31d7536ee8ba 100644
  PKG_CONFIG ?= pkg-config
  LIBS=  `$(PKG_CONFIG) --libs libbsd` -lresolv
 diff --git a/nc.1 b/nc.1
-index 596bd8e21694..2eb732e093e4 100644
+index 75ac68bb5ed5..d285e62ad219 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -33,20 +33,14 @@
@@ -154,7 +157,7 @@ index 596bd8e21694..2eb732e093e4 100644
  .It Fl r
  Choose source and/or destination ports randomly
  instead of sequentially within a range or in the order that the system
-@@ -238,35 +180,7 @@ Cannot be used together with
+@@ -238,39 +180,7 @@ Cannot be used together with
  or
  .Fl x .
  .It Fl T Ar keyword
@@ -175,6 +178,10 @@ index 596bd8e21694..2eb732e093e4 100644
 -The following TLS options specify a value in the form of a
 -.Ar key Ns = Ns Ar value
 -pair:
+-.Cm alpn ,
+-which allows the TLS ALPN to be specified (see
+-.Xr tls_config_set_alpn 3
+-for further details);
 -.Cm ciphers ,
 -which allows the supported TLS ciphers to be specified (see
 -.Xr tls_config_set_ciphers 3
@@ -191,7 +198,7 @@ index 596bd8e21694..2eb732e093e4 100644
  .Ar keyword
  may be one of
  .Cm critical ,
-@@ -290,13 +204,13 @@ to script telnet sessions.
+@@ -294,13 +204,13 @@ to script telnet sessions.
  Use
  .Ux Ns -domain
  sockets.
@@ -209,7 +216,7 @@ index 596bd8e21694..2eb732e093e4 100644
  .Fl x .
  For
  .Ux Ns -domain
-@@ -359,12 +273,6 @@ An IPv6 address can be specified unambiguously by enclosing
+@@ -369,12 +279,6 @@ An IPv6 address can be specified unambiguously by enclosing
  in square brackets.
  A proxy cannot be used with any of the options
  .Fl lsuU .
@@ -222,7 +229,7 @@ index 596bd8e21694..2eb732e093e4 100644
  .It Fl z
  Only scan for listening daemons, without sending any data to them.
  Cannot be used together with
-@@ -522,16 +430,6 @@ the source port, with a timeout of 5 seconds:
+@@ -532,16 +436,6 @@ the source port, with a timeout of 5 seconds:
  .Pp
  .Dl $ nc -p 31337 -w 5 host.example.com 42
  .Pp
@@ -240,7 +247,7 @@ index 596bd8e21694..2eb732e093e4 100644
  .Pp
  .Dl $ nc -u host.example.com 53
 diff --git a/netcat.c b/netcat.c
-index 216d3ec21503..d8d3acc0f36e 100644
+index d235c55f5108..e592d019bce2 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -99,7 +99,9 @@
@@ -279,15 +286,15 @@ index 216d3ec21503..d8d3acc0f36e 100644
  int	usetls;					/* use TLS */
  const char    *Cflag;				/* Public cert file */
  const char    *Kflag;				/* Private key file */
-@@ -156,6 +161,7 @@ char	*tls_expecthash;			/* required hash of peer cert */
- char	*tls_ciphers;				/* TLS ciphers */
+@@ -157,6 +162,7 @@ char	*tls_ciphers;				/* TLS ciphers */
  char	*tls_protocols;				/* TLS protocols */
+ char	*tls_alpn;				/* TLS ALPN */
  FILE	*Zflag;					/* file to save peer cert */
 +#endif
  
  int recvcount, recvlimit;
  int timeout = -1;
-@@ -170,10 +176,16 @@ int	strtoport(char *portstr, int udp);
+@@ -171,10 +177,16 @@ int	strtoport(char *portstr, int udp);
  void	build_ports(char *);
  void	help(void) __attribute__((noreturn));
  int	local_listen(const char *, const char *, struct addrinfo);
@@ -304,7 +311,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  int	timeout_connect(int, const struct sockaddr *, socklen_t);
  int	socks_connect(const char *, const char *, struct addrinfo,
  	    const char *, const char *, struct addrinfo, int, const char *);
-@@ -184,15 +196,24 @@ int	unix_connect(char *);
+@@ -185,15 +197,24 @@ int	unix_connect(char *);
  int	unix_listen(char *);
  void	set_common_sockopts(int, int);
  int	process_tos_opt(char *, int *);
@@ -329,7 +336,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  
  int
  main(int argc, char *argv[])
-@@ -207,20 +228,28 @@ main(int argc, char *argv[])
+@@ -208,20 +229,28 @@ main(int argc, char *argv[])
  	const char *errstr;
  	struct addrinfo proxyhints;
  	char unix_dg_tmp_socket_buf[UNIX_DG_TMP_SOCKET_SIZE];
@@ -358,7 +365,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	    != -1) {
  		switch (ch) {
  		case '4':
-@@ -242,24 +271,30 @@ main(int argc, char *argv[])
+@@ -245,24 +274,30 @@ main(int argc, char *argv[])
  			else
  				errx(1, "unsupported proxy protocol");
  			break;
@@ -389,7 +396,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		case 'h':
  			help();
  			break;
-@@ -268,9 +303,11 @@ main(int argc, char *argv[])
+@@ -271,9 +306,11 @@ main(int argc, char *argv[])
  			if (errstr)
  				errx(1, "interval %s: %s", errstr, optarg);
  			break;
@@ -401,7 +408,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		case 'k':
  			kflag = 1;
  			break;
-@@ -299,10 +336,12 @@ main(int argc, char *argv[])
+@@ -302,10 +339,12 @@ main(int argc, char *argv[])
  		case 'p':
  			pflag = optarg;
  			break;
@@ -414,7 +421,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		case 'r':
  			rflag = 1;
  			break;
-@@ -344,12 +383,14 @@ main(int argc, char *argv[])
+@@ -347,12 +386,14 @@ main(int argc, char *argv[])
  			if ((proxy = strdup(optarg)) == NULL)
  				err(1, NULL);
  			break;
@@ -429,7 +436,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		case 'z':
  			zflag = 1;
  			break;
-@@ -368,9 +409,11 @@ main(int argc, char *argv[])
+@@ -371,9 +412,11 @@ main(int argc, char *argv[])
  				errx(1, "TCP send window %s: %s",
  				    errstr, optarg);
  			break;
@@ -441,7 +448,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		case 'S':
  #ifdef TCP_MD5SIG
  			Sflag = 1;
-@@ -381,8 +424,10 @@ main(int argc, char *argv[])
+@@ -384,8 +427,10 @@ main(int argc, char *argv[])
  		case 'T':
  			errstr = NULL;
  			errno = 0;
@@ -452,7 +459,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			if (process_tos_opt(optarg, &Tflag))
  				break;
  			if (strlen(optarg) > 1 && optarg[0] == '0' &&
-@@ -392,7 +437,11 @@ main(int argc, char *argv[])
+@@ -395,7 +440,11 @@ main(int argc, char *argv[])
  				Tflag = (int)strtonum(optarg, 0, 255,
  				    &errstr);
  			if (Tflag < 0 || Tflag > 255 || errstr || errno)
@@ -464,7 +471,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			break;
  		default:
  			usage(1);
-@@ -425,6 +474,7 @@ main(int argc, char *argv[])
+@@ -428,6 +477,7 @@ main(int argc, char *argv[])
  	} else
  		usage(1);
  
@@ -472,7 +479,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (usetls) {
  		if (Cflag && unveil(Cflag, "r") == -1)
  			err(1, "unveil %s", Cflag);
-@@ -459,15 +509,19 @@ main(int argc, char *argv[])
+@@ -462,15 +512,19 @@ main(int argc, char *argv[])
  				err(1, "unveil /");
  		}
  	}
@@ -492,7 +499,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (Fflag && usetls)
  		errx(1, "cannot use -c and -F");
  	if (TLSopt && !usetls)
-@@ -486,6 +540,7 @@ main(int argc, char *argv[])
+@@ -489,6 +543,7 @@ main(int argc, char *argv[])
  		errx(1, "you must specify -c to use -H");
  	if (tls_expectname && !usetls)
  		errx(1, "you must specify -c to use -e");
@@ -500,7 +507,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  
  	/* Get name of temporary socket for unix datagram client */
  	if ((family == AF_UNIX) && uflag && !lflag) {
-@@ -552,6 +607,7 @@ main(int argc, char *argv[])
+@@ -555,6 +610,7 @@ main(int argc, char *argv[])
  			proxyhints.ai_flags |= AI_NUMERICHOST;
  	}
  
@@ -508,7 +515,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (usetls) {
  		if ((tls_cfg = tls_config_new()) == NULL)
  			errx(1, "unable to allocate TLS config");
-@@ -588,6 +644,7 @@ main(int argc, char *argv[])
+@@ -593,6 +649,7 @@ main(int argc, char *argv[])
  		} else if (pledge("stdio inet dns", NULL) == -1)
  			err(1, "pledge");
  	}
@@ -516,7 +523,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (lflag) {
  		ret = 0;
  
-@@ -598,6 +655,7 @@ main(int argc, char *argv[])
+@@ -603,6 +660,7 @@ main(int argc, char *argv[])
  				s = unix_listen(host);
  		}
  
@@ -524,7 +531,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		if (usetls) {
  			tls_config_verify_client_optional(tls_cfg);
  			if ((tls_ctx = tls_server()) == NULL)
-@@ -606,6 +664,7 @@ main(int argc, char *argv[])
+@@ -611,6 +669,7 @@ main(int argc, char *argv[])
  				errx(1, "tls configuration failed (%s)",
  				    tls_error(tls_ctx));
  		}
@@ -532,7 +539,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  		/* Allow only one connection at a time, but stay alive. */
  		for (;;) {
  			if (family != AF_UNIX) {
-@@ -621,7 +680,11 @@ main(int argc, char *argv[])
+@@ -626,7 +685,11 @@ main(int argc, char *argv[])
  				 * let it receive datagrams from multiple
  				 * socket pairs.
  				 */
@@ -544,7 +551,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			} else if (uflag && !kflag) {
  				/*
  				 * For UDP and not -k, we will use recvfrom()
-@@ -647,9 +710,14 @@ main(int argc, char *argv[])
+@@ -652,9 +715,14 @@ main(int argc, char *argv[])
  					    (struct sockaddr *)&z, len,
  					    family == AF_UNIX ? host : NULL);
  
@@ -559,7 +566,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				int connfd;
  
  				len = sizeof(cliaddr);
-@@ -663,6 +731,7 @@ main(int argc, char *argv[])
+@@ -668,6 +736,7 @@ main(int argc, char *argv[])
  					report_sock("Connection received",
  					    (struct sockaddr *)&cliaddr, len,
  					    family == AF_UNIX ? host : NULL);
@@ -567,7 +574,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				if ((usetls) &&
  				    (tls_cctx = tls_setup_server(tls_ctx, connfd, host)))
  					readwrite(connfd, tls_cctx);
-@@ -672,6 +741,10 @@ main(int argc, char *argv[])
+@@ -677,6 +746,10 @@ main(int argc, char *argv[])
  					timeout_tls(s, tls_cctx, tls_close);
  				close(connfd);
  				tls_free(tls_cctx);
@@ -578,7 +585,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			}
  
  			if (!kflag)
-@@ -682,7 +755,11 @@ main(int argc, char *argv[])
+@@ -687,7 +760,11 @@ main(int argc, char *argv[])
  
  		if ((s = unix_connect(host)) > 0) {
  			if (!zflag)
@@ -590,7 +597,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			close(s);
  		} else {
  			warn("%s", host);
-@@ -702,6 +779,7 @@ main(int argc, char *argv[])
+@@ -707,6 +784,7 @@ main(int argc, char *argv[])
  		for (s = -1, i = 0; portlist[i] != NULL; i++) {
  			if (s != -1)
  				close(s);
@@ -598,7 +605,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			tls_free(tls_ctx);
  			tls_ctx = NULL;
  
-@@ -712,6 +790,7 @@ main(int argc, char *argv[])
+@@ -717,6 +795,7 @@ main(int argc, char *argv[])
  					errx(1, "tls configuration failed (%s)",
  					    tls_error(tls_ctx));
  			}
@@ -606,7 +613,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			if (xflag)
  				s = socks_connect(host, portlist[i], hints,
  				    proxy, proxyport, proxyhints, socksv,
-@@ -741,6 +820,7 @@ main(int argc, char *argv[])
+@@ -746,6 +825,7 @@ main(int argc, char *argv[])
  			}
  			if (Fflag)
  				fdpass(s);
@@ -614,7 +621,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  			else {
  				if (usetls)
  					tls_setup_client(tls_ctx, s, host);
-@@ -749,13 +829,19 @@ main(int argc, char *argv[])
+@@ -754,13 +834,19 @@ main(int argc, char *argv[])
  				if (tls_ctx)
  					timeout_tls(s, tls_ctx, tls_close);
  			}
@@ -634,7 +641,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  
  	return ret;
  }
-@@ -797,6 +883,7 @@ unix_bind(char *path, int flags)
+@@ -802,6 +888,7 @@ unix_bind(char *path, int flags)
  	return s;
  }
  
@@ -642,7 +649,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  int
  timeout_tls(int s, struct tls *tls_ctx, int (*func)(struct tls *))
  {
-@@ -884,6 +971,7 @@ tls_setup_server(struct tls *tls_ctx, int connfd, char *host)
+@@ -889,6 +976,7 @@ tls_setup_server(struct tls *tls_ctx, int connfd, char *host)
  	}
  	return NULL;
  }
@@ -650,7 +657,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  
  /*
   * unix_connect()
-@@ -1130,7 +1218,11 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
+@@ -1135,7 +1223,11 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
   * Loop that polls on the network file descriptor and stdin.
   */
  void
@@ -662,7 +669,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  {
  	struct pollfd pfd[4];
  	int stdin_fd = STDIN_FILENO;
-@@ -1230,12 +1322,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
+@@ -1235,12 +1327,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
  		/* try to read from stdin */
  		if (pfd[POLL_STDIN].revents & POLLIN && stdinbufpos < BUFSIZE) {
  			ret = fillbuf(pfd[POLL_STDIN].fd, stdinbuf,
@@ -681,7 +688,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				pfd[POLL_STDIN].fd = -1;
  			/* read something - poll net out */
  			if (stdinbufpos > 0)
-@@ -1247,12 +1344,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
+@@ -1252,12 +1349,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
  		/* try to write to network */
  		if (pfd[POLL_NETOUT].revents & POLLOUT && stdinbufpos > 0) {
  			ret = drainbuf(pfd[POLL_NETOUT].fd, stdinbuf,
@@ -700,7 +707,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				pfd[POLL_NETOUT].fd = -1;
  			/* buffer empty - remove self from polling */
  			if (stdinbufpos == 0)
-@@ -1264,12 +1366,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
+@@ -1269,12 +1371,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
  		/* try to read from network */
  		if (pfd[POLL_NETIN].revents & POLLIN && netinbufpos < BUFSIZE) {
  			ret = fillbuf(pfd[POLL_NETIN].fd, netinbuf,
@@ -719,7 +726,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				pfd[POLL_NETIN].fd = -1;
  			/* eof on net in - remove from pfd */
  			if (ret == 0) {
-@@ -1296,12 +1403,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
+@@ -1301,12 +1408,17 @@ readwrite(int net_fd, struct tls *tls_ctx)
  		/* try to write to stdout */
  		if (pfd[POLL_STDOUT].revents & POLLOUT && netinbufpos > 0) {
  			ret = drainbuf(pfd[POLL_STDOUT].fd, netinbuf,
@@ -738,7 +745,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  				pfd[POLL_STDOUT].fd = -1;
  			/* buffer empty - remove self from polling */
  			if (netinbufpos == 0)
-@@ -1325,7 +1437,11 @@ readwrite(int net_fd, struct tls *tls_ctx)
+@@ -1330,7 +1442,11 @@ readwrite(int net_fd, struct tls *tls_ctx)
  }
  
  ssize_t
@@ -750,7 +757,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  {
  	ssize_t n;
  	ssize_t adjust;
-@@ -1333,16 +1449,22 @@ drainbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
+@@ -1338,16 +1454,22 @@ drainbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
  	if (fd == -1)
  		return -1;
  
@@ -773,7 +780,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (n <= 0)
  		return n;
  	/* adjust buffer */
-@@ -1354,7 +1476,11 @@ drainbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
+@@ -1359,7 +1481,11 @@ drainbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
  }
  
  ssize_t
@@ -785,7 +792,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  {
  	size_t num = BUFSIZE - *bufpos;
  	ssize_t n;
-@@ -1362,16 +1488,22 @@ fillbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
+@@ -1367,16 +1493,22 @@ fillbuf(int fd, unsigned char *buf, size_t *bufpos, struct tls *tls)
  	if (fd == -1)
  		return -1;
  
@@ -808,7 +815,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	if (n <= 0)
  		return n;
  	*bufpos += n;
-@@ -1718,6 +1850,7 @@ process_tos_opt(char *s, int *val)
+@@ -1723,6 +1855,7 @@ process_tos_opt(char *s, int *val)
  	return 0;
  }
  
@@ -816,15 +823,15 @@ index 216d3ec21503..d8d3acc0f36e 100644
  int
  process_tls_opt(char *s, int *flags)
  {
-@@ -1831,6 +1964,7 @@ report_tls(struct tls *tls_ctx, char *host)
- 		break;
- 	}
+@@ -1841,6 +1974,7 @@ report_tls(struct tls *tls_ctx, char *host)
+ 	if ((alpn_proto = tls_conn_alpn_selected(tls_ctx)) != NULL)
+ 		fprintf(stderr, "Application Layer Protocol: %s\n", alpn_proto);
  }
 +#endif
  
  void
  report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
-@@ -1872,17 +2006,12 @@ help(void)
+@@ -1882,17 +2016,12 @@ help(void)
  	fprintf(stderr, "\tCommand Summary:\n\
  	\t-4		Use IPv4\n\
  	\t-6		Use IPv6\n\
@@ -842,7 +849,7 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	\t-k		Keep inbound sockets open for multiple connects\n\
  	\t-l		Listen mode, for inbound connects\n\
  	\t-M ttl		Outgoing TTL / Hop Limit\n\
-@@ -1890,14 +2019,12 @@ help(void)
+@@ -1900,14 +2029,12 @@ help(void)
  	\t-N		Shutdown the network socket after EOF on stdin\n\
  	\t-n		Suppress name/port resolutions\n\
  	\t-O length	TCP send buffer length\n\
@@ -858,15 +865,15 @@ index 216d3ec21503..d8d3acc0f36e 100644
  	\t-t		Answer TELNET negotiation\n\
  	\t-U		Use UNIX domain socket\n\
  	\t-u		UDP mode\n\
-@@ -1907,7 +2034,6 @@ help(void)
+@@ -1917,7 +2044,6 @@ help(void)
  	\t-w timeout	Timeout for connects and final net reads\n\
- 	\t-X proto	Proxy protocol: \"4\", \"5\" (SOCKS) or \"connect\"\n\
+ 	\t-X proto	Proxy protocol: \"4\", \"4A\", \"5\" (SOCKS) or \"connect\"\n\
  	\t-x addr[:port]\tSpecify proxy address and port\n\
 -	\t-Z		Peer certificate file\n\
  	\t-z		Zero-I/O mode [used for scanning]\n\
  	Port numbers can be individual or ranges: lo-hi [inclusive]\n");
  	exit(0);
-@@ -1917,15 +2043,11 @@ void
+@@ -1927,15 +2053,11 @@ void
  usage(int ret)
  {
  	fprintf(stderr,
diff --git a/patches/netcat-openbsd-1.228/0003-Fix-connect-timeout.patch b/patches/netcat-openbsd-1.234/0003-Fix-connect-timeout.patch
similarity index 89%
rename from patches/netcat-openbsd-1.228/0003-Fix-connect-timeout.patch
rename to patches/netcat-openbsd-1.234/0003-Fix-connect-timeout.patch
index b3ec87022..f4cc9ea61 100644
--- a/patches/netcat-openbsd-1.228/0003-Fix-connect-timeout.patch
+++ b/patches/netcat-openbsd-1.234/0003-Fix-connect-timeout.patch
@@ -1,16 +1,19 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 14:43:56 +0800
 Subject: [PATCH] Fix connect() timeout
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 82 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----
  1 file changed, 77 insertions(+), 5 deletions(-)
 
 diff --git a/netcat.c b/netcat.c
-index d8d3acc0f36e..a30cb3615205 100644
+index e592d019bce2..39cbfe16fada 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -90,6 +90,7 @@
@@ -32,7 +35,7 @@ index d8d3acc0f36e..a30cb3615205 100644
  /* Command Line Options */
  int	dflag;					/* detached, no stdin */
  int	Fflag;					/* fdpass sock to stdout */
-@@ -215,6 +220,8 @@ ssize_t drainbuf(int, unsigned char *, size_t *);
+@@ -216,6 +221,8 @@ ssize_t drainbuf(int, unsigned char *, size_t *);
  ssize_t fillbuf(int, unsigned char *, size_t *);
  #endif
  
@@ -41,7 +44,7 @@ index d8d3acc0f36e..a30cb3615205 100644
  int
  main(int argc, char *argv[])
  {
-@@ -1088,18 +1095,21 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
+@@ -1093,18 +1100,21 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
  			}
  		}
  
@@ -68,7 +71,7 @@ index d8d3acc0f36e..a30cb3615205 100644
  		}
  
  		save_errno = errno;
-@@ -1141,6 +1151,68 @@ timeout_connect(int s, const struct sockaddr *name, socklen_t namelen)
+@@ -1146,6 +1156,68 @@ timeout_connect(int s, const struct sockaddr *name, socklen_t namelen)
  	return ret;
  }
  
diff --git a/patches/netcat-openbsd-1.228/0004-Add-ability-to-specify-destination-ports-by-name.patch b/patches/netcat-openbsd-1.234/0004-Add-ability-to-specify-destination-ports-by-name.patch
similarity index 69%
rename from patches/netcat-openbsd-1.228/0004-Add-ability-to-specify-destination-ports-by-name.patch
rename to patches/netcat-openbsd-1.234/0004-Add-ability-to-specify-destination-ports-by-name.patch
index 2e02ecb2a..1cf0dae26 100644
--- a/patches/netcat-openbsd-1.228/0004-Add-ability-to-specify-destination-ports-by-name.patch
+++ b/patches/netcat-openbsd-1.234/0004-Add-ability-to-specify-destination-ports-by-name.patch
@@ -1,19 +1,22 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 14:45:08 +0800
 Subject: [PATCH] Add ability to specify destination ports by name
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 7 ++++++-
  1 file changed, 6 insertions(+), 1 deletion(-)
 
 diff --git a/netcat.c b/netcat.c
-index a30cb3615205..f52088ab077d 100644
+index 39cbfe16fada..9d4fa4fc5fba 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -1700,11 +1700,16 @@ strtoport(char *portstr, int udp)
+@@ -1705,11 +1705,16 @@ strtoport(char *portstr, int udp)
  void
  build_ports(char *p)
  {
diff --git a/patches/netcat-openbsd-1.228/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch b/patches/netcat-openbsd-1.234/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch
similarity index 85%
rename from patches/netcat-openbsd-1.228/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch
rename to patches/netcat-openbsd-1.234/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch
index 0a13d92ba..d1ffe0d88 100644
--- a/patches/netcat-openbsd-1.228/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch
+++ b/patches/netcat-openbsd-1.234/0005-New-flag-C-to-translate-terminal-line-feeds-to-CRLF.patch
@@ -1,17 +1,20 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 14:57:45 +0800
 Subject: [PATCH] New flag '-C' to translate terminal line feeds to CRLF
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     |  9 ++++++--
  netcat.c | 72 +++++++++++++++++++++++++++++++++++-----------------------------
  2 files changed, 47 insertions(+), 34 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index 2eb732e093e4..478fedde9313 100644
+index d285e62ad219..5c1263053710 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -33,7 +33,7 @@
@@ -35,7 +38,7 @@ index 2eb732e093e4..478fedde9313 100644
  .It Fl D
  Enable debugging on the socket.
  .It Fl d
-@@ -380,7 +385,7 @@ More complicated examples can be built up when the user knows the format
+@@ -386,7 +391,7 @@ More complicated examples can be built up when the user knows the format
  of requests required by the server.
  As another example, an email may be submitted to an SMTP server using:
  .Bd -literal -offset indent
@@ -45,19 +48,19 @@ index 2eb732e093e4..478fedde9313 100644
  MAIL FROM:<user@host.example.com>
  RCPT TO:<user2@host.example.com>
 diff --git a/netcat.c b/netcat.c
-index f52088ab077d..76bd3aba24ed 100644
+index 9d4fa4fc5fba..7b38f4031dcd 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -166,6 +166,8 @@ char	*tls_expecthash;			/* required hash of peer cert */
- char	*tls_ciphers;				/* TLS ciphers */
+@@ -167,6 +167,8 @@ char	*tls_ciphers;				/* TLS ciphers */
  char	*tls_protocols;				/* TLS protocols */
+ char	*tls_alpn;				/* TLS ALPN */
  FILE	*Zflag;					/* file to save peer cert */
 +#else
 +int	Cflag = 0;			/* CRLF line-ending */
  #endif
  
  int recvcount, recvlimit;
-@@ -216,7 +218,7 @@ ssize_t fillbuf(int, unsigned char *, size_t *, struct tls *);
+@@ -217,7 +219,7 @@ ssize_t fillbuf(int, unsigned char *, size_t *, struct tls *);
  void	tls_setup_client(struct tls *, int, char *);
  struct tls *tls_setup_server(struct tls *, int, char *);
  #else
@@ -66,7 +69,7 @@ index f52088ab077d..76bd3aba24ed 100644
  ssize_t fillbuf(int, unsigned char *, size_t *);
  #endif
  
-@@ -255,7 +257,7 @@ main(int argc, char *argv[])
+@@ -256,7 +258,7 @@ main(int argc, char *argv[])
  #ifdef HAVE_TLS
  	    "46C:cDde:FH:hI:i:K:klM:m:NnO:o:P:p:R:rSs:T:tUuV:vW:w:X:x:Z:z"))
  #else
@@ -75,7 +78,7 @@ index f52088ab077d..76bd3aba24ed 100644
  #endif
  	    != -1) {
  		switch (ch) {
-@@ -285,6 +287,10 @@ main(int argc, char *argv[])
+@@ -288,6 +290,10 @@ main(int argc, char *argv[])
  		case 'c':
  			usetls = 1;
  			break;
@@ -86,7 +89,7 @@ index f52088ab077d..76bd3aba24ed 100644
  #endif
  		case 'd':
  			dflag = 1;
-@@ -1339,12 +1345,6 @@ readwrite(int net_fd)
+@@ -1344,12 +1350,6 @@ readwrite(int net_fd)
  		    stdinbufpos == 0 && netinbufpos == 0)
  			return;
  
@@ -99,7 +102,7 @@ index f52088ab077d..76bd3aba24ed 100644
  		/* poll */
  		num_fds = poll(pfd, 4, timeout);
  
-@@ -1424,7 +1424,7 @@ readwrite(int net_fd)
+@@ -1429,7 +1429,7 @@ readwrite(int net_fd)
  				pfd[POLL_NETOUT].events = POLLOUT;
  			else
  #else
@@ -108,7 +111,7 @@ index f52088ab077d..76bd3aba24ed 100644
  #endif
  			if (ret == -1)
  				pfd[POLL_NETOUT].fd = -1;
-@@ -1483,7 +1483,7 @@ readwrite(int net_fd)
+@@ -1488,7 +1488,7 @@ readwrite(int net_fd)
  				pfd[POLL_STDOUT].events = POLLOUT;
  			else
  #else
@@ -117,7 +120,7 @@ index f52088ab077d..76bd3aba24ed 100644
  #endif
  			if (ret == -1)
  				pfd[POLL_STDOUT].fd = -1;
-@@ -1509,36 +1509,43 @@ readwrite(int net_fd)
+@@ -1514,36 +1514,43 @@ readwrite(int net_fd)
  }
  
  ssize_t
@@ -182,7 +185,7 @@ index f52088ab077d..76bd3aba24ed 100644
  	/* adjust buffer */
  	adjust = *bufpos - n;
  	if (adjust > 0)
-@@ -2083,6 +2090,7 @@ help(void)
+@@ -2093,6 +2100,7 @@ help(void)
  	fprintf(stderr, "\tCommand Summary:\n\
  	\t-4		Use IPv4\n\
  	\t-6		Use IPv6\n\
@@ -190,7 +193,7 @@ index f52088ab077d..76bd3aba24ed 100644
  	\t-D		Enable the debug socket option\n\
  	\t-d		Detach from stdin\n\
  	\t-F		Pass socket fd\n\
-@@ -2120,7 +2128,7 @@ void
+@@ -2130,7 +2138,7 @@ void
  usage(int ret)
  {
  	fprintf(stderr,
diff --git a/patches/netcat-openbsd-1.228/0006-New-flag-q-to-specify-a-quit-timer.patch b/patches/netcat-openbsd-1.234/0006-New-flag-q-to-specify-a-quit-timer.patch
similarity index 87%
rename from patches/netcat-openbsd-1.228/0006-New-flag-q-to-specify-a-quit-timer.patch
rename to patches/netcat-openbsd-1.234/0006-New-flag-q-to-specify-a-quit-timer.patch
index 9f0b087b4..79432f88a 100644
--- a/patches/netcat-openbsd-1.228/0006-New-flag-q-to-specify-a-quit-timer.patch
+++ b/patches/netcat-openbsd-1.234/0006-New-flag-q-to-specify-a-quit-timer.patch
@@ -1,17 +1,20 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 15:16:04 +0800
 Subject: [PATCH] New flag '-q' to specify a quit timer
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     | 10 ++++++++++
  netcat.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++-----------
  2 files changed, 58 insertions(+), 11 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index 478fedde9313..fbcc098a86e6 100644
+index 5c1263053710..172408162328 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -41,6 +41,7 @@
@@ -39,7 +42,7 @@ index 478fedde9313..fbcc098a86e6 100644
  Choose source and/or destination ports randomly
  instead of sequentially within a range or in the order that the system
 diff --git a/netcat.c b/netcat.c
-index 76bd3aba24ed..5ead82701124 100644
+index 7b38f4031dcd..bda96cef9d0e 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -139,6 +139,7 @@ int	Nflag;					/* shutdown() network socket */
@@ -50,15 +53,15 @@ index 76bd3aba24ed..5ead82701124 100644
  int	rflag;					/* Random ports flag */
  char   *sflag;					/* Source Address */
  int	tflag;					/* Telnet Emulation */
-@@ -223,6 +224,7 @@ ssize_t fillbuf(int, unsigned char *, size_t *);
+@@ -224,6 +225,7 @@ ssize_t fillbuf(int, unsigned char *, size_t *);
  #endif
  
  static int connect_with_timeout(int, const struct sockaddr *, socklen_t, int);
-+static void quit();
++static void quit(int sig);
  
  int
  main(int argc, char *argv[])
-@@ -255,9 +257,9 @@ main(int argc, char *argv[])
+@@ -256,9 +258,9 @@ main(int argc, char *argv[])
  
  	while ((ch = getopt(argc, argv,
  #ifdef HAVE_TLS
@@ -70,7 +73,7 @@ index 76bd3aba24ed..5ead82701124 100644
  #endif
  	    != -1) {
  		switch (ch) {
-@@ -349,6 +351,13 @@ main(int argc, char *argv[])
+@@ -352,6 +354,13 @@ main(int argc, char *argv[])
  		case 'p':
  			pflag = optarg;
  			break;
@@ -84,7 +87,7 @@ index 76bd3aba24ed..5ead82701124 100644
  #ifdef HAVE_TLS
  		case 'R':
  			tls_cachanged = 1;
-@@ -1335,15 +1344,27 @@ readwrite(int net_fd)
+@@ -1340,15 +1349,27 @@ readwrite(int net_fd)
  	while (1) {
  		/* both inputs are gone, buffers are empty, we are done */
  		if (pfd[POLL_STDIN].fd == -1 && pfd[POLL_NETIN].fd == -1 &&
@@ -118,7 +121,7 @@ index 76bd3aba24ed..5ead82701124 100644
  
  		/* poll */
  		num_fds = poll(pfd, 4, timeout);
-@@ -1500,6 +1521,13 @@ readwrite(int net_fd)
+@@ -1505,6 +1526,13 @@ readwrite(int net_fd)
  			if (pfd[POLL_NETOUT].fd != -1 && Nflag)
  				shutdown(pfd[POLL_NETOUT].fd, SHUT_WR);
  			pfd[POLL_NETOUT].fd = -1;
@@ -132,7 +135,7 @@ index 76bd3aba24ed..5ead82701124 100644
  		}
  		/* net in gone and queue empty? */
  		if (pfd[POLL_NETIN].fd == -1 && netinbufpos == 0) {
-@@ -2106,6 +2134,7 @@ help(void)
+@@ -2116,6 +2144,7 @@ help(void)
  	\t-O length	TCP send buffer length\n\
  	\t-P proxyuser\tUsername for proxy authentication\n\
  	\t-p port\t	Specify local port for remote connects\n\
@@ -140,7 +143,7 @@ index 76bd3aba24ed..5ead82701124 100644
  	\t-r		Randomize remote ports\n\
  	\t-S		Enable the TCP MD5 signature option\n\
  	\t-s sourceaddr	Local source address\n\
-@@ -2130,10 +2159,18 @@ usage(int ret)
+@@ -2140,10 +2169,18 @@ usage(int ret)
  	fprintf(stderr,
  	    "usage: nc [-46CDdFhklNnrStUuvz] [-I length] [-i interval] [-M ttl]\n"
  	    "\t  [-m minttl] [-O length] [-P proxy_username] [-p source_port]\n"
@@ -158,7 +161,7 @@ index 76bd3aba24ed..5ead82701124 100644
 + * quit()
 + * handler for a "-q" timeout (exit 0 instead of 1)
 + */
-+static void quit()
++static void quit(__attribute__((unused)) int sig)
 +{
 +	exit(0);
 +}
diff --git a/patches/netcat-openbsd-1.228/0007-Fix-UDP-scan-timeout.patch b/patches/netcat-openbsd-1.234/0007-Fix-UDP-scan-timeout.patch
similarity index 80%
rename from patches/netcat-openbsd-1.228/0007-Fix-UDP-scan-timeout.patch
rename to patches/netcat-openbsd-1.234/0007-Fix-UDP-scan-timeout.patch
index aff76d9af..04947b30b 100644
--- a/patches/netcat-openbsd-1.228/0007-Fix-UDP-scan-timeout.patch
+++ b/patches/netcat-openbsd-1.234/0007-Fix-UDP-scan-timeout.patch
@@ -1,16 +1,19 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 15:29:37 +0800
 Subject: [PATCH] Fix UDP scan timeout
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 21 ++++++++++++++-------
  1 file changed, 14 insertions(+), 7 deletions(-)
 
 diff --git a/netcat.c b/netcat.c
-index 5ead82701124..47259d6acaff 100644
+index bda96cef9d0e..1c9144fefa9d 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -129,6 +129,8 @@
@@ -22,7 +25,7 @@ index 5ead82701124..47259d6acaff 100644
  /* Command Line Options */
  int	dflag;					/* detached, no stdin */
  int	Fflag;					/* fdpass sock to stdout */
-@@ -1794,19 +1796,24 @@ build_ports(char *p)
+@@ -1799,19 +1801,24 @@ build_ports(char *p)
  int
  udptest(int s)
  {
diff --git a/patches/netcat-openbsd-1.228/0008-New-flag-Z-for-DCCP-support.patch b/patches/netcat-openbsd-1.234/0008-New-flag-Z-for-DCCP-support.patch
similarity index 84%
rename from patches/netcat-openbsd-1.228/0008-New-flag-Z-for-DCCP-support.patch
rename to patches/netcat-openbsd-1.234/0008-New-flag-Z-for-DCCP-support.patch
index ad618887d..e980c1e53 100644
--- a/patches/netcat-openbsd-1.228/0008-New-flag-Z-for-DCCP-support.patch
+++ b/patches/netcat-openbsd-1.234/0008-New-flag-Z-for-DCCP-support.patch
@@ -1,17 +1,20 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 15:56:51 +0800
 Subject: [PATCH] New flag '-Z' for DCCP support
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     |  4 ++-
  netcat.c | 85 +++++++++++++++++++++++++++++++++++++++++++++++++++++++---------
  2 files changed, 76 insertions(+), 13 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index fbcc098a86e6..da37f06f241c 100644
+index 172408162328..f2629398e5bd 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -33,7 +33,7 @@
@@ -23,7 +26,7 @@ index fbcc098a86e6..da37f06f241c 100644
  .Op Fl I Ar length
  .Op Fl i Ar interval
  .Op Fl M Ar ttl
-@@ -288,6 +288,8 @@ An IPv6 address can be specified unambiguously by enclosing
+@@ -294,6 +294,8 @@ An IPv6 address can be specified unambiguously by enclosing
  in square brackets.
  A proxy cannot be used with any of the options
  .Fl lsuU .
@@ -33,7 +36,7 @@ index fbcc098a86e6..da37f06f241c 100644
  Only scan for listening daemons, without sending any data to them.
  Cannot be used together with
 diff --git a/netcat.c b/netcat.c
-index 47259d6acaff..efa6618365f7 100644
+index 1c9144fefa9d..73fdfa45a966 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -146,6 +146,7 @@ int	rflag;					/* Random ports flag */
@@ -44,15 +47,15 @@ index 47259d6acaff..efa6618365f7 100644
  int	vflag;					/* Verbosity */
  int	xflag;					/* Socks proxy */
  int	zflag;					/* Port Scan Flag */
-@@ -225,6 +226,7 @@ ssize_t drainbuf(int, unsigned char *, size_t *, int);
+@@ -226,6 +227,7 @@ ssize_t drainbuf(int, unsigned char *, size_t *, int);
  ssize_t fillbuf(int, unsigned char *, size_t *);
  #endif
  
 +char *proto_name(int, int);
  static int connect_with_timeout(int, const struct sockaddr *, socklen_t, int);
- static void quit();
+ static void quit(int sig);
  
-@@ -261,7 +263,7 @@ main(int argc, char *argv[])
+@@ -262,7 +264,7 @@ main(int argc, char *argv[])
  #ifdef HAVE_TLS
  	    "46C:cDde:FH:hI:i:K:klM:m:NnO:o:P:p:q:R:rSs:T:tUuV:vW:w:X:x:Z:z"))
  #else
@@ -61,7 +64,7 @@ index 47259d6acaff..efa6618365f7 100644
  #endif
  	    != -1) {
  		switch (ch) {
-@@ -378,6 +380,13 @@ main(int argc, char *argv[])
+@@ -381,6 +383,13 @@ main(int argc, char *argv[])
  		case 'u':
  			uflag = 1;
  			break;
@@ -75,7 +78,7 @@ index 47259d6acaff..efa6618365f7 100644
  		case 'V':
  #ifdef RT_TABLEID_MAX
  			rtableid = (int)strtonum(optarg, 0,
-@@ -482,6 +491,10 @@ main(int argc, char *argv[])
+@@ -485,6 +494,10 @@ main(int argc, char *argv[])
  
  	/* Cruft to make sure options are clean, and used properly. */
  	if (argc == 1 && family == AF_UNIX) {
@@ -86,7 +89,7 @@ index 47259d6acaff..efa6618365f7 100644
  		host = argv[0];
  	} else if (argc == 0 && lflag) {
  		if (sflag)
-@@ -583,8 +596,20 @@ main(int argc, char *argv[])
+@@ -586,8 +599,20 @@ main(int argc, char *argv[])
  	if (family != AF_UNIX) {
  		memset(&hints, 0, sizeof(struct addrinfo));
  		hints.ai_family = family;
@@ -109,7 +112,7 @@ index 47259d6acaff..efa6618365f7 100644
  		if (nflag)
  			hints.ai_flags |= AI_NUMERICHOST;
  	}
-@@ -592,7 +617,10 @@ main(int argc, char *argv[])
+@@ -595,7 +620,10 @@ main(int argc, char *argv[])
  	if (xflag) {
  		if (uflag)
  			errx(1, "no proxy support for UDP mode");
@@ -121,7 +124,7 @@ index 47259d6acaff..efa6618365f7 100644
  		if (lflag)
  			errx(1, "no proxy support for listen");
  
-@@ -838,9 +866,11 @@ main(int argc, char *argv[])
+@@ -843,9 +871,11 @@ main(int argc, char *argv[])
  						continue;
  					}
  				}
@@ -135,7 +138,7 @@ index 47259d6acaff..efa6618365f7 100644
  			}
  			if (Fflag)
  				fdpass(s);
-@@ -1054,6 +1084,21 @@ unix_listen(char *path)
+@@ -1059,6 +1089,21 @@ unix_listen(char *path)
  	return s;
  }
  
@@ -157,7 +160,7 @@ index 47259d6acaff..efa6618365f7 100644
  /*
   * remote_connect()
   * Returns a socket connected to a remote host. Properly binds to a local
-@@ -1085,8 +1130,20 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
+@@ -1090,8 +1135,20 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
  #endif
  			memset(&ahints, 0, sizeof(struct addrinfo));
  			ahints.ai_family = res->ai_family;
@@ -180,7 +183,7 @@ index 47259d6acaff..efa6618365f7 100644
  			ahints.ai_flags = AI_PASSIVE;
  			if ((error = getaddrinfo(sflag, pflag, &ahints, &ares)))
  				errx(1, "getaddrinfo: %s", gai_strerror(error));
-@@ -1116,16 +1173,18 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
+@@ -1121,16 +1178,18 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
  		    timeout)) == CONNECTION_SUCCESS)
  			break;
  
@@ -201,7 +204,7 @@ index 47259d6acaff..efa6618365f7 100644
  				    error == CONNECTION_TIMEOUT ? "timed out" : "failed");
  		}
  
-@@ -1742,7 +1801,8 @@ build_ports(char *p)
+@@ -1747,7 +1806,8 @@ build_ports(char *p)
  	int hi, lo, cp;
  	int x = 0;
  
@@ -211,15 +214,15 @@ index 47259d6acaff..efa6618365f7 100644
  	if (sv) {
  		if (asprintf(&portlist[0], "%d", ntohs(sv->s_port)) < 0)
  			err(1, "asprintf");
-@@ -2155,6 +2215,7 @@ help(void)
+@@ -2165,6 +2225,7 @@ help(void)
  	\t-w timeout	Timeout for connects and final net reads\n\
- 	\t-X proto	Proxy protocol: \"4\", \"5\" (SOCKS) or \"connect\"\n\
+ 	\t-X proto	Proxy protocol: \"4\", \"4A\", \"5\" (SOCKS) or \"connect\"\n\
  	\t-x addr[:port]\tSpecify proxy address and port\n\
 +	\t-Z		DCCP mode\n\
  	\t-z		Zero-I/O mode [used for scanning]\n\
  	Port numbers can be individual or ranges: lo-hi [inclusive]\n");
  	exit(0);
-@@ -2164,7 +2225,7 @@ void
+@@ -2174,7 +2235,7 @@ void
  usage(int ret)
  {
  	fprintf(stderr,
diff --git a/patches/netcat-openbsd-1.228/0009-New-flag-b-for-broadcast-support.patch b/patches/netcat-openbsd-1.234/0009-New-flag-b-for-broadcast-support.patch
similarity index 82%
rename from patches/netcat-openbsd-1.228/0009-New-flag-b-for-broadcast-support.patch
rename to patches/netcat-openbsd-1.234/0009-New-flag-b-for-broadcast-support.patch
index afea5717e..d624d713a 100644
--- a/patches/netcat-openbsd-1.228/0009-New-flag-b-for-broadcast-support.patch
+++ b/patches/netcat-openbsd-1.234/0009-New-flag-b-for-broadcast-support.patch
@@ -1,17 +1,20 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 19:06:52 +0800
 Subject: [PATCH] New flag '-b' for broadcast support
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     |  4 +++-
  netcat.c | 22 ++++++++++++++++++++--
  2 files changed, 23 insertions(+), 3 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index da37f06f241c..49a3d4d61892 100644
+index f2629398e5bd..6ee1584f8c6b 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -33,7 +33,7 @@
@@ -33,7 +36,7 @@ index da37f06f241c..49a3d4d61892 100644
  Send CRLF as line-ending.  Each line feed (LF) character from the input
  data is translated into CR+LF before being written to the socket.  Line
 diff --git a/netcat.c b/netcat.c
-index efa6618365f7..099e615adc0f 100644
+index 73fdfa45a966..2768ef82def4 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -132,6 +132,7 @@
@@ -44,7 +47,7 @@ index efa6618365f7..099e615adc0f 100644
  int	dflag;					/* detached, no stdin */
  int	Fflag;					/* fdpass sock to stdout */
  unsigned int iflag;				/* Interval Flag */
-@@ -261,9 +262,9 @@ main(int argc, char *argv[])
+@@ -262,9 +263,9 @@ main(int argc, char *argv[])
  
  	while ((ch = getopt(argc, argv,
  #ifdef HAVE_TLS
@@ -56,7 +59,7 @@ index efa6618365f7..099e615adc0f 100644
  #endif
  	    != -1) {
  		switch (ch) {
-@@ -273,6 +274,13 @@ main(int argc, char *argv[])
+@@ -274,6 +275,13 @@ main(int argc, char *argv[])
  		case '6':
  			family = AF_INET6;
  			break;
@@ -70,7 +73,7 @@ index efa6618365f7..099e615adc0f 100644
  		case 'U':
  			family = AF_UNIX;
  			break;
-@@ -1907,6 +1915,15 @@ set_common_sockopts(int s, int af)
+@@ -1912,6 +1920,15 @@ set_common_sockopts(int s, int af)
  {
  	int x = 1;
  
@@ -86,7 +89,7 @@ index efa6618365f7..099e615adc0f 100644
  #ifdef TCP_MD5SIG
  	if (Sflag) {
  		if (setsockopt(s, IPPROTO_TCP, TCP_MD5SIG,
-@@ -2185,6 +2202,7 @@ help(void)
+@@ -2195,6 +2212,7 @@ help(void)
  	fprintf(stderr, "\tCommand Summary:\n\
  	\t-4		Use IPv4\n\
  	\t-6		Use IPv6\n\
diff --git a/patches/netcat-openbsd-1.228/0010-Serialized-handling-of-multiple-clients.patch b/patches/netcat-openbsd-1.234/0010-Serialized-handling-of-multiple-clients.patch
similarity index 70%
rename from patches/netcat-openbsd-1.228/0010-Serialized-handling-of-multiple-clients.patch
rename to patches/netcat-openbsd-1.234/0010-Serialized-handling-of-multiple-clients.patch
index 7b31bb9ee..427ac0183 100644
--- a/patches/netcat-openbsd-1.228/0010-Serialized-handling-of-multiple-clients.patch
+++ b/patches/netcat-openbsd-1.234/0010-Serialized-handling-of-multiple-clients.patch
@@ -1,19 +1,22 @@
 From: Aron Xu <aron@debian.org>
 Date: Tue, 14 Feb 2012 23:02:00 +0800
 Subject: [PATCH] Serialized handling of multiple clients
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 17 ++++++++---------
  1 file changed, 8 insertions(+), 9 deletions(-)
 
 diff --git a/netcat.c b/netcat.c
-index 099e615adc0f..7e3813297fcb 100644
+index 2768ef82def4..af3559eeec56 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -713,7 +713,10 @@ main(int argc, char *argv[])
+@@ -718,7 +718,10 @@ main(int argc, char *argv[])
  				s = unix_bind(host, 0);
  			else
  				s = unix_listen(host);
@@ -25,7 +28,7 @@ index 099e615adc0f..7e3813297fcb 100644
  
  #ifdef HAVE_TLS
  		if (usetls) {
-@@ -727,13 +730,6 @@ main(int argc, char *argv[])
+@@ -732,13 +735,6 @@ main(int argc, char *argv[])
  #endif
  		/* Allow only one connection at a time, but stay alive. */
  		for (;;) {
@@ -39,7 +42,7 @@ index 099e615adc0f..7e3813297fcb 100644
  			if (uflag && kflag) {
  				/*
  				 * For UDP and -k, don't connect the socket,
-@@ -807,8 +803,11 @@ main(int argc, char *argv[])
+@@ -812,8 +808,11 @@ main(int argc, char *argv[])
  #endif
  			}
  
diff --git a/patches/netcat-openbsd-1.228/0011-Fix-TCP-MD5SIG-for-client-connections.patch b/patches/netcat-openbsd-1.234/0011-Fix-TCP-MD5SIG-for-client-connections.patch
similarity index 80%
rename from patches/netcat-openbsd-1.228/0011-Fix-TCP-MD5SIG-for-client-connections.patch
rename to patches/netcat-openbsd-1.234/0011-Fix-TCP-MD5SIG-for-client-connections.patch
index 5348e6326..ac2fae838 100644
--- a/patches/netcat-openbsd-1.228/0011-Fix-TCP-MD5SIG-for-client-connections.patch
+++ b/patches/netcat-openbsd-1.234/0011-Fix-TCP-MD5SIG-for-client-connections.patch
@@ -1,16 +1,19 @@
 From: Thomas Habets <habets@google.com>
 Date: Sat, 18 Feb 2017 21:07:22 +0000
 Subject: [PATCH] Fix TCP MD5SIG for client connections
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 34 ++++++++++++++++++++++++++--------
  1 file changed, 26 insertions(+), 8 deletions(-)
 
 diff --git a/netcat.c b/netcat.c
-index 7e3813297fcb..9a73a7cef50e 100644
+index af3559eeec56..d5aaaea045e1 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -46,6 +46,9 @@
@@ -23,7 +26,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  
  #ifndef IPTOS_LOWDELAY
  # define IPTOS_LOWDELAY 0x10
-@@ -175,6 +178,9 @@ FILE	*Zflag;					/* file to save peer cert */
+@@ -176,6 +179,9 @@ FILE	*Zflag;					/* file to save peer cert */
  int	Cflag = 0;			/* CRLF line-ending */
  #endif
  
@@ -33,7 +36,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  int recvcount, recvlimit;
  int timeout = -1;
  int family = AF_UNSPEC;
-@@ -206,7 +212,7 @@ void	connection_info(const char *, const char *, const char *, const char *);
+@@ -207,7 +213,7 @@ void	connection_info(const char *, const char *, const char *, const char *);
  int	unix_bind(char *, int);
  int	unix_connect(char *);
  int	unix_listen(char *);
@@ -42,7 +45,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  int	process_tos_opt(char *, int *);
  #ifdef HAVE_TLS
  int	process_tls_opt(char *, int *);
-@@ -456,7 +462,10 @@ main(int argc, char *argv[])
+@@ -459,7 +465,10 @@ main(int argc, char *argv[])
  			break;
  #endif
  		case 'S':
@@ -54,7 +57,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  			Sflag = 1;
  #else
  			errx(1, "no TCP MD5 signature support available");
-@@ -1161,7 +1170,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
+@@ -1166,7 +1175,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints,
  			freeaddrinfo(ares);
  		}
  
@@ -63,7 +66,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  
  		if (ipaddr != NULL) {
  			herr = getnameinfo(res->ai_addr, res->ai_addrlen,
-@@ -1336,7 +1345,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
+@@ -1341,7 +1350,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
  			err(1, NULL);
  #endif
  
@@ -72,7 +75,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  
  		if (bind(s, (struct sockaddr *)res->ai_addr,
  		    res->ai_addrlen) == 0)
-@@ -1910,9 +1919,10 @@ connection_info(const char *host, const char *port, const char *proto,
+@@ -1915,9 +1924,10 @@ connection_info(const char *host, const char *port, const char *proto,
  }
  
  void
@@ -84,7 +87,7 @@ index 7e3813297fcb..9a73a7cef50e 100644
  
  #ifdef SO_BROADCAST
  	if (bflag) {
-@@ -1923,10 +1933,18 @@ set_common_sockopts(int s, int af)
+@@ -1928,10 +1938,18 @@ set_common_sockopts(int s, int af)
  			err(1, NULL);
  	}
  #endif
diff --git a/patches/netcat-openbsd-1.228/0012-Add-ability-to-specify-a-list-of-destination-ports.patch b/patches/netcat-openbsd-1.234/0012-Add-ability-to-specify-a-list-of-destination-ports.patch
similarity index 90%
rename from patches/netcat-openbsd-1.228/0012-Add-ability-to-specify-a-list-of-destination-ports.patch
rename to patches/netcat-openbsd-1.234/0012-Add-ability-to-specify-a-list-of-destination-ports.patch
index ce1e5e593..1d859c372 100644
--- a/patches/netcat-openbsd-1.228/0012-Add-ability-to-specify-a-list-of-destination-ports.patch
+++ b/patches/netcat-openbsd-1.234/0012-Add-ability-to-specify-a-list-of-destination-ports.patch
@@ -1,20 +1,23 @@
 From: Guilhem Moulin <guilhem@debian.org>
 Date: Mon, 22 Oct 2018 04:15:52 +0200
 Subject: [PATCH] Add ability to specify a list of destination ports
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     | 26 +++++++++++++++++---
  netcat.c | 86 +++++++++++++++++++++++++++++++++-------------------------------
  2 files changed, 68 insertions(+), 44 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index 49a3d4d61892..80c654c326f6 100644
+index 6ee1584f8c6b..ed659b44c122 100644
 --- a/nc.1
 +++ b/nc.1
-@@ -417,15 +417,35 @@ The
+@@ -423,15 +423,35 @@ The
  flag can be used to tell
  .Nm
  to report open ports,
@@ -54,10 +57,10 @@ index 49a3d4d61892..80c654c326f6 100644
  Alternatively, it might be useful to know which server software
  is running, and which versions.
 diff --git a/netcat.c b/netcat.c
-index 9a73a7cef50e..83a36b279cf4 100644
+index d5aaaea045e1..da3767a44317 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -191,7 +191,7 @@ int minttl = -1;
+@@ -192,7 +192,7 @@ int minttl = -1;
  
  void	atelnet(int, unsigned char *, unsigned int);
  int	strtoport(char *portstr, int udp);
@@ -66,7 +69,7 @@ index 9a73a7cef50e..83a36b279cf4 100644
  void	help(void) __attribute__((noreturn));
  int	local_listen(const char *, const char *, struct addrinfo);
  #ifdef HAVE_TLS
-@@ -241,7 +241,7 @@ int
+@@ -242,7 +242,7 @@ int
  main(int argc, char *argv[])
  {
  	int ch, s = -1, ret, socksv;
@@ -75,7 +78,7 @@ index 9a73a7cef50e..83a36b279cf4 100644
  	char ipaddr[NI_MAXHOST];
  	struct addrinfo hints;
  	socklen_t len;
-@@ -521,10 +521,10 @@ main(int argc, char *argv[])
+@@ -524,10 +524,10 @@ main(int argc, char *argv[])
  		if (zflag)
  			errx(1, "cannot use -z and -l");
  	} else if (argc == 1 && lflag) {
@@ -88,7 +91,7 @@ index 9a73a7cef50e..83a36b279cf4 100644
  	} else
  		usage(1);
  
-@@ -723,7 +723,7 @@ main(int argc, char *argv[])
+@@ -728,7 +728,7 @@ main(int argc, char *argv[])
  			else
  				s = unix_listen(host);
  		} else
@@ -97,7 +100,7 @@ index 9a73a7cef50e..83a36b279cf4 100644
  		if (s < 0)
  			err(1, NULL);
  
-@@ -1810,57 +1810,61 @@ strtoport(char *portstr, int udp)
+@@ -1815,57 +1815,61 @@ strtoport(char *portstr, int udp)
   * that we should try to connect to.
   */
  void
diff --git a/patches/netcat-openbsd-1.228/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch b/patches/netcat-openbsd-1.234/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch
similarity index 88%
rename from patches/netcat-openbsd-1.228/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch
rename to patches/netcat-openbsd-1.234/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch
index 4e9987780..cbc524bb9 100644
--- a/patches/netcat-openbsd-1.228/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch
+++ b/patches/netcat-openbsd-1.234/0013-Add-ability-to-use-s-p-flags-to-specify-listening-ad.patch
@@ -1,17 +1,20 @@
 From: Guilhem Moulin <guilhem@debian.org>
 Date: Mon, 22 Oct 2018 04:50:54 +0200
 Subject: [PATCH] Add ability to use -s/-p flags to specify listening address
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     | 18 ++++++++++++++----
  netcat.c | 47 +++++++++++++++++++++++++++++++----------------
  2 files changed, 45 insertions(+), 20 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index 80c654c326f6..d30389a2fb28 100644
+index ed659b44c122..91b719ec0a76 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -143,8 +143,20 @@ multiple hosts.
@@ -47,10 +50,10 @@ index 80c654c326f6..d30389a2fb28 100644
  .It Fl T Ar keyword
  Change the IPv4 TOS/IPv6 traffic class value.
 diff --git a/netcat.c b/netcat.c
-index 83a36b279cf4..509b01fc935f 100644
+index da3767a44317..7c448925213e 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -507,27 +507,42 @@ main(int argc, char *argv[])
+@@ -510,27 +510,42 @@ main(int argc, char *argv[])
  #endif
  
  	/* Cruft to make sure options are clean, and used properly. */
diff --git a/patches/netcat-openbsd-1.228/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch b/patches/netcat-openbsd-1.234/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
similarity index 80%
rename from patches/netcat-openbsd-1.228/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
rename to patches/netcat-openbsd-1.234/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
index 9c549f21e..d82a6080b 100644
--- a/patches/netcat-openbsd-1.228/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
+++ b/patches/netcat-openbsd-1.234/0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
@@ -10,18 +10,18 @@ report_sock() is used to show the peer's address/name and port when the
 
 Bug-Debian: https://bugs.debian.org/961378
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  netcat.c | 6 ++++--
  1 file changed, 4 insertions(+), 2 deletions(-)
 
 diff --git a/netcat.c b/netcat.c
-index 509b01fc935f..14264eb7136f 100644
+index 7c448925213e..2690f9e1d283 100644
 --- a/netcat.c
 +++ b/netcat.c
-@@ -2220,9 +2220,11 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
+@@ -2230,9 +2230,11 @@ report_sock(const char *msg, const struct sockaddr *sa, socklen_t salen,
  	case 0:
  		break;
  	case EAI_SYSTEM:
diff --git a/patches/netcat-openbsd-1.228/0015-Add-abstract-UNIX-domain-socket-support.patch b/patches/netcat-openbsd-1.234/0015-Add-abstract-UNIX-domain-socket-support.patch
similarity index 89%
rename from patches/netcat-openbsd-1.228/0015-Add-abstract-UNIX-domain-socket-support.patch
rename to patches/netcat-openbsd-1.234/0015-Add-abstract-UNIX-domain-socket-support.patch
index bcbec0839..addd64ec0 100644
--- a/patches/netcat-openbsd-1.228/0015-Add-abstract-UNIX-domain-socket-support.patch
+++ b/patches/netcat-openbsd-1.234/0015-Add-abstract-UNIX-domain-socket-support.patch
@@ -1,6 +1,9 @@
 From: Dirk Jagdmann <doj@cubic.org>
 Date: Sun, 6 Mar 2022 21:26:31 -0800
 Subject: [PATCH] Add abstract UNIX domain socket support
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
 When using '-U' to connect() or bind() to a UNIX domain socket, if the
 address (path) starts with "@", it is read as an abstract namespace
@@ -10,16 +13,16 @@ This feature is Linux-only.
 
 Forwarded: not-needed
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     |  3 +++
  netcat.c | 75 ++++++++++++++++++++++++++++++++++++++++++++--------------------
  2 files changed, 55 insertions(+), 23 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index d30389a2fb28..8285c1001a88 100644
+index 91b719ec0a76..5b2e22422fc9 100644
 --- a/nc.1
 +++ b/nc.1
 @@ -235,6 +235,9 @@ Cannot be used together with
@@ -33,7 +36,7 @@ index d30389a2fb28..8285c1001a88 100644
  Use UDP instead of TCP.
  Cannot be used together with
 diff --git a/netcat.c b/netcat.c
-index 14264eb7136f..482f977f5c31 100644
+index 2690f9e1d283..1487fbcf6203 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -98,6 +98,7 @@
@@ -44,7 +47,7 @@ index 14264eb7136f..482f977f5c31 100644
  #include <stdarg.h>
  #include <stdio.h>
  #include <stdlib.h>
-@@ -208,6 +209,7 @@ int	timeout_connect(int, const struct sockaddr *, socklen_t);
+@@ -209,6 +210,7 @@ int	timeout_connect(int, const struct sockaddr *, socklen_t);
  int	socks_connect(const char *, const char *, struct addrinfo,
  	    const char *, const char *, struct addrinfo, int, const char *);
  int	udptest(int);
@@ -52,7 +55,7 @@ index 14264eb7136f..482f977f5c31 100644
  void	connection_info(const char *, const char *, const char *, const char *);
  int	unix_bind(char *, int);
  int	unix_connect(char *);
-@@ -931,6 +933,46 @@ main(int argc, char *argv[])
+@@ -936,6 +938,46 @@ main(int argc, char *argv[])
  	return ret;
  }
  
@@ -99,7 +102,7 @@ index 14264eb7136f..482f977f5c31 100644
  /*
   * unix_bind()
   * Returns a unix socket bound to the given path
-@@ -939,24 +981,17 @@ int
+@@ -944,24 +986,17 @@ int
  unix_bind(char *path, int flags)
  {
  	struct sockaddr_un s_un;
@@ -129,7 +132,7 @@ index 14264eb7136f..482f977f5c31 100644
  		save_errno = errno;
  		close(s);
  		errno = save_errno;
-@@ -1066,7 +1101,10 @@ int
+@@ -1071,7 +1106,10 @@ int
  unix_connect(char *path)
  {
  	struct sockaddr_un s_un;
@@ -141,7 +144,7 @@ index 14264eb7136f..482f977f5c31 100644
  
  	if (uflag) {
  		if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) == -1)
-@@ -1076,16 +1114,7 @@ unix_connect(char *path)
+@@ -1081,16 +1119,7 @@ unix_connect(char *path)
  			return -1;
  	}
  
diff --git a/patches/netcat-openbsd-1.228/0016-Misc-failures-and-features.patch b/patches/netcat-openbsd-1.234/0016-Misc-failures-and-features.patch
similarity index 86%
rename from patches/netcat-openbsd-1.228/0016-Misc-failures-and-features.patch
rename to patches/netcat-openbsd-1.234/0016-Misc-failures-and-features.patch
index d4aab9964..2ab48e58d 100644
--- a/patches/netcat-openbsd-1.228/0016-Misc-failures-and-features.patch
+++ b/patches/netcat-openbsd-1.234/0016-Misc-failures-and-features.patch
@@ -1,20 +1,23 @@
 From: Aron Xu <aron@debian.org>
 Date: Mon, 13 Feb 2012 19:06:52 +0800
 Subject: [PATCH] Misc failures and features
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
 
-Imported from netcat-openbsd_1.228-1.debian.tar.xz
+Imported from netcat-openbsd_1.234-1.debian.tar.xz
 
-Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
+Signed-off-by: Sven Püschel <s.pueschel@pengutronix.de>
 ---
  nc.1     | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++
  netcat.c | 37 +++++++++++++++++++++++++++++--------
  2 files changed, 80 insertions(+), 8 deletions(-)
 
 diff --git a/nc.1 b/nc.1
-index 8285c1001a88..a159c73102c7 100644
+index 5b2e22422fc9..141b116c87b2 100644
 --- a/nc.1
 +++ b/nc.1
-@@ -371,6 +371,54 @@ The connection may be terminated using an
+@@ -377,6 +377,54 @@ The connection may be terminated using an
  as the
  .Fl N
  flag was given.
@@ -69,7 +72,7 @@ index 8285c1001a88..a159c73102c7 100644
  .Sh DATA TRANSFER
  The example in the previous section can be expanded to build a
  basic data transfer model.
-@@ -523,6 +571,9 @@ Original implementation by
+@@ -529,6 +577,9 @@ Original implementation by
  .br
  Rewritten with IPv6 support by
  .An Eric Jackson Aq Mt ericj@monkey.org .
@@ -80,7 +83,7 @@ index 8285c1001a88..a159c73102c7 100644
  UDP port scans using the
  .Fl uz
 diff --git a/netcat.c b/netcat.c
-index 482f977f5c31..99e412a43d25 100644
+index 1487fbcf6203..339b5b08e07b 100644
 --- a/netcat.c
 +++ b/netcat.c
 @@ -114,7 +114,7 @@
@@ -92,7 +95,7 @@ index 482f977f5c31..99e412a43d25 100644
  
  #define POLL_STDIN	0
  #define POLL_NETOUT	1
-@@ -618,10 +618,20 @@ main(int argc, char *argv[])
+@@ -621,10 +621,20 @@ main(int argc, char *argv[])
  		if (sflag) {
  			unix_dg_tmp_socket = sflag;
  		} else {
@@ -116,7 +119,7 @@ index 482f977f5c31..99e412a43d25 100644
  			unix_dg_tmp_socket = unix_dg_tmp_socket_buf;
  		}
  	}
-@@ -851,8 +861,14 @@ main(int argc, char *argv[])
+@@ -856,8 +866,14 @@ main(int argc, char *argv[])
  			ret = 1;
  		}
  
@@ -132,7 +135,7 @@ index 482f977f5c31..99e412a43d25 100644
  		return ret;
  	} else {
  		int i = 0;
-@@ -991,6 +1007,11 @@ unix_bind(char *path, int flags)
+@@ -996,6 +1012,11 @@ unix_bind(char *path, int flags)
  	    0)) == -1)
  		return -1;
  
@@ -144,7 +147,7 @@ index 482f977f5c31..99e412a43d25 100644
  	if (bind(s, (struct sockaddr *)&s_un, addrlen) == -1) {
  		save_errno = errno;
  		close(s);
-@@ -1108,7 +1129,7 @@ unix_connect(char *path)
+@@ -1113,7 +1134,7 @@ unix_connect(char *path)
  
  	if (uflag) {
  		if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) == -1)
@@ -153,7 +156,7 @@ index 482f977f5c31..99e412a43d25 100644
  	} else {
  		if ((s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)) == -1)
  			return -1;
-@@ -1381,12 +1402,12 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
+@@ -1386,12 +1407,12 @@ local_listen(const char *host, const char *port, struct addrinfo hints)
  
  		ret = setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &x, sizeof(x));
  		if (ret == -1)
diff --git a/patches/netcat-openbsd-1.228/series b/patches/netcat-openbsd-1.234/series
similarity index 90%
rename from patches/netcat-openbsd-1.228/series
rename to patches/netcat-openbsd-1.234/series
index 509c6f628..3a2f4c1fe 100644
--- a/patches/netcat-openbsd-1.228/series
+++ b/patches/netcat-openbsd-1.234/series
@@ -1,6 +1,5 @@
 # generated by git-ptx-patches
 #tag:base --start-number 1
-#tag:debian --start-number 1
 0001-Port-to-linux-with-libbsd.patch
 0002-Build-without-TLS-support.patch
 0003-Fix-connect-timeout.patch
@@ -17,4 +16,4 @@
 0014-Make-getnameinfo-3-errors-non-fatal-in-report_sock.patch
 0015-Add-abstract-UNIX-domain-socket-support.patch
 0016-Misc-failures-and-features.patch
-# 49bf351b6535a9e93b3ba53d1615d937  - git-ptx-patches magic
+# 8bd79d7d7102171da3b8f24c5ffb5b40  - git-ptx-patches magic
diff --git a/rules/netcat.make b/rules/netcat.make
index 4020673ab..e09b60d0b 100644
--- a/rules/netcat.make
+++ b/rules/netcat.make
@@ -14,15 +14,17 @@ PACKAGES-$(PTXCONF_NETCAT) += netcat
 #
 # Paths and names
 #
-NETCAT_VERSION	:= 1.228
-NETCAT_MD5	:= c30dd048bd65f619f6ed1c9b69255b29
+NETCAT_VERSION	:= 1.234
+NETCAT_MD5	:= c3906f02d5a070afd8ac23ec983fc746
 NETCAT		:= netcat-openbsd-$(NETCAT_VERSION)
 NETCAT_SUFFIX	:= tar.gz
 NETCAT_TARBALL	:= netcat-openbsd_$(NETCAT_VERSION).orig.$(NETCAT_SUFFIX)
-NETCAT_URL	:= https://snapshot.debian.org/archive/debian/20250106T033111Z/pool/main/n/netcat-openbsd/$(NETCAT_TARBALL)
+NETCAT_URL	:= https://snapshot.debian.org/archive/debian/20251024T083547Z/pool/main/n/netcat-openbsd/$(NETCAT_TARBALL)
 NETCAT_SOURCE	:= $(SRCDIR)/$(NETCAT).$(NETCAT_SUFFIX)
 NETCAT_DIR	:= $(BUILDDIR)/$(NETCAT)
-NETCAT_LICENSE	:= BSD
+NETCAT_LICENSE	:= BSD-3-Clause
+NETCAT_LICENSE_FILES := \
+	file://netcat.c;startline=2;endline=28;md5=ca6c43ecf716610359891a6a6e1df406
 
 # ----------------------------------------------------------------------------
 # Prepare
-- 
2.47.3




^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2025-10-24 13:31 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-10-24 13:30 [ptxdist] [PATCH] netcat: version bump 1.228 -> 1.234 Sven Püschel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox