[csw-devel] SF.net SVN: gar:[6276] csw/mgar/pkg/tcpwrappers/trunk
dmichelsen at users.sourceforge.net
dmichelsen at users.sourceforge.net
Fri Sep 11 20:45:14 CEST 2009
Revision: 6276
http://gar.svn.sourceforge.net/gar/?rev=6276&view=rev
Author: dmichelsen
Date: 2009-09-11 18:45:14 +0000 (Fri, 11 Sep 2009)
Log Message:
-----------
tcpwrappers: Initial commit
Modified Paths:
--------------
csw/mgar/pkg/tcpwrappers/trunk/Makefile
csw/mgar/pkg/tcpwrappers/trunk/checksums
Added Paths:
-----------
csw/mgar/pkg/tcpwrappers/trunk/files/
csw/mgar/pkg/tcpwrappers/trunk/files/COPYING
csw/mgar/pkg/tcpwrappers/trunk/files/README
csw/mgar/pkg/tcpwrappers/trunk/files/man.patch
csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff
csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch
Modified: csw/mgar/pkg/tcpwrappers/trunk/Makefile
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/Makefile 2009-09-11 18:33:24 UTC (rev 6275)
+++ csw/mgar/pkg/tcpwrappers/trunk/Makefile 2009-09-11 18:45:14 UTC (rev 6276)
@@ -1,5 +1,7 @@
GARNAME = tcp_wrappers
-GARVERSION = 7.6
+BASEVERSION = 7.6
+RELEASE = ipv6.4
+GARVERSION = $(BASEVERSION)-$(RELEASE)
CATEGORIES = lib
DESCRIPTION = Socket wrappers for pre-screening tcp connections (ipv6.4 patched)
@@ -10,33 +12,95 @@
MASTER_SITES = http://ftp.porcupine.org/pub/security/
DISTNAME = $(GARNAME)_$(GARVERSION)
DISTFILES = $(DISTNAME).tar.gz
+DISTFILES += COPYING
+DISTFILES += README
+
+PATCHFILES = patch-cflags.diff
+PATCHFILES += man.patch
+PATCHFILES += sharedlib.patch
+
WORKSRC = $(WORKDIR)/$(DISTNAME)
+PACKAGES = CSWtcpwrap
+CATALOGNAME = tcpwrappers
+
+SPKG_VERSION = $(BASEVERSION)
+
# We define upstream file regex so we can be notifed of new upstream software release
UFILES_REGEX = $(GARNAME)_(\d+(?:\.\d+)*).tar.gz
-#BUILD_ARGS = REAL_DAEMON_DIR=/foo/bar
+EXTRA_MODULATORS = EXTENDED
+MODULATIONS_EXTENDED = on off
+
+BUILD_ARGS = REAL_DAEMON_DIR=/usr/sbin
BUILD_ARGS += STYLE=-DPROCESS_OPTIONS
+BUILD_ARGS += USER_CFLAGS="$(CFLAGS)"
+BUILD64 = 1
+
CONFIGURE_SCRIPTS =
+
+BUILD_TARGET_EXTENDED_off = sunos5-shared
+BUILD_TARGET_EXTENDED_on = sunos5-sharedext
+
BUILD_SCRIPTS = custom
-INSTALL_SCRIPTS = custom
# No test suite
TEST_SCRIPTS =
+LIBNAME_EXTENDED-off = libwrap-std.so.1
+LIBNAME_EXTENDED-on = libwrap-ext.so.1
+
+INSTALL_SCRIPTS = custom
+
+MERGE_SCRIPTS_isa-sparcv8-extended-off = copy-all
+ MERGE_SCRIPTS_isa-sparcv8-extended-on = copy-relocated-only
+ MERGE_DIRS_isa-sparcv8-extended-on = $(libdir)
+
+MERGE_SCRIPTS_isa-sparcv9-extended-off = copy-relocated-only
+ MERGE_DIRS_isa-sparcv9-extended-off = $(libdir)
+ MERGE_SCRIPTS_isa-sparcv9-extended-on = copy-relocated-only
+ MERGE_DIRS_isa-sparcv9-extended-on = $(libdir)
+
+ MERGE_SCRIPTS_isa-i386-extended-off = copy-all
+ MERGE_SCRIPTS_isa-i386-extended-on = copy-relocated-only
+ MERGE_DIRS_isa-i386-extended-on = $(libdir)
+
+ MERGE_SCRIPTS_isa-amd64-extended-off = copy-relocated-only
+ MERGE_DIRS_isa-amd64-extended-off = $(libdir)
+ MERGE_SCRIPTS_isa-amd64-extended-on = copy-relocated-only
+ MERGE_DIRS_isa-amd64-extended-on = $(libdir)
+
include gar/category.mk
build-custom:
- @$(MAKE) -C $(WORKSRC) $(BUILD_ARGS) sunos5
+ $(MAKE) -C $(WORKSRC) $(BUILD_ARGS) $(BUILD_TARGET_EXTENDED_$(EXTENDED))
+ @$(MAKECOOKIE)
-BINFILES = $(addprefix $(WORKSRC)/,safe_finger tcpd tcpdchk tcpdmatch try-from)
-INCFILES = $(addprefix $(WORKSRC)/,tcpd.h)
-LIBFILES = $(addprefix $(WORKSRC)/,libwrap.a)
-
install-custom:
@echo " => Installing $(GARNAME)"
- @install -v -m 555 $(BINFILES) $(DESTDIR)$(bindir)
- @install -v -m 444 $(INCFILES) $(DESTDIR)$(includedir)
- @install -v -m 444 $(LIBFILES) $(DESTDIR)$(libdir)
-
+ ginstall -d $(DESTDIR)$(docdir)/$(GARNAME)
+ cd $(WORKDIR) && ginstall -v -m 644 README $(DESTDIR)$(docdir)/$(GARNAME)
+ ginstall -d $(DESTDIR)$(libexecdir)
+ cd $(WORKSRC) && ginstall -v -m 755 safe_finger tcpd tcpdchk tcpdmatch try-from $(DESTDIR)$(libexecdir)
+ ginstall -d $(DESTDIR)$(includedir)
+ cd $(WORKSRC) && ginstall -v -m 644 tcpd.h $(DESTDIR)$(includedir)
+ ginstall -d $(DESTDIR)$(libdir)
+ cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.1 $(DESTDIR)$(libdir)/$(LIBNAME_EXTENDED-$(EXTENDED))
+ ginstall -d $(DESTDIR)$(mandir)/man3
+ cd $(WORKSRC) && ginstall -v -m 644 *.3 $(DESTDIR)$(mandir)/man3
+ ginstall -d $(DESTDIR)$(mandir)/man5
+ cd $(WORKSRC) && ginstall -v -m 644 *.5 $(DESTDIR)$(mandir)/man5
+ ginstall -d $(DESTDIR)$(mandir)/man8
+ cd $(WORKSRC) && ginstall -v -m 644 *.8 $(DESTDIR)$(mandir)/man8
+ @$(MAKECOOKIE)
+
+post-merge:
+ ln -s libwrap-std.so.1 $(PKGROOT)$(libdir)/libwrap.so.1
+ ln -s libwrap.so.1 $(PKGROOT)$(libdir)/libwrap.so
+ ln -s libwrap-std.so.1 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so.1
+ ln -s libwrap.so.1 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so
+ @$(MAKECOOKIE)
+
+SPKG_REVSTAMP := $(SPKG_REVSTAMP)_rev=$(RELEASE)
+
Modified: csw/mgar/pkg/tcpwrappers/trunk/checksums
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/checksums 2009-09-11 18:33:24 UTC (rev 6275)
+++ csw/mgar/pkg/tcpwrappers/trunk/checksums 2009-09-11 18:45:14 UTC (rev 6276)
@@ -1 +1,6 @@
-e6fa25f71226d090f34de3f6b122fb5a download/tcp_wrappers_7.6.tar.gz
+071bd69cb78b18888ea5e3da5c3127fa download/COPYING
+b268880c14ab6d31140015275c82d6aa download/README
+89e8f9d1ed25d8e809674af9bf3d18e6 download/man.patch
+af28873e5c16c4f921237148e2507826 download/patch-cflags.diff
+39ff14b0cc741a02a8427c4107c5d7d4 download/sharedlib.patch
+ccbc2676977c31bbd43783abfbf2fdcf download/tcp_wrappers_7.6-ipv6.4.tar.gz
Copied: csw/mgar/pkg/tcpwrappers/trunk/files/COPYING (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/copyright)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/COPYING (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/COPYING 2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,16 @@
+/************************************************************************
+* Copyright 1995 by Wietse Venema. All rights reserved. Some individual
+* files may be covered by other copyrights.
+*
+* This material was originally written and compiled by Wietse Venema at
+* Eindhoven University of Technology, The Netherlands, in 1990, 1991,
+* 1992, 1993, 1994 and 1995.
+*
+* Redistribution and use in source and binary forms are permitted
+* provided that this entire copyright notice is duplicated in all such
+* copies.
+*
+* This software is provided "as is" and without any expressed or implied
+* warranties, including, without limitation, the implied warranties of
+* merchantibility and fitness for any particular purpose.
+************************************************************************/
Copied: csw/mgar/pkg/tcpwrappers/trunk/files/README (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/README.t)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/README (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/README 2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,28 @@
+TCP-Wrappers, from http://www.porcupine.org
+
+Note that the library is compiled to use LOG_LOCAL1 as the
+syslog facility, NOT "LOG_MAIL", the default.
+
+ALSO, it uses /etc/opt/csw/hosts.xxx, NOT /etc/hosts.XXX
+
+man hosts_access(3), hosts_access(5), hosts_options(5)
+for syntax on those.
+
+The compile has been hacked to provide a shared-library version instead
+of libwrap.a
+There is an extra hack, in that there are default variable definitions of
+deny_severity and allow_severity, set to 0.
+This is to allow for ./configure style tests, that break in the transition
+from lib.a to lib.so
+
+
+Note also that there are TWO versions of libwrap.so:
+libwrap-std.so.1 The "standard" tcp wrapper library
+libwrap-ext.so.1 The "extended" tcp wrapper library
+
+By default, /opt/csw/lib/libwrap.so.1 is linked to the std version.
+To use the extended syntax in hosts_options(5), you need to change
+the link to point to libwrap-ext.so.1
+Unfortunately, the syntax for the two versions, is slightly incompatible,
+which is why there are two versions.
+
Copied: csw/mgar/pkg/tcpwrappers/trunk/files/man.patch (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/man.patch)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/man.patch (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/man.patch 2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,154 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3
+--- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 1996-02-11 17:01:27.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3 2009-09-11 18:54:28.630235290 +0200
+@@ -78,7 +78,7 @@
+ hosts_access(5), format of the access control tables.
+ hosts_options(5), optional extensions to the base language.
+ .SH FILES
+-/etc/hosts.allow, /etc/hosts.deny, access control tables.
++/etc/opt/csw/hosts.allow, /etc//opt/csw/hosts.deny, access control tables.
+ .SH BUGS
+ hosts_access() uses the strtok() library function. This may interfere
+ with other code that relies on strtok().
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5
+--- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 1995-01-30 19:51:47.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5 2009-09-11 18:54:28.633332432 +0200
+@@ -21,10 +21,10 @@
+ at the first match:
+ .IP \(bu
+ Access will be granted when a (daemon,client) pair matches an entry in
+-the \fI/etc/hosts.allow\fR file.
++the \fI/etc/opt/csw/hosts.allow\fR file.
+ .IP \(bu
+ Otherwise, access will be denied when a (daemon,client) pair matches an
+-entry in the \fI/etc/hosts.deny\fR file.
++entry in the \fI/etc/opt/csw/hosts.deny\fR file.
+ .IP \(bu
+ Otherwise, access will be granted.
+ .PP
+@@ -268,7 +268,7 @@
+ file:
+ .PP
+ .ne 2
+-/etc/hosts.deny:
++/etc/opt/csw/hosts.deny:
+ .in +3
+ ALL: ALL
+ .PP
+@@ -279,7 +279,7 @@
+ For example:
+ .PP
+ .ne 2
+-/etc/hosts.allow:
++/etc/opt/csw/hosts.allow:
+ .in +3
+ ALL: LOCAL @some_netgroup
+ .br
+@@ -298,7 +298,7 @@
+ that it can be omitted. The explicitly non-authorized hosts are listed
+ in the deny file. For example:
+ .PP
+-/etc/hosts.deny:
++/etc/opt/csw/hosts.deny:
+ .in +3
+ ALL: some.host.name, .some.domain
+ .br
+@@ -313,13 +313,13 @@
+ host. The result is mailed to the superuser.
+ .PP
+ .ne 2
+-/etc/hosts.allow:
++/etc/opt/csw/hosts.allow:
+ .in +3
+ .nf
+ in.tftpd: LOCAL, .my.domain
+ .PP
+ .ne 2
+-/etc/hosts.deny:
++/etc/opt/csw/hosts.deny:
+ .in +3
+ .nf
+ in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
+@@ -353,8 +353,8 @@
+ .SH FILES
+ .na
+ .nf
+-/etc/hosts.allow, (daemon,client) pairs that are granted access.
+-/etc/hosts.deny, (daemon,client) pairs that are denied access.
++/etc/opt/csw/hosts.allow, (daemon,client) pairs that are granted access.
++/etc/opt/csw/hosts.deny, (daemon,client) pairs that are denied access.
+ .ad
+ .fi
+ .SH SEE ALSO
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 tcp_wrappers_7.6-ipv6.4.patched/tcpd.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 1996-02-21 16:39:16.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpd.8 2009-09-11 18:54:28.635231817 +0200
+@@ -146,7 +146,7 @@
+ only non-trivial service that is affected by this limitation is
+ \fIrexd\fR, which is used by the \fIon(1)\fR command. This is no great
+ loss. On most systems, \fIrexd\fR is less secure than a wildcard in
+-/etc/hosts.equiv.
++/etc/opt/csw/hosts.equiv.
+ .PP
+ RPC broadcast requests (for example: \fIrwall, rup, rusers\fR) always
+ appear to come from the responding host. What happens is that the
+@@ -158,9 +158,9 @@
+ .PP
+ The default locations of the host access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 1995-01-08 17:00:31.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8 2009-09-11 18:54:28.636911201 +0200
+@@ -8,7 +8,7 @@
+ \fItcpdchk\fR examines your tcp wrapper configuration and reports all
+ potential and real problems it can find. The program examines the
+ \fItcpd\fR access control files (by default, these are
+-\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
++\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR), and compares the
+ entries in these files against entries in the \fIinetd\fR or \fItlid\fR
+ network configuration files.
+ .PP
+@@ -44,9 +44,9 @@
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8
+--- tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 1996-02-11 17:01:36.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8 2009-09-11 18:54:28.638584325 +0200
+@@ -11,7 +11,7 @@
+ request for service. Examples are given below.
+ .PP
+ The program examines the \fItcpd\fR access control tables (default
+-\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
++\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR) and prints its
+ conclusion. For maximal accuracy, it extracts additional information
+ from your \fIinetd\fR or \fItlid\fR network configuration file.
+ .PP
+@@ -76,9 +76,9 @@
+ .PP
+ The default locations of the \fItcpd\fR access control tables are:
+ .PP
+-/etc/hosts.allow
++/etc/opt/csw/hosts.allow
+ .br
+-/etc/hosts.deny
++/etc/opt/csw/hosts.deny
+ .SH SEE ALSO
+ .na
+ .nf
Added: csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/patch-cflags.diff 2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,12 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/Makefile tcp_wrappers_7.6-ipv6.4.patched/Makefile
+--- tcp_wrappers_7.6-ipv6.4.orig/Makefile 2003-04-16 16:25:03.000000000 +0200
++++ tcp_wrappers_7.6-ipv6.4.patched/Makefile 2009-09-11 17:11:48.499403164 +0200
+@@ -677,7 +677,7 @@
+ -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \
+ -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \
+ $(UCHAR) $(TABLES) $(STRINGS) $(TLI) $(EXTRA_CFLAGS) $(DOT) \
+- $(VSYSLOG) $(HOSTNAME) $(IPV6)
++ $(VSYSLOG) $(HOSTNAME) $(IPV6) $(USER_CFLAGS)
+
+ LIB_OBJ= hosts_access.o options.o shell_cmd.o rfc931.o eval.o \
+ hosts_ctl.o refuse.o percent_x.o clean_exit.o $(AUX_OBJ) \
Copied: csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch (from rev 6273, csw/mgar/pkg/tcpwrappers/tags/legacy/sharedlib.patch)
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch (rev 0)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch 2009-09-11 18:45:14 UTC (rev 6276)
@@ -0,0 +1,73 @@
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/Makefile tcp_wrappers_7.6-ipv6.4.patched/Makefile
+--- tcp_wrappers_7.6-ipv6.4.orig/Makefile 2003-04-16 16:25:03.000000000 +0200
++++ tcp_wrappers_7.6-ipv6.4.patched/Makefile 2009-09-11 18:58:37.916723372 +0200
+@@ -197,6 +197,24 @@
+ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
+ EXTRA_CFLAGS=-DUSE_STRERROR all
+
++sunos5-shared:
++ @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS="-lsocket -lnsl" RANLIB=/bin/true \
++ AR=ld ARFLAGS="-G -h libwrap.so.1 -o " \
++ LIB=libwrap.so.1 VSYSLOG= \
++ NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
++ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
++ EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
++
++sunos5-sharedext:
++ @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS="-lsocket -lnsl" RANLIB=/bin/true \
++ AR=ld ARFLAGS="-G -h libwrap.so.1 -o " \
++ LIB=libwrap.so.1 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
++ NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
++ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
++ EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
++
+ # Generic SYSV40
+ esix sysv4:
+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+@@ -481,7 +499,7 @@
+ # If your system has IPv6 and supports getipnode* and inet_pton/inet_ntop
+ # uncomment the following (Solaris 8)
+
+-# IPV6 = -DHAVE_IPV6
++IPV6 = -DHAVE_IPV6
+
+ # If your system does not have getipnodebyname() but uses the obsolete
+ # gethostbyname2() instead, use this (AIX)
+@@ -527,7 +545,7 @@
+ #
+ # The LOG_XXX names below are taken from the /usr/include/syslog.h file.
+
+-FACILITY= LOG_MAIL # LOG_MAIL is what most sendmail daemons use
++FACILITY= LOG_LOCAL1 # LOG_MAIL is what most sendmail daemons use
+
+ # The syslog priority at which successful connections are logged.
+
+@@ -603,7 +621,7 @@
+ # look for access control information. Watch out for the quotes and
+ # backslashes when you make changes.
+
+-TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\" -DHOSTS_ALLOW=\"/etc/hosts.allow\"
++TABLES = -DHOSTS_DENY=\"/etc/opt/csw/hosts.deny\" -DHOSTS_ALLOW=\"/etc/opt/csw/hosts.allow\"
+
+ ####################################################
+ # Optional: dealing with host name/address conflicts
+@@ -725,7 +743,7 @@
+ $(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)
+
+ safe_finger: safe_finger.o $(LIB)
+- $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)
++ $(CC) $(CFLAGS) -o $@ safe_finger.o $(LIBS)
+
+ TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o
+
+diff -Naur tcp_wrappers_7.6-ipv6.4.orig/sharedhack.c tcp_wrappers_7.6-ipv6.4.patched/sharedhack.c
+--- tcp_wrappers_7.6-ipv6.4.orig/sharedhack.c 1970-01-01 01:00:00.000000000 +0100
++++ tcp_wrappers_7.6-ipv6.4.patched/sharedhack.c 2009-09-11 18:58:37.917838872 +0200
+@@ -0,0 +1,5 @@
++/* This must be compiled with Sun CC for the pragma */
++#pragma weak deny_severity
++#pragma weak allow_severity
++int deny_severity=0;
++int allow_severity=0;
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the devel
mailing list