[csw-devel] SF.net SVN: gar:[6276] csw/mgar/pkg/tcpwrappers/trunk

dmichelsen at users.sourceforge.net dmichelsen at users.sourceforge.net
Fri Sep 11 20:45:14 CEST 2009


Revision: 6276
          http://gar.svn.sourceforge.net/gar/?rev=6276&view=rev
Author:   dmichelsen
Date:     2009-09-11 18:45:14 +0000 (Fri, 11 Sep 2009)

Log Message:
-----------
tcpwrappers: Initial commit

Modified Paths:
--------------
    csw/mgar/pkg/tcpwrappers/trunk/Makefile
    csw/mgar/pkg/tcpwrappers/trunk/checksums

Added Paths:
-----------
    csw/mgar/pkg/tcpwrappers/trunk/files/
    csw/mgar/pkg/tcpwrappers/trunk/files/COPYING
    csw/mgar/pkg/tcpwrappers/trunk/files/README
    csw/mgar/pkg/tcpwrappers/trunk/files/man.patch
    csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff
    csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch

Modified: csw/mgar/pkg/tcpwrappers/trunk/Makefile
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/Makefile	2009-09-11 18:33:24 UTC (rev 6275)
+++ csw/mgar/pkg/tcpwrappers/trunk/Makefile	2009-09-11 18:45:14 UTC (rev 6276)
@@ -1,5 +1,7 @@
 GARNAME = tcp_wrappers
-GARVERSION = 7.6
+BASEVERSION = 7.6
+RELEASE = ipv6.4
+GARVERSION = $(BASEVERSION)-$(RELEASE)
 CATEGORIES = lib
 
 DESCRIPTION = Socket wrappers for pre-screening tcp connections (ipv6.4 patched)
@@ -10,33 +12,95 @@
 MASTER_SITES = http://ftp.porcupine.org/pub/security/
 DISTNAME = $(GARNAME)_$(GARVERSION)
 DISTFILES = $(DISTNAME).tar.gz
+DISTFILES += COPYING
+DISTFILES += README
+
+PATCHFILES = patch-cflags.diff
+PATCHFILES += man.patch
+PATCHFILES += sharedlib.patch
+
 WORKSRC = $(WORKDIR)/$(DISTNAME)
 
+PACKAGES = CSWtcpwrap
+CATALOGNAME = tcpwrappers
+
+SPKG_VERSION = $(BASEVERSION)
+
 # We define upstream file regex so we can be notifed of new upstream software release
 UFILES_REGEX = $(GARNAME)_(\d+(?:\.\d+)*).tar.gz
 
-#BUILD_ARGS  = REAL_DAEMON_DIR=/foo/bar
+EXTRA_MODULATORS = EXTENDED
+MODULATIONS_EXTENDED = on off
+
+BUILD_ARGS = REAL_DAEMON_DIR=/usr/sbin
 BUILD_ARGS += STYLE=-DPROCESS_OPTIONS
+BUILD_ARGS += USER_CFLAGS="$(CFLAGS)"
 
+BUILD64 = 1
+
 CONFIGURE_SCRIPTS =
+
+BUILD_TARGET_EXTENDED_off = sunos5-shared
+BUILD_TARGET_EXTENDED_on = sunos5-sharedext
+
 BUILD_SCRIPTS = custom
-INSTALL_SCRIPTS = custom
 
 # No test suite
 TEST_SCRIPTS =
 
+LIBNAME_EXTENDED-off = libwrap-std.so.1
+LIBNAME_EXTENDED-on  = libwrap-ext.so.1
+
+INSTALL_SCRIPTS = custom
+
+MERGE_SCRIPTS_isa-sparcv8-extended-off = copy-all
+ MERGE_SCRIPTS_isa-sparcv8-extended-on = copy-relocated-only
+    MERGE_DIRS_isa-sparcv8-extended-on = $(libdir)
+
+MERGE_SCRIPTS_isa-sparcv9-extended-off = copy-relocated-only
+   MERGE_DIRS_isa-sparcv9-extended-off = $(libdir)
+ MERGE_SCRIPTS_isa-sparcv9-extended-on = copy-relocated-only
+    MERGE_DIRS_isa-sparcv9-extended-on = $(libdir)
+
+   MERGE_SCRIPTS_isa-i386-extended-off = copy-all
+    MERGE_SCRIPTS_isa-i386-extended-on = copy-relocated-only
+       MERGE_DIRS_isa-i386-extended-on = $(libdir)
+
+  MERGE_SCRIPTS_isa-amd64-extended-off = copy-relocated-only
+     MERGE_DIRS_isa-amd64-extended-off = $(libdir)
+   MERGE_SCRIPTS_isa-amd64-extended-on = copy-relocated-only
+      MERGE_DIRS_isa-amd64-extended-on = $(libdir)
+
 include gar/category.mk
 
 build-custom:
-	@$(MAKE) -C $(WORKSRC) $(BUILD_ARGS) sunos5
+	$(MAKE) -C $(WORKSRC) $(BUILD_ARGS) $(BUILD_TARGET_EXTENDED_$(EXTENDED))
+	@$(MAKECOOKIE)
 
-BINFILES = $(addprefix $(WORKSRC)/,safe_finger tcpd tcpdchk tcpdmatch try-from)
-INCFILES = $(addprefix $(WORKSRC)/,tcpd.h)
-LIBFILES = $(addprefix $(WORKSRC)/,libwrap.a)
-
 install-custom:
 	@echo " => Installing $(GARNAME)"
-	@install -v -m 555 $(BINFILES) $(DESTDIR)$(bindir)
-	@install -v -m 444 $(INCFILES) $(DESTDIR)$(includedir)
-	@install -v -m 444 $(LIBFILES) $(DESTDIR)$(libdir)
-	
+	ginstall -d $(DESTDIR)$(docdir)/$(GARNAME)
+	cd $(WORKDIR) && ginstall -v -m 644 README $(DESTDIR)$(docdir)/$(GARNAME)
+	ginstall -d $(DESTDIR)$(libexecdir)
+	cd $(WORKSRC) && ginstall -v -m 755 safe_finger tcpd tcpdchk tcpdmatch try-from $(DESTDIR)$(libexecdir)
+	ginstall -d $(DESTDIR)$(includedir)
+	cd $(WORKSRC) && ginstall -v -m 644 tcpd.h $(DESTDIR)$(includedir)
+	ginstall -d $(DESTDIR)$(libdir)
+	cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.1 $(DESTDIR)$(libdir)/$(LIBNAME_EXTENDED-$(EXTENDED))
+	ginstall -d $(DESTDIR)$(mandir)/man3
+	cd $(WORKSRC) && ginstall -v -m 644 *.3 $(DESTDIR)$(mandir)/man3
+	ginstall -d $(DESTDIR)$(mandir)/man5
+	cd $(WORKSRC) && ginstall -v -m 644 *.5 $(DESTDIR)$(mandir)/man5
+	ginstall -d $(DESTDIR)$(mandir)/man8
+	cd $(WORKSRC) && ginstall -v -m 644 *.8 $(DESTDIR)$(mandir)/man8
+	@$(MAKECOOKIE)
+
+post-merge:
+	ln -s libwrap-std.so.1 $(PKGROOT)$(libdir)/libwrap.so.1
+	ln -s libwrap.so.1 $(PKGROOT)$(libdir)/libwrap.so
+	ln -s libwrap-std.so.1 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so.1
+	ln -s libwrap.so.1 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so
+	@$(MAKECOOKIE)
+
+SPKG_REVSTAMP := $(SPKG_REVSTAMP)_rev=$(RELEASE)
+

Modified: csw/mgar/pkg/tcpwrappers/trunk/checksums
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/checksums	2009-09-11 18:33:24 UTC (rev 6275)
+++ csw/mgar/pkg/tcpwrappers/trunk/checksums	2009-09-11 18:45:14 UTC (rev 6276)
@@ -1 +1,6 @@
-e6fa25f71226d090f34de3f6b122fb5a  download/tcp_wrappers_7.6.tar.gz
+071bd69cb78b18888ea5e3da5c3127fa  download/COPYING
+b268880c14ab6d31140015275c82d6aa  download/README
+89e8f9d1ed25d8e809674af9bf3d18e6  download/man.patch
+af28873e5c16c4f921237148e2507826  download/patch-cflags.diff
+39ff14b0cc741a02a8427c4107c5d7d4  download/sharedlib.patch
+ccbc2676977c31bbd43783abfbf2fdcf  download/tcp_wrappers_7.6-ipv6.4.tar.gz

Copied: csw/mgar/pkg/tcpwrappers/trunk/files/COPYING (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/copyright)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/COPYING	                        (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/COPYING	2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,16 @@
+/************************************************************************
+* Copyright 1995 by Wietse Venema.  All rights reserved.  Some individual
+* files may be covered by other copyrights.
+*
+* This material was originally written and compiled by Wietse Venema at
+* Eindhoven University of Technology, The Netherlands, in 1990, 1991,
+* 1992, 1993, 1994 and 1995.
+*
+* Redistribution and use in source and binary forms are permitted
+* provided that this entire copyright notice is duplicated in all such
+* copies.
+*
+* This software is provided "as is" and without any expressed or implied
+* warranties, including, without limitation, the implied warranties of
+* merchantibility and fitness for any particular purpose.
+************************************************************************/

Copied: csw/mgar/pkg/tcpwrappers/trunk/files/README (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/README.t)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/README	                        (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/README	2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,28 @@
+TCP-Wrappers, from http://www.porcupine.org
+
+Note  that the library is compiled to use LOG_LOCAL1 as the
+syslog facility, NOT "LOG_MAIL", the default.
+
+ALSO, it uses /etc/opt/csw/hosts.xxx, NOT /etc/hosts.XXX
+
+man hosts_access(3), hosts_access(5), hosts_options(5)
+for syntax on those.
+
+The compile has been hacked to provide a shared-library version instead
+of libwrap.a
+There is an extra hack, in that there are default variable definitions of
+deny_severity and allow_severity, set to 0.
+This is to allow for ./configure style tests, that break in the transition
+from lib.a to lib.so
+
+
+Note also that there are TWO versions of libwrap.so: 
+libwrap-std.so.1      The "standard" tcp wrapper library
+libwrap-ext.so.1      The "extended" tcp wrapper library
+
+By default, /opt/csw/lib/libwrap.so.1 is linked to the std version.
+To use the extended syntax in hosts_options(5), you need to change
+the link to point to libwrap-ext.so.1
+Unfortunately, the syntax for the two versions, is slightly incompatible,
+which is why there are two versions.
+

Copied: csw/mgar/pkg/tcpwrappers/trunk/files/man.patch (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/man.patch)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/man.patch	                        (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/man.patch	2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,154 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3
+--- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3	1996-02-11 17:01:27.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3	2009-09-11 18:54:28.630235290 +0200
+@@ -78,7 +78,7 @@
+ hosts_access(5), format of the access control tables.
+ hosts_options(5), optional extensions to the base language.
+ .SH FILES
+-/etc/hosts.allow, /etc/hosts.deny, access control tables.
++/etc/opt/csw/hosts.allow, /etc//opt/csw/hosts.deny, access control tables.
+ .SH BUGS
+ hosts_access() uses the strtok() library function. This may interfere
+ with other code that relies on strtok().
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5
+--- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5	1995-01-30 19:51:47.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5	2009-09-11 18:54:28.633332432 +0200
+@@ -21,10 +21,10 @@
+ at the first match:
+ .IP \(bu
+ Access will be granted when a (daemon,client) pair matches an entry in
+-the \fI/etc/hosts.allow\fR file.
++the \fI/etc/opt/csw/hosts.allow\fR file.
+ .IP \(bu
+ Otherwise, access will be denied when a (daemon,client) pair matches an
+-entry in the \fI/etc/hosts.deny\fR file.
++entry in the \fI/etc/opt/csw/hosts.deny\fR file.
+ .IP \(bu
+ Otherwise, access will be granted.
+ .PP
+@@ -268,7 +268,7 @@
+ file:
+ .PP
+ .ne 2
+-/etc/hosts.deny: 
++/etc/opt/csw/hosts.deny: 
+ .in +3
+ ALL: ALL
+ .PP
+@@ -279,7 +279,7 @@
+ For example:
+ .PP
+ .ne 2
+-/etc/hosts.allow: 
++/etc/opt/csw/hosts.allow: 
+ .in +3
+ ALL: LOCAL @some_netgroup
+ .br
+@@ -298,7 +298,7 @@
+ that it can be omitted.  The explicitly non-authorized hosts are listed
+ in the deny file. For example:
+ .PP
+-/etc/hosts.deny:
++/etc/opt/csw/hosts.deny:
+ .in +3
+ ALL: some.host.name, .some.domain
+ .br
+@@ -313,13 +313,13 @@
+ host. The result is mailed to the superuser.
+ .PP
+ .ne 2
+-/etc/hosts.allow:
++/etc/opt/csw/hosts.allow:
+ .in +3
+ .nf
+ in.tftpd: LOCAL, .my.domain
+ .PP
+ .ne 2
+-/etc/hosts.deny:
++/etc/opt/csw/hosts.deny:
+ .in +3
+ .nf
+ in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
+@@ -353,8 +353,8 @@
+ .SH FILES
+ .na
+ .nf
+-/etc/hosts.allow, (daemon,client) pairs that are granted access.
+-/etc/hosts.deny, (daemon,client) pairs that are denied access.
++/etc/opt/csw/hosts.allow, (daemon,client) pairs that are granted access.
++/etc/opt/csw/hosts.deny, (daemon,client) pairs that are denied access.
+ .ad
+ .fi
+ .SH SEE ALSO
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 tcp_wrappers_7.6-ipv6.4.patched/tcpd.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpd.8	1996-02-21 16:39:16.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpd.8	2009-09-11 18:54:28.635231817 +0200
+@@ -146,7 +146,7 @@
+ only non-trivial service that is affected by this limitation is
+ \fIrexd\fR, which is used by the \fIon(1)\fR command. This is no great
+ loss.  On most systems, \fIrexd\fR is less secure than a wildcard in
+-/etc/hosts.equiv.
++/etc/opt/csw/hosts.equiv.
+ .PP
+ RPC broadcast requests (for example: \fIrwall, rup, rusers\fR) always
+ appear to come from the responding host. What happens is that the
+@@ -158,9 +158,9 @@
+ .PP
+ The default locations of the host access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8	1995-01-08 17:00:31.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8	2009-09-11 18:54:28.636911201 +0200
+@@ -8,7 +8,7 @@
+ \fItcpdchk\fR examines your tcp wrapper configuration and reports all
+ potential and real problems it can find. The program examines the
+ \fItcpd\fR access control files (by default, these are
+-\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
++\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR), and compares the
+ entries in these files against entries in the \fIinetd\fR or \fItlid\fR
+ network configuration files.
+ .PP
+@@ -44,9 +44,9 @@
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8	1996-02-11 17:01:36.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8	2009-09-11 18:54:28.638584325 +0200
+@@ -11,7 +11,7 @@
+ request for service.  Examples are given below.
+ .PP
+ The program examines the \fItcpd\fR access control tables (default
+-\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
++\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR) and prints its
+ conclusion.  For maximal accuracy, it extracts additional information
+ from your \fIinetd\fR or \fItlid\fR network configuration file.
+ .PP
+@@ -76,9 +76,9 @@
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf

Added: csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff	                        (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff	2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,12 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/Makefile tcp_wrappers_7.6-ipv6.4.patched/Makefile
+--- tcp_wrappers_7.6-ipv6.4.orig/Makefile	2003-04-16 16:25:03.000000000 +0200
++++ tcp_wrappers_7.6-ipv6.4.patched/Makefile	2009-09-11 17:11:48.499403164 +0200
+@@ -677,7 +677,7 @@
+ 	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
+ 	-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
+ 	$(UCHAR) $(TABLES) $(STRINGS) $(TLI) $(EXTRA_CFLAGS) $(DOT) \
+-	$(VSYSLOG) $(HOSTNAME) $(IPV6)
++	$(VSYSLOG) $(HOSTNAME) $(IPV6) $(USER_CFLAGS)
+ 
+ LIB_OBJ= hosts_access.o options.o shell_cmd.o rfc931.o eval.o \
+ 	hosts_ctl.o refuse.o percent_x.o clean_exit.o $(AUX_OBJ) \

Copied: csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/sharedlib.patch)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch	                        (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch	2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,73 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/Makefile tcp_wrappers_7.6-ipv6.4.patched/Makefile
+--- tcp_wrappers_7.6-ipv6.4.orig/Makefile	2003-04-16 16:25:03.000000000 +0200
++++ tcp_wrappers_7.6-ipv6.4.patched/Makefile	2009-09-11 18:58:37.916723372 +0200
+@@ -197,6 +197,24 @@
+ 	BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
+ 	EXTRA_CFLAGS=-DUSE_STRERROR all
+ 
++sunos5-shared:
++	@$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++	LIBS="-lsocket -lnsl" RANLIB=/bin/true \
++	AR=ld ARFLAGS="-G -h libwrap.so.1 -o " \
++	LIB=libwrap.so.1 VSYSLOG= \
++	NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
++	BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
++	EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
++
++sunos5-sharedext:
++	@$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++	LIBS="-lsocket -lnsl" RANLIB=/bin/true \
++	AR=ld ARFLAGS="-G -h libwrap.so.1 -o " \
++	LIB=libwrap.so.1 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
++	NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
++	BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
++	EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
++
+ # Generic SYSV40
+ esix sysv4:
+ 	@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+@@ -481,7 +499,7 @@
+ # If your system has IPv6 and supports getipnode* and inet_pton/inet_ntop
+ # uncomment the following (Solaris 8)
+ 
+-# IPV6 = -DHAVE_IPV6
++IPV6 = -DHAVE_IPV6
+ 
+ # If your system does not have getipnodebyname() but uses the obsolete
+ # gethostbyname2() instead, use this (AIX)
+@@ -527,7 +545,7 @@
+ #
+ # The LOG_XXX names below are taken from the /usr/include/syslog.h file.
+ 
+-FACILITY= LOG_MAIL	# LOG_MAIL is what most sendmail daemons use
++FACILITY= LOG_LOCAL1	# LOG_MAIL is what most sendmail daemons use
+ 
+ # The syslog priority at which successful connections are logged.
+ 
+@@ -603,7 +621,7 @@
+ # look for access control information. Watch out for the quotes and
+ # backslashes when you make changes.
+ 
+-TABLES	= -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\"
++TABLES	= -DHOSTS_DENY=\"/etc/opt/csw/hosts.deny\" -DHOSTS_ALLOW=\"/etc/opt/csw/hosts.allow\"
+ 
+ ####################################################
+ # Optional: dealing with host name/address conflicts
+@@ -725,7 +743,7 @@
+ 	$(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)
+ 
+ safe_finger: safe_finger.o $(LIB)
+-	$(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)
++	$(CC) $(CFLAGS) -o $@ safe_finger.o $(LIBS)
+ 
+ TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
+ 
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/sharedhack.c tcp_wrappers_7.6-ipv6.4.patched/sharedhack.c
+--- tcp_wrappers_7.6-ipv6.4.orig/sharedhack.c	1970-01-01 01:00:00.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/sharedhack.c	2009-09-11 18:58:37.917838872 +0200
+@@ -0,0 +1,5 @@
++/* This must be compiled with Sun CC for the pragma */
++#pragma weak deny_severity
++#pragma weak allow_severity
++int deny_severity=0;
++int allow_severity=0;


This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.



More information about the devel mailing list