rpms/tcp_wrappers/devel tcp_wrappers-7.6-162412.patch, 1.1, 1.2 tcp_wrappers-7.6-196326.patch, 1.1, 1.2 tcp_wrappers-7.6-220015.patch, 1.4, 1.5 tcp_wrappers-7.6-bug11881.patch, 1.1, 1.2 tcp_wrappers-7.6-bug17795.patch, 1.1, 1.2 tcp_wrappers-7.6-bug17847.patch, 1.1, 1.2 tcp_wrappers-7.6-docu.patch, 1.1, 1.2 tcp_wrappers-7.6-fix_sig-bug141110.patch, 1.1, 1.2 tcp_wrappers-7.6-fixgethostbyname.patch, 1.1, 1.2 tcp_wrappers-7.6-ldflags.patch, 1.1, 1.2 tcp_wrappers-7.6-restore_sigalarm.patch, 1.1, 1.2 tcp_wrappers-7.6-shared.patch, 1.1, 1.2 tcp_wrappers-7.6-sig.patch, 1.1, 1.2 tcp_wrappers-7.6-sigchld.patch, 1.3, 1.4 tcp_wrappers-7.6-siglongjmp.patch, 1.1, 1.2 tcp_wrappers-7.6-strerror.patch, 1.1, 1.2 tcp_wrappers.spec, 1.35, 1.36 tcp_wrappers.ume-ipv6.patch, 1.1, 1.2 tcp_wrappers.usagi-ipv6.patch, 1.1, 1.2 tcp_wrappers_7.6-249430.patch, 1.1, 1.2 tcpw7.2-config.patch, 1.1, 1.2 tcpw7.2-setenv.patch, 1.1, 1.2 tcpw7.6-netgroup.patch, 1.1, 1.2
Jan Šafránek
jsafrane at fedoraproject.org
Fri Aug 29 07:50:13 UTC 2008
Author: jsafrane
Update of /cvs/pkgs/rpms/tcp_wrappers/devel
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv10804
Modified Files:
tcp_wrappers-7.6-162412.patch tcp_wrappers-7.6-196326.patch
tcp_wrappers-7.6-220015.patch tcp_wrappers-7.6-bug11881.patch
tcp_wrappers-7.6-bug17795.patch
tcp_wrappers-7.6-bug17847.patch tcp_wrappers-7.6-docu.patch
tcp_wrappers-7.6-fix_sig-bug141110.patch
tcp_wrappers-7.6-fixgethostbyname.patch
tcp_wrappers-7.6-ldflags.patch
tcp_wrappers-7.6-restore_sigalarm.patch
tcp_wrappers-7.6-shared.patch tcp_wrappers-7.6-sig.patch
tcp_wrappers-7.6-sigchld.patch
tcp_wrappers-7.6-siglongjmp.patch
tcp_wrappers-7.6-strerror.patch tcp_wrappers.spec
tcp_wrappers.ume-ipv6.patch tcp_wrappers.usagi-ipv6.patch
tcp_wrappers_7.6-249430.patch tcpw7.2-config.patch
tcpw7.2-setenv.patch tcpw7.6-netgroup.patch
Log Message:
rediff all patches to get rid of patch fuzz
tcp_wrappers-7.6-162412.patch:
Index: tcp_wrappers-7.6-162412.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-162412.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-162412.patch 24 Jan 2006 14:41:36 -0000 1.1
+++ tcp_wrappers-7.6-162412.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/inetcf.c.162412 2006-01-24 15:33:20.000000000 +0100
-+++ tcp_wrappers_7.6/inetcf.c 2006-01-24 15:35:44.000000000 +0100
-@@ -61,7 +61,7 @@
+diff -up tcp_wrappers_7.6/inetcf.c.patch16 tcp_wrappers_7.6/inetcf.c
+--- tcp_wrappers_7.6/inetcf.c.patch16 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/inetcf.c 2008-08-29 09:45:12.000000000 +0200
+@@ -61,7 +61,7 @@ char *inet_cfg(conf)
char *conf;
{
char buf[BUFSIZ];
tcp_wrappers-7.6-196326.patch:
Index: tcp_wrappers-7.6-196326.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-196326.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-196326.patch 28 Jun 2007 13:40:29 -0000 1.1
+++ tcp_wrappers-7.6-196326.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/hosts_access.c.196326 2007-06-28 13:44:10.000000000 +0200
-+++ tcp_wrappers_7.6/hosts_access.c 2007-06-28 15:33:45.000000000 +0200
-@@ -346,6 +346,9 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch21 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch21 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -346,6 +346,9 @@ char *string;
return (STR_NE(string, unknown));
} else if (tok[(n = strlen(tok)) - 1] == '.') { /* prefix */
return (STRN_EQ(tok, string, n));
tcp_wrappers-7.6-220015.patch:
Index: tcp_wrappers-7.6-220015.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-220015.patch,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -r1.4 -r1.5
--- tcp_wrappers-7.6-220015.patch 28 Jun 2007 13:46:33 -0000 1.4
+++ tcp_wrappers-7.6-220015.patch 29 Aug 2008 07:49:41 -0000 1.5
@@ -1,16 +1,7 @@
---- tcp_wrappers_7.6/tcpd.h.220015 2007-06-28 15:42:49.000000000 +0200
-+++ tcp_wrappers_7.6/tcpd.h 2007-06-28 15:43:59.000000000 +0200
-@@ -167,6 +167,7 @@
-
- /* look up endpoint addresses */
- extern void sock_host __P((struct request_info *));
-+extern void sock_hostnofd __P((struct request_info *));
- /* translate address to hostname */
- extern void sock_hostname __P((struct host_info *));
- /* address to printable address */
---- tcp_wrappers_7.6/hosts_ctl.c.220015 1994-12-28 17:42:28.000000000 +0100
-+++ tcp_wrappers_7.6/hosts_ctl.c 2007-06-28 15:42:49.000000000 +0200
-@@ -29,10 +29,12 @@
+diff -up tcp_wrappers_7.6/hosts_ctl.c.patch17 tcp_wrappers_7.6/hosts_ctl.c
+--- tcp_wrappers_7.6/hosts_ctl.c.patch17 1994-12-28 17:42:28.000000000 +0100
++++ tcp_wrappers_7.6/hosts_ctl.c 2008-08-29 09:45:12.000000000 +0200
+@@ -29,10 +29,12 @@ char *user;
{
struct request_info request;
@@ -29,9 +20,10 @@
+
+ return (hosts_access(&request));
}
---- tcp_wrappers_7.6/socket.c.220015 2007-06-28 15:42:49.000000000 +0200
-+++ tcp_wrappers_7.6/socket.c 2007-06-28 15:42:49.000000000 +0200
-@@ -147,6 +147,51 @@
+diff -up tcp_wrappers_7.6/socket.c.patch17 tcp_wrappers_7.6/socket.c
+--- tcp_wrappers_7.6/socket.c.patch17 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/socket.c 2008-08-29 09:45:12.000000000 +0200
+@@ -147,6 +147,51 @@ struct request_info *request;
#endif
}
@@ -83,3 +75,14 @@
/* sock_hostaddr - map endpoint address to printable form */
void sock_hostaddr(host)
+diff -up tcp_wrappers_7.6/tcpd.h.patch17 tcp_wrappers_7.6/tcpd.h
+--- tcp_wrappers_7.6/tcpd.h.patch17 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/tcpd.h 2008-08-29 09:45:12.000000000 +0200
+@@ -167,6 +167,7 @@ extern char *eval_server __P((struct req
+
+ /* look up endpoint addresses */
+ extern void sock_host __P((struct request_info *));
++extern void sock_hostnofd __P((struct request_info *));
+ /* translate address to hostname */
+ extern void sock_hostname __P((struct host_info *));
+ /* address to printable address */
tcp_wrappers-7.6-bug11881.patch:
Index: tcp_wrappers-7.6-bug11881.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-bug11881.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-bug11881.patch 9 Sep 2004 13:06:25 -0000 1.1
+++ tcp_wrappers-7.6-bug11881.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,21 +1,7 @@
---- tcp_wrappers_7.6/tcpd.c.bug11881 Thu Jul 27 15:39:27 2000
-+++ tcp_wrappers_7.6/tcpd.c Thu Jul 27 15:41:54 2000
-@@ -60,10 +60,10 @@
- */
-
- if (argv[0][0] == '/') {
-- strcpy(path, argv[0]);
-+ strncpy(path, argv[0], sizeof(path));
- argv[0] = strrchr(argv[0], '/') + 1;
- } else {
-- sprintf(path, "%s/%s", REAL_DAEMON_DIR, argv[0]);
-+ snprintf(path, sizeof(path), "%s/%s", REAL_DAEMON_DIR, argv[0]);
- }
-
- /*
---- tcp_wrappers_7.6/eval.c.bug11881 Thu Jul 27 15:39:53 2000
-+++ tcp_wrappers_7.6/eval.c Thu Jul 27 15:40:51 2000
-@@ -111,7 +111,7 @@
+diff -up tcp_wrappers_7.6/eval.c.patch4 tcp_wrappers_7.6/eval.c
+--- tcp_wrappers_7.6/eval.c.patch4 1995-01-30 19:51:46.000000000 +0100
++++ tcp_wrappers_7.6/eval.c 2008-08-29 09:45:12.000000000 +0200
+@@ -111,7 +111,7 @@ struct request_info *request;
return (hostinfo);
#endif
if (STR_NE(eval_user(request), unknown)) {
@@ -24,7 +10,7 @@
return (both);
} else {
return (hostinfo);
-@@ -128,7 +128,7 @@
+@@ -128,7 +128,7 @@ struct request_info *request;
char *daemon = eval_daemon(request);
if (STR_NE(host, unknown)) {
@@ -33,3 +19,19 @@
return (both);
} else {
return (daemon);
+diff -up tcp_wrappers_7.6/tcpd.c.patch4 tcp_wrappers_7.6/tcpd.c
+--- tcp_wrappers_7.6/tcpd.c.patch4 1996-02-11 17:01:33.000000000 +0100
++++ tcp_wrappers_7.6/tcpd.c 2008-08-29 09:45:12.000000000 +0200
+@@ -60,10 +60,10 @@ char **argv;
+ */
+
+ if (argv[0][0] == '/') {
+- strcpy(path, argv[0]);
++ strncpy(path, argv[0], sizeof(path));
+ argv[0] = strrchr(argv[0], '/') + 1;
+ } else {
+- sprintf(path, "%s/%s", REAL_DAEMON_DIR, argv[0]);
++ snprintf(path, sizeof(path), "%s/%s", REAL_DAEMON_DIR, argv[0]);
+ }
+
+ /*
tcp_wrappers-7.6-bug17795.patch:
Index: tcp_wrappers-7.6-bug17795.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-bug17795.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-bug17795.patch 9 Sep 2004 13:06:45 -0000 1.1
+++ tcp_wrappers-7.6-bug17795.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,24 @@
---- tcp_wrappers_7.6/hosts_access.c Wed Feb 12 03:13:23 1997
-+++ tcp_wrappers/hosts_access.c Wed Jul 19 08:37:02 2000
-@@ -240,6 +255,26 @@
+diff -up tcp_wrappers_7.6/hosts_access.5.patch5 tcp_wrappers_7.6/hosts_access.5
+--- tcp_wrappers_7.6/hosts_access.5.patch5 1995-01-30 19:51:47.000000000 +0100
++++ tcp_wrappers_7.6/hosts_access.5 2008-08-29 09:45:12.000000000 +0200
+@@ -89,6 +89,13 @@ An expression of the form `n.n.n.n/m.m.m
+ bitwise AND of the address and the `mask\'. For example, the net/mask
+ pattern `131.155.72.0/255.255.254.0\' matches every address in the
+ range `131.155.72.0\' through `131.155.73.255\'.
++.IP \(bu
++A string that begins with a `/\' character is treated as a file
++name. A host name or address is matched if it matches any host name
++or address pattern listed in the named file. The file format is
++zero or more lines with zero or more host name or address patterns
++separated by whitespace. A file name pattern can be used anywhere
++a host name or address pattern can be used.
+ .SH WILDCARDS
+ The access control language supports explicit wildcards:
+ .IP ALL
+diff -up tcp_wrappers_7.6/hosts_access.c.patch5 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch5 1997-02-12 02:13:23.000000000 +0100
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -240,6 +240,26 @@ struct request_info *request;
}
}
@@ -27,7 +45,7 @@
/* host_match - match host name and/or address against pattern */
static int host_match(tok, host)
-@@ -267,6 +302,8 @@
+@@ -267,6 +287,8 @@ struct host_info *host;
tcpd_warn("netgroup support is disabled"); /* not tcpd_jump() */
return (NO);
#endif
@@ -36,19 +54,3 @@
} else if (STR_EQ(tok, "KNOWN")) { /* check address and name */
char *name = eval_hostname(host);
return (STR_NE(eval_hostaddr(host), unknown) && HOSTNAME_KNOWN(name));
---- tcp_wrappers_7.6/hosts_access.5 Mon Jan 30 20:51:47 1995
-+++ tcp_wrappers.new/hosts_access.5 Wed Sep 20 22:24:29 2000
-@@ -89,6 +89,13 @@
- bitwise AND of the address and the `mask\'. For example, the net/mask
- pattern `131.155.72.0/255.255.254.0\' matches every address in the
- range `131.155.72.0\' through `131.155.73.255\'.
-+.IP \(bu
-+A string that begins with a `/\' character is treated as a file
-+name. A host name or address is matched if it matches any host name
-+or address pattern listed in the named file. The file format is
-+zero or more lines with zero or more host name or address patterns
-+separated by whitespace. A file name pattern can be used anywhere
-+a host name or address pattern can be used.
- .SH WILDCARDS
- The access control language supports explicit wildcards:
- .IP ALL
tcp_wrappers-7.6-bug17847.patch:
Index: tcp_wrappers-7.6-bug17847.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-bug17847.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-bug17847.patch 9 Sep 2004 13:06:45 -0000 1.1
+++ tcp_wrappers-7.6-bug17847.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,7 +1,7 @@
-diff -uNr tcp_wrappers_7.6/hosts_access.5 tcp_wrappers_7.6.new/hosts_access.5
---- tcp_wrappers_7.6/hosts_access.5 Fri Sep 22 21:29:24 2000
-+++ tcp_wrappers_7.6.new/hosts_access.5 Fri Sep 22 21:28:44 2000
-@@ -96,6 +96,10 @@
+diff -up tcp_wrappers_7.6/hosts_access.5.patch6 tcp_wrappers_7.6/hosts_access.5
+--- tcp_wrappers_7.6/hosts_access.5.patch6 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.5 2008-08-29 09:45:12.000000000 +0200
+@@ -96,6 +96,10 @@ or address pattern listed in the named f
zero or more lines with zero or more host name or address patterns
separated by whitespace. A file name pattern can be used anywhere
a host name or address pattern can be used.
@@ -12,10 +12,10 @@
.SH WILDCARDS
The access control language supports explicit wildcards:
.IP ALL
-diff -uNr tcp_wrappers_7.6/hosts_access.c tcp_wrappers_7.6.new/hosts_access.c
---- tcp_wrappers_7.6/hosts_access.c Fri Sep 22 21:29:24 2000
-+++ tcp_wrappers_7.6.new/hosts_access.c Fri Sep 22 21:18:09 2000
-@@ -311,6 +311,11 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch6 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch6 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -311,6 +311,11 @@ char *string;
{
int n;
@@ -27,7 +27,7 @@
if (tok[0] == '.') { /* suffix */
n = strlen(string) - strlen(tok);
return (n > 0 && STR_EQ(tok, string + n));
-@@ -351,3 +356,71 @@
+@@ -351,3 +356,71 @@ char *string;
}
return ((addr & mask) == net);
}
tcp_wrappers-7.6-docu.patch:
Index: tcp_wrappers-7.6-docu.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-docu.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-docu.patch 9 Sep 2004 13:07:31 -0000 1.1
+++ tcp_wrappers-7.6-docu.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/hosts_access.5.docu Tue Jun 11 21:05:44 2002
-+++ tcp_wrappers_7.6/hosts_access.5 Tue Jun 11 21:06:25 2002
-@@ -340,7 +340,7 @@
+diff -up tcp_wrappers_7.6/hosts_access.5.patch8 tcp_wrappers_7.6/hosts_access.5
+--- tcp_wrappers_7.6/hosts_access.5.patch8 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.5 2008-08-29 09:45:12.000000000 +0200
+@@ -333,7 +333,7 @@ in.tftpd: LOCAL, .my.domain
/etc/hosts.deny:
.in +3
.nf
tcp_wrappers-7.6-fix_sig-bug141110.patch:
Index: tcp_wrappers-7.6-fix_sig-bug141110.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-fix_sig-bug141110.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-fix_sig-bug141110.patch 6 May 2005 13:29:14 -0000 1.1
+++ tcp_wrappers-7.6-fix_sig-bug141110.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/hosts_access.c.bug141110 2004-11-29 15:19:09.872243504 +0300
-+++ tcp_wrappers_7.6/hosts_access.c 2004-11-29 19:59:09.282344976 +0300
-@@ -127,7 +127,7 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch15 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch15 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -127,7 +127,7 @@ struct request_info *request;
verdict = setjmp(tcpd_buf);
if (verdict != 0)
return (verdict == AC_PERMIT);
@@ -9,7 +10,7 @@
return (YES);
if (table_match(hosts_deny_table, request) == NO)
return (YES);
-@@ -177,7 +177,7 @@
+@@ -177,7 +177,7 @@ struct request_info *request;
tcpd_warn("cannot open %s: %m", table);
match = ERR;
}
tcp_wrappers-7.6-fixgethostbyname.patch:
Index: tcp_wrappers-7.6-fixgethostbyname.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-fixgethostbyname.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-fixgethostbyname.patch 9 Sep 2004 13:06:45 -0000 1.1
+++ tcp_wrappers-7.6-fixgethostbyname.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/socket.c.fixgethostbyname Fri Mar 21 13:27:25 1997
-+++ tcp_wrappers_7.6/socket.c Mon Feb 5 14:09:40 2001
-@@ -52,7 +52,8 @@
+diff -up tcp_wrappers_7.6/socket.c.patch7 tcp_wrappers_7.6/socket.c
+--- tcp_wrappers_7.6/socket.c.patch7 1997-03-21 19:27:25.000000000 +0100
++++ tcp_wrappers_7.6/socket.c 2008-08-29 09:45:12.000000000 +0200
+@@ -52,7 +52,8 @@ static struct hostent *gethostbyname_dot
char *name;
{
char dot_name[MAXHOSTNAMELEN + 1];
@@ -10,7 +11,7 @@
/*
* Don't append dots to unqualified names. Such names are likely to come
* from local hosts files or from NIS.
-@@ -61,8 +62,12 @@
+@@ -61,8 +62,12 @@ char *name;
if (strchr(name, '.') == 0 || strlen(name) >= MAXHOSTNAMELEN - 1) {
return (gethostbyname(name));
} else {
tcp_wrappers-7.6-ldflags.patch:
Index: tcp_wrappers-7.6-ldflags.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-ldflags.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-ldflags.patch 9 Sep 2004 13:09:42 -0000 1.1
+++ tcp_wrappers-7.6-ldflags.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/Makefile.ldflags 2004-03-05 14:47:36.438315648 +0100
-+++ tcp_wrappers_7.6/Makefile 2004-03-05 14:50:01.438272304 +0100
-@@ -732,26 +732,26 @@
+diff -up tcp_wrappers_7.6/Makefile.patch14 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch14 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -732,26 +732,26 @@ $(SHLIB): $(LIB_OBJ)
ln -s $(SHLIB).$(MAJOR).$(MINOR).$(REL) $(SHLIB)
tcpd: tcpd.o $(LIB)
tcp_wrappers-7.6-restore_sigalarm.patch:
Index: tcp_wrappers-7.6-restore_sigalarm.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-restore_sigalarm.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-restore_sigalarm.patch 16 Apr 2007 10:54:34 -0000 1.1
+++ tcp_wrappers-7.6-restore_sigalarm.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,7 +1,7 @@
-diff -ruN tcp_wrappers_7.6.orig/rfc931.c tcp_wrappers_7.6/rfc931.c
---- tcp_wrappers_7.6.orig/rfc931.c 2004-08-29 18:40:08.000000000 +0200
-+++ tcp_wrappers_7.6/rfc931.c 2004-08-29 18:40:02.000000000 +0200
-@@ -92,6 +92,8 @@
+diff -up tcp_wrappers_7.6/rfc931.c.patch18 tcp_wrappers_7.6/rfc931.c
+--- tcp_wrappers_7.6/rfc931.c.patch18 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/rfc931.c 2008-08-29 09:45:12.000000000 +0200
+@@ -92,6 +92,8 @@ char *dest;
char *cp;
char *result = unknown;
FILE *fp;
@@ -10,7 +10,7 @@
#ifdef INET6
/* address family must be the same */
-@@ -134,7 +136,12 @@
+@@ -134,7 +136,12 @@ char *dest;
*/
if (setjmp(timebuf) == 0) {
@@ -24,7 +24,7 @@
alarm(rfc931_timeout);
/*
-@@ -223,6 +230,10 @@
+@@ -223,6 +230,10 @@ char *dest;
}
alarm(0);
}
tcp_wrappers-7.6-shared.patch:
Index: tcp_wrappers-7.6-shared.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-shared.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-shared.patch 9 Sep 2004 13:07:52 -0000 1.1
+++ tcp_wrappers-7.6-shared.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/Makefile.shared 2003-02-10 20:12:26.000000000 +0100
-+++ tcp_wrappers_7.6/Makefile 2003-02-10 20:14:05.000000000 +0100
-@@ -150,8 +150,8 @@
+diff -up tcp_wrappers_7.6/Makefile.patch11 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch11 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -150,8 +150,8 @@ netbsd:
linux:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
@@ -11,7 +12,7 @@
linux-old:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-@@ -249,7 +249,7 @@
+@@ -249,7 +249,7 @@ tandem:
# Amdahl UTS 2.1.5 (Richard.Richmond at bridge.bst.bls.com)
uts215:
@@ -20,7 +21,7 @@
LIBS="-lsocket" RANLIB=echo \
ARFLAGS=rv AUX_OBJ=setenv.o NETGROUP=-DNO_NETGROUP TLI= all
-@@ -706,8 +706,9 @@
+@@ -706,8 +706,9 @@ KIT = README miscd.c tcpd.c fromhost.c h
scaffold.h tcpdmatch.8 README.NIS
LIB = libwrap.a
@@ -31,7 +32,7 @@
# Invalidate all object files when the compiler options (CFLAGS) have changed.
-@@ -724,6 +725,12 @@
+@@ -724,6 +725,12 @@ $(LIB): $(LIB_OBJ)
$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)
-$(RANLIB) $(LIB)
@@ -44,15 +45,40 @@
tcpd: tcpd.o $(LIB)
$(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS)
-@@ -906,5 +913,6 @@
+@@ -906,5 +913,6 @@ update.o: cflags
update.o: mystdarg.h
update.o: tcpd.h
vfprintf.o: cflags
+weak_symbols.o: tcpd.h
workarounds.o: cflags
workarounds.o: tcpd.h
---- tcp_wrappers_7.6/tcpd.h.shared 2003-02-10 20:12:26.000000000 +0100
-+++ tcp_wrappers_7.6/tcpd.h 2003-02-10 20:12:26.000000000 +0100
+diff -up tcp_wrappers_7.6/scaffold.c.patch11 tcp_wrappers_7.6/scaffold.c
+--- tcp_wrappers_7.6/scaffold.c.patch11 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/scaffold.c 2008-08-29 09:45:12.000000000 +0200
+@@ -237,10 +237,17 @@ struct request_info *request;
+
+ /* ARGSUSED */
+
+-void rfc931(request)
+-struct request_info *request;
++void rfc931(rmt_sin, our_sin, dest)
++#ifndef INET6
++struct sockaddr_in *rmt_sin;
++struct sockaddr_in *our_sin;
++#else
++struct sockaddr *rmt_sin;
++struct sockaddr *our_sin;
++#endif
++char *dest;
+ {
+- strcpy(request->user, unknown);
++ strcpy(dest, unknown);
+ }
+
+ /* check_path - examine accessibility */
+diff -up tcp_wrappers_7.6/tcpd.h.patch11 tcp_wrappers_7.6/tcpd.h
+--- tcp_wrappers_7.6/tcpd.h.patch11 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/tcpd.h 2008-08-29 09:45:12.000000000 +0200
@@ -4,6 +4,25 @@
* Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
*/
@@ -79,7 +105,7 @@
/* Structure to describe one communications endpoint. */
#define STRING_LENGTH 128 /* hosts, users, processes */
-@@ -29,10 +48,10 @@
+@@ -29,10 +48,10 @@ struct request_info {
char pid[10]; /* access via eval_pid(request) */
struct host_info client[1]; /* client endpoint info */
struct host_info server[1]; /* server endpoint info */
@@ -94,7 +120,7 @@
struct netconfig *config; /* netdir handle */
};
-@@ -65,25 +84,34 @@
+@@ -65,25 +84,34 @@ extern char paranoid[];
/* Global functions. */
#if defined(TLI) || defined(PTX) || defined(TLI_SEQUENT)
@@ -139,7 +165,7 @@
extern char *hosts_allow_table; /* for verification mode redirection */
extern char *hosts_deny_table; /* for verification mode redirection */
extern int hosts_access_verbose; /* for verbose matching mode */
-@@ -96,9 +124,14 @@
+@@ -96,9 +124,14 @@ extern int resident; /* > 0 if residen
*/
#ifdef __STDC__
@@ -154,7 +180,7 @@
extern struct request_info *request_init(); /* initialize request */
extern struct request_info *request_set(); /* update request structure */
#endif
-@@ -121,27 +154,31 @@
+@@ -121,27 +154,31 @@ extern struct request_info *request_set(
* host_info structures serve as caches for the lookup results.
*/
@@ -196,7 +222,7 @@
#endif
/*
-@@ -182,7 +219,7 @@
+@@ -182,7 +219,7 @@ extern struct tcpd_context tcpd_context;
* behavior.
*/
@@ -205,7 +231,7 @@
extern int dry_run; /* verification flag */
/* Bug workarounds. */
-@@ -221,3 +258,7 @@
+@@ -221,3 +258,7 @@ extern char *fix_strtok();
#define strtok my_strtok
extern char *my_strtok();
#endif
@@ -213,31 +239,9 @@
+__END_DECLS
+
+#endif /* tcpd.h */
---- tcp_wrappers_7.6/scaffold.c.shared 2003-02-10 20:12:26.000000000 +0100
-+++ tcp_wrappers_7.6/scaffold.c 2003-02-10 20:12:26.000000000 +0100
-@@ -237,10 +237,17 @@
-
- /* ARGSUSED */
-
--void rfc931(request)
--struct request_info *request;
-+void rfc931(rmt_sin, our_sin, dest)
-+#ifndef INET6
-+struct sockaddr_in *rmt_sin;
-+struct sockaddr_in *our_sin;
-+#else
-+struct sockaddr *rmt_sin;
-+struct sockaddr *our_sin;
-+#endif
-+char *dest;
- {
-- strcpy(request->user, unknown);
-+ strcpy(dest, unknown);
- }
-
- /* check_path - examine accessibility */
---- /dev/null 2003-01-30 11:24:37.000000000 +0100
-+++ tcp_wrappers_7.6/weak_symbols.c 2003-02-10 20:12:26.000000000 +0100
+diff -up /dev/null tcp_wrappers_7.6/weak_symbols.c
+--- /dev/null 2008-08-29 10:35:15.589003986 +0200
++++ tcp_wrappers_7.6/weak_symbols.c 2008-08-29 09:45:12.000000000 +0200
@@ -0,0 +1,11 @@
+ /*
+ * @(#) weak_symbols.h 1.5 99/12/29 23:50
tcp_wrappers-7.6-sig.patch:
Index: tcp_wrappers-7.6-sig.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-sig.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-sig.patch 9 Sep 2004 13:07:52 -0000 1.1
+++ tcp_wrappers-7.6-sig.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/hosts_access.c.sig 2003-02-10 16:18:31.000000000 +0100
-+++ tcp_wrappers_7.6/hosts_access.c 2003-02-10 16:50:38.000000000 +0100
-@@ -66,6 +66,7 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch12 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch12 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -66,6 +66,7 @@ static char sep[] = ", \t\r\n";
#define YES 1
#define NO 0
@@ -8,7 +9,7 @@
/*
* These variables are globally visible so that they can be redirected in
-@@ -106,7 +107,6 @@
+@@ -106,7 +107,6 @@ int hosts_access(request)
struct request_info *request;
{
int verdict;
@@ -16,7 +17,7 @@
/*
* If the (daemon, client) pair is matched by an entry in the file
* /etc/hosts.allow, access is granted. Otherwise, if the (daemon,
-@@ -129,9 +129,9 @@
+@@ -129,9 +129,9 @@ struct request_info *request;
return (verdict == AC_PERMIT);
if (table_match(hosts_allow_table, request))
return (YES);
@@ -29,7 +30,7 @@
}
/* table_match - match table entries with (daemon, client) pair */
-@@ -175,6 +175,7 @@
+@@ -175,6 +175,7 @@ struct request_info *request;
(void) fclose(fp);
} else if (errno != ENOENT) {
tcpd_warn("cannot open %s: %m", table);
tcp_wrappers-7.6-sigchld.patch:
Index: tcp_wrappers-7.6-sigchld.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-sigchld.patch,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- tcp_wrappers-7.6-sigchld.patch 28 Jun 2007 13:46:33 -0000 1.3
+++ tcp_wrappers-7.6-sigchld.patch 29 Aug 2008 07:49:41 -0000 1.4
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/shell_cmd.c.sigchld 1994-12-28 17:42:44.000000000 +0100
-+++ tcp_wrappers_7.6/shell_cmd.c 2007-06-28 15:42:17.000000000 +0200
-@@ -20,6 +20,11 @@
+diff -up tcp_wrappers_7.6/shell_cmd.c.patch20 tcp_wrappers_7.6/shell_cmd.c
+--- tcp_wrappers_7.6/shell_cmd.c.patch20 1994-12-28 17:42:44.000000000 +0100
++++ tcp_wrappers_7.6/shell_cmd.c 2008-08-29 09:45:12.000000000 +0200
+@@ -20,6 +20,11 @@ static char sccsid[] = "@(#) shell_cmd.c
#include <stdio.h>
#include <syslog.h>
#include <string.h>
@@ -12,7 +13,7 @@
extern void exit();
-@@ -31,13 +36,42 @@
+@@ -31,13 +36,42 @@ extern void exit();
static void do_child();
@@ -56,7 +57,7 @@
/*
* Most of the work is done within the child process, to minimize the
-@@ -49,12 +83,26 @@
+@@ -49,12 +83,26 @@ char *command;
tcpd_warn("cannot fork: %m");
break;
case 00: /* child */
tcp_wrappers-7.6-siglongjmp.patch:
Index: tcp_wrappers-7.6-siglongjmp.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-siglongjmp.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-siglongjmp.patch 16 Apr 2007 10:54:34 -0000 1.1
+++ tcp_wrappers-7.6-siglongjmp.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,6 @@
-diff -ruNp tcp_wrappers_7.6.orig/rfc931.c tcp_wrappers_7.6/rfc931.c
---- tcp_wrappers_7.6.orig/rfc931.c 2004-08-29 18:42:25.000000000 +0200
-+++ tcp_wrappers_7.6/rfc931.c 2004-08-29 18:41:04.000000000 +0200
+diff -up tcp_wrappers_7.6/rfc931.c.patch19 tcp_wrappers_7.6/rfc931.c
+--- tcp_wrappers_7.6/rfc931.c.patch19 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/rfc931.c 2008-08-29 09:45:12.000000000 +0200
@@ -33,7 +33,7 @@ static char sccsid[] = "@(#) rfc931.c 1.
int rfc931_timeout = RFC931_TIMEOUT;/* Global so it can be changed */
tcp_wrappers-7.6-strerror.patch:
Index: tcp_wrappers-7.6-strerror.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers-7.6-strerror.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers-7.6-strerror.patch 9 Sep 2004 13:07:52 -0000 1.1
+++ tcp_wrappers-7.6-strerror.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp-wrappers-7.6/percent_m.c
-+++ tcp-wrappers-7.6/percent_m.c
-@@ -13,7 +13,7 @@
+diff -up tcp_wrappers_7.6/percent_m.c.patch13 tcp_wrappers_7.6/percent_m.c
+--- tcp_wrappers_7.6/percent_m.c.patch13 1994-12-28 17:42:37.000000000 +0100
++++ tcp_wrappers_7.6/percent_m.c 2008-08-29 09:45:12.000000000 +0200
+@@ -13,7 +13,7 @@ static char sccsid[] = "@(#) percent_m.c
#include <string.h>
extern int errno;
@@ -9,7 +10,7 @@
extern char *sys_errlist[];
extern int sys_nerr;
#endif
-@@ -29,11 +29,15 @@
+@@ -29,11 +29,15 @@ char *ibuf;
while (*bp = *cp)
if (*cp == '%' && cp[1] == 'm') {
Index: tcp_wrappers.spec
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers.spec,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -r1.35 -r1.36
--- tcp_wrappers.spec 20 Feb 2008 05:32:36 -0000 1.35
+++ tcp_wrappers.spec 29 Aug 2008 07:49:41 -0000 1.36
@@ -1,7 +1,7 @@
Summary: A security tool which acts as a wrapper for TCP daemons
Name: tcp_wrappers
Version: 7.6
-Release: 52%{?dist}
+Release: 53%{?dist}
%define LIB_MAJOR 0
%define LIB_MINOR 7
@@ -77,7 +77,7 @@
%patch5 -p1 -b .bug17847
%patch6 -p1 -b .fixgethostbyname
%patch7 -p1 -b .docu
-%patch9 -p0 -b .usagi-ipv6
+%patch9 -p1 -b .usagi-ipv6
%patch10 -p1 -b .ume-ipv6
%patch11 -p1 -b .shared
%patch12 -p1 -b .sig
@@ -148,6 +148,9 @@
%{_mandir}/man3/*
%changelog
+* Fri Aug 29 2008 Jan Safranek <jsafranek at redhat.com> - 7.6-53
+- rediff all patches to get rid of patch fuzz
+
* Wed Feb 20 2008 Fedora Release Engineering <rel-eng at fedoraproject.org> - 7.6-52
- Autorebuild for GCC 4.3
tcp_wrappers.ume-ipv6.patch:
Index: tcp_wrappers.ume-ipv6.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers.ume-ipv6.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers.ume-ipv6.patch 9 Sep 2004 13:07:31 -0000 1.1
+++ tcp_wrappers.ume-ipv6.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,7 +1,7 @@
-diff -uN tcp_wrappers_7.6/hosts_access.c tcp_wrappers_7.6.new/hosts_access.c
---- tcp_wrappers_7.6/hosts_access.c Mon May 20 14:00:56 2002
-+++ tcp_wrappers_7.6.new/hosts_access.c Mon May 20 14:25:05 2002
-@@ -448,6 +448,15 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch10 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch10 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -443,6 +443,15 @@ char *string;
int len, mask_len, i = 0;
char ch;
@@ -17,7 +17,7 @@
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_INET6;
hints.ai_socktype = SOCK_STREAM;
-@@ -457,13 +466,6 @@
+@@ -452,13 +461,6 @@ char *string;
memcpy(&addr, res->ai_addr, sizeof(addr));
freeaddrinfo(res);
@@ -31,10 +31,10 @@
/* match IPv6 address against netnumber/prefixlen */
len = strlen(net_tok);
if (*net_tok != '[' || net_tok[len - 1] != ']')
-diff -uN tcp_wrappers_7.6/socket.c tcp_wrappers_7.6.new/socket.c
---- tcp_wrappers_7.6/socket.c Mon May 20 13:48:35 2002
-+++ tcp_wrappers_7.6.new/socket.c Mon May 20 14:22:27 2002
-@@ -228,7 +228,7 @@
+diff -up tcp_wrappers_7.6/socket.c.patch10 tcp_wrappers_7.6/socket.c
+--- tcp_wrappers_7.6/socket.c.patch10 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/socket.c 2008-08-29 09:45:12.000000000 +0200
+@@ -228,7 +228,7 @@ struct host_info *host;
hints.ai_family = sin->sa_family;
hints.ai_socktype = SOCK_STREAM;
hints.ai_flags = AI_PASSIVE | AI_CANONNAME | AI_NUMERICHOST;
tcp_wrappers.usagi-ipv6.patch:
Index: tcp_wrappers.usagi-ipv6.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers.usagi-ipv6.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers.usagi-ipv6.patch 9 Sep 2004 13:07:03 -0000 1.1
+++ tcp_wrappers.usagi-ipv6.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,107 +1,7 @@
-Index: Makefile
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/Makefile,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- Makefile 2001/03/02 09:26:27 1.1.1.1
-+++ Makefile 2001/03/02 09:30:19 1.2
-@@ -21,7 +21,7 @@
- @echo " dynix epix esix freebsd hpux irix4 irix5 irix6 isc iunix"
- @echo " linux machten mips(untested) ncrsvr4 netbsd next osf power_unix_211"
- @echo " ptx-2.x ptx-generic pyramid sco sco-nis sco-od2 sco-os5 sinix sunos4"
-- @echo " sunos40 sunos5 sysv4 tandem ultrix unicos7 unicos8 unixware1 unixware2"
-+ @echo " sunos40 sunos5 solaris8 sysv4 tandem ultrix unicos7 unicos8 unixware1 unixware2"
- @echo " uts215 uxp"
- @echo
- @echo "If none of these match your environment, edit the system"
-@@ -131,20 +131,33 @@
- NETGROUP=-DNETGROUP TLI= SYSTYPE="-systype bsd43" all
-
- # Freebsd and linux by default have no NIS.
--386bsd netbsd bsdos:
-+386bsd bsdos:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
- LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
- EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
-
- freebsd:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-+ LIBS="-L/usr/local/v6/lib -linet6" \
- LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
-- EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
-+ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DINET6 -Dss_family=__ss_family -Dss_len=__ss_len" \
-+ VSYSLOG= all
-+
-+netbsd:
-+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-+ LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
-+ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DINET6 -Dss_family=__ss_family -Dss_len=__ss_len" VSYSLOG= all
-
- linux:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
- LIBS="-lnsl" RANLIB=ranlib ARFLAGS=rv AUX_OBJ= \
-- NETGROUP="-DNETGROUP" TLI= EXTRA_CFLAGS="$(RPM_OPT_FLAGS) -DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER" all
-+ NETGROUP="-DNETGROUP" TLI= EXTRA_CFLAGS="$(RPM_OPT_FLAGS) -DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER -DINET6=1 -Dss_family=__ss_family -Dss_len=__ss_len" all
-+
-+linux-old:
-+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-+ LIBS="/usr/inet6/lib/libinet6.a -lresolv" \
-+ RANLIB=ranlib ARFLAGS=rv AUX_OBJ=setenv.o NETGROUP= TLI= \
-+ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER -DINET6=1 -Dss_family=sin6_family -Dsockaddr_storage=sockaddr_in6 -I/usr/inet6/include" all
-
- # This is good for many SYSV+BSD hybrids with NIS, probably also for HP-UX 7.x.
- hpux hpux8 hpux9 hpux10:
-@@ -196,6 +209,13 @@
- NETGROUP=-DNETGROUP AUX_OBJ=setenv.o TLI=-DTLI \
- BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" all
-
-+# SunOS 5.8 is another SYSV4 variant, but has IPv6 support
-+solaris8:
-+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-+ LIBS="-lsocket -lnsl" RANLIB=echo ARFLAGS=rv VSYSLOG= \
-+ NETGROUP=-DNETGROUP AUX_OBJ=setenv.o TLI=-DTLI \
-+ EXTRA_CFLAGS="-DINET6 -DNO_CLONE_DEVICE -DINT32_T" all
-+
- # Generic SYSV40
- esix sysv4:
- @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
-@@ -391,7 +411,7 @@
- # the ones provided with this source distribution. The environ.c module
- # implements setenv(), getenv(), and putenv().
-
--AUX_OBJ= setenv.o
-+#AUX_OBJ= setenv.o
- #AUX_OBJ= environ.o
- #AUX_OBJ= environ.o strcasecmp.o
-
-@@ -454,7 +474,7 @@
- # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
- # around this. The workaround does no harm on other Solaris versions.
-
--BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
-+#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
- #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
-
-@@ -472,7 +492,7 @@
- # If your system supports vsyslog(), comment out the following definition.
- # If in doubt leave it in, it won't harm.
-
--VSYSLOG = -Dvsyslog=myvsyslog
-+#VSYSLOG = -Dvsyslog=myvsyslog
-
- # End of the system dependencies.
- #################################
-Index: fix_options.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/fix_options.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- fix_options.c 2001/03/02 09:26:27 1.1.1.1
-+++ fix_options.c 2001/03/02 09:30:19 1.2
-@@ -11,6 +11,9 @@
+diff -up tcp_wrappers_7.6/fix_options.c.patch9 tcp_wrappers_7.6/fix_options.c
+--- tcp_wrappers_7.6/fix_options.c.patch9 1997-04-08 02:29:19.000000000 +0200
++++ tcp_wrappers_7.6/fix_options.c 2008-08-29 09:45:12.000000000 +0200
+@@ -11,6 +11,9 @@ static char sccsid[] = "@(#) fix_options
#include <sys/types.h>
#include <sys/param.h>
@@ -111,7 +11,7 @@
#include <netinet/in.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
-@@ -41,6 +44,22 @@
+@@ -41,6 +44,22 @@ struct request_info *request;
unsigned int opt;
int optlen;
struct in_addr dummy;
@@ -134,15 +34,10 @@
if ((ip = getprotobyname("ip")) != 0)
ipproto = ip->p_proto;
-Index: hosts_access.5
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/hosts_access.5,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- hosts_access.5 2001/03/02 09:26:27 1.1.1.1
-+++ hosts_access.5 2001/03/02 09:30:19 1.2
-@@ -85,10 +85,17 @@
+diff -up tcp_wrappers_7.6/hosts_access.5.patch9 tcp_wrappers_7.6/hosts_access.5
+--- tcp_wrappers_7.6/hosts_access.5.patch9 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.5 2008-08-29 09:45:12.000000000 +0200
+@@ -85,11 +85,18 @@ member of the specified netgroup. Netgro
for daemon process names or for client user names.
.IP \(bu
An expression of the form `n.n.n.n/m.m.m.m\' is interpreted as a
@@ -151,26 +46,21 @@
bitwise AND of the address and the `mask\'. For example, the net/mask
pattern `131.155.72.0/255.255.254.0\' matches every address in the
range `131.155.72.0\' through `131.155.73.255\'.
-+.IP \(bu
+ .IP \(bu
+An expression of the form `[n:n:n:n:n:n:n:n]/m\' is interpreted as a
+`[net]/prefixlen\' pair. An IPv6 host address is matched if
+`prefixlen\' bits of `net\' is equal to the `prefixlen\' bits of the
+address. For example, the [net]/prefixlen pattern
+`[3ffe:505:2:1::]/64\' matches every address in the range
+`3ffe:505:2:1::\' through `3ffe:505:2:1:ffff:ffff:ffff:ffff\'.
- .IP \(bu
++.IP \(bu
A string that begins with a `/\' character is treated as a file
name. A host name or address is matched if it matches any host name
-
-Index: hosts_access.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/hosts_access.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- hosts_access.c 2001/03/02 09:26:27 1.1.1.1
-+++ hosts_access.c 2001/03/02 09:30:19 1.2
-@@ -24,7 +24,13 @@
+ or address pattern listed in the named file. The file format is
+diff -up tcp_wrappers_7.6/hosts_access.c.patch9 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch9 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -24,7 +24,13 @@ static char sccsid[] = "@(#) hosts_acces
/* System libraries. */
#include <sys/types.h>
@@ -184,7 +74,7 @@
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdio.h>
-@@ -33,6 +39,9 @@
+@@ -33,6 +39,9 @@ static char sccsid[] = "@(#) hosts_acces
#include <errno.h>
#include <setjmp.h>
#include <string.h>
@@ -194,7 +84,7 @@
extern char *fgets();
extern int errno;
-@@ -82,6 +91,10 @@
+@@ -82,6 +91,10 @@ static int client_match();
static int host_match();
static int string_match();
static int masked_match();
@@ -205,7 +95,7 @@
/* Size of logical line buffer. */
-@@ -289,6 +302,13 @@
+@@ -311,6 +324,13 @@ char *string;
{
int n;
@@ -219,7 +109,7 @@
#ifndef DISABLE_WILDCARD_MATCHING
if (strchr(tok, '*') || strchr(tok,'?')) { /* contains '*' or '?' */
return (match_pattern_ylo(string,tok));
-@@ -299,20 +319,72 @@
+@@ -326,20 +346,72 @@ char *string;
} else if (tok[(n = strlen(tok)) - 1] == '.') { /* prefix */
return (STRN_EQ(tok, string, n));
} else { /* exact match */
@@ -292,7 +182,7 @@
/*
* Disallow forms other than dotted quad: the treatment that inet_addr()
-@@ -416,11 +423,77 @@
+@@ -351,12 +423,78 @@ char *string;
return (NO);
if ((net = dot_quad_addr(net_tok)) == INADDR_NONE
|| (mask = dot_quad_addr(mask_tok)) == INADDR_NONE) {
@@ -303,7 +193,7 @@
}
return ((addr & mask) == net);
}
-+
+
+#ifdef INET6
+static int masked_match6(net_tok, mask_tok, string)
+char *net_tok;
@@ -367,19 +257,14 @@
+ return YES;
+}
+#endif /* INET6 */
-
++
#ifndef DISABLE_WILDCARD_MATCHING
/* Note: this feature has been adapted in a pretty straightforward way
-
-Index: inetcf.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/inetcf.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- inetcf.c 2001/03/02 09:26:27 1.1.1.1
-+++ inetcf.c 2001/03/02 09:30:19 1.2
-@@ -26,6 +26,9 @@
+ from Tatu Ylonen's last SSH version under free license by
+diff -up tcp_wrappers_7.6/inetcf.c.patch9 tcp_wrappers_7.6/inetcf.c
+--- tcp_wrappers_7.6/inetcf.c.patch9 1997-02-12 02:13:24.000000000 +0100
++++ tcp_wrappers_7.6/inetcf.c 2008-08-29 09:45:12.000000000 +0200
+@@ -26,6 +26,9 @@ extern void exit();
* guesses. Shorter names follow longer ones.
*/
char *inet_files[] = {
@@ -389,15 +274,100 @@
"/private/etc/inetd.conf", /* NEXT */
"/etc/inet/inetd.conf", /* SYSV4 */
"/usr/etc/inetd.conf", /* IRIX?? */
-Index: misc.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/misc.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- misc.c 2001/03/02 09:26:27 1.1.1.1
-+++ misc.c 2001/03/02 09:30:19 1.2
-@@ -58,9 +58,31 @@
+diff -up tcp_wrappers_7.6/Makefile.patch9 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch9 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -21,7 +21,7 @@ what:
+ @echo " dynix epix esix freebsd hpux irix4 irix5 irix6 isc iunix"
+ @echo " linux machten mips(untested) ncrsvr4 netbsd next osf power_unix_211"
+ @echo " ptx-2.x ptx-generic pyramid sco sco-nis sco-od2 sco-os5 sinix sunos4"
+- @echo " sunos40 sunos5 sysv4 tandem ultrix unicos7 unicos8 unixware1 unixware2"
++ @echo " sunos40 sunos5 solaris8 sysv4 tandem ultrix unicos7 unicos8 unixware1 unixware2"
+ @echo " uts215 uxp"
+ @echo
+ @echo "If none of these match your environment, edit the system"
+@@ -131,20 +131,33 @@ epix:
+ NETGROUP=-DNETGROUP TLI= SYSTYPE="-systype bsd43" all
+
+ # Freebsd and linux by default have no NIS.
+-386bsd netbsd bsdos:
++386bsd bsdos:
+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+ LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
+ EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
+
+ freebsd:
+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS="-L/usr/local/v6/lib -linet6" \
+ LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
+- EXTRA_CFLAGS=-DSYS_ERRLIST_DEFINED VSYSLOG= all
++ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DINET6 -Dss_family=__ss_family -Dss_len=__ss_len" \
++ VSYSLOG= all
++
++netbsd:
++ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ= NETGROUP= TLI= \
++ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DINET6 -Dss_family=__ss_family -Dss_len=__ss_len" VSYSLOG= all
+
+ linux:
+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+ LIBS="-lnsl" RANLIB=ranlib ARFLAGS=rv AUX_OBJ= \
+- NETGROUP="-DNETGROUP" TLI= EXTRA_CFLAGS="$(RPM_OPT_FLAGS) -DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER" all
++ NETGROUP="-DNETGROUP" TLI= EXTRA_CFLAGS="$(RPM_OPT_FLAGS) -DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER -DINET6=1 -Dss_family=__ss_family -Dss_len=__ss_len" all
++
++linux-old:
++ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS="/usr/inet6/lib/libinet6.a -lresolv" \
++ RANLIB=ranlib ARFLAGS=rv AUX_OBJ=setenv.o NETGROUP= TLI= \
++ EXTRA_CFLAGS="-DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER -DINET6=1 -Dss_family=sin6_family -Dsockaddr_storage=sockaddr_in6 -I/usr/inet6/include" all
+
+ # This is good for many SYSV+BSD hybrids with NIS, probably also for HP-UX 7.x.
+ hpux hpux8 hpux9 hpux10:
+@@ -196,6 +209,13 @@ sunos5:
+ NETGROUP=-DNETGROUP AUX_OBJ=setenv.o TLI=-DTLI \
+ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" all
+
++# SunOS 5.8 is another SYSV4 variant, but has IPv6 support
++solaris8:
++ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
++ LIBS="-lsocket -lnsl" RANLIB=echo ARFLAGS=rv VSYSLOG= \
++ NETGROUP=-DNETGROUP AUX_OBJ=setenv.o TLI=-DTLI \
++ EXTRA_CFLAGS="-DINET6 -DNO_CLONE_DEVICE -DINT32_T" all
++
+ # Generic SYSV40
+ esix sysv4:
+ @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+@@ -391,7 +411,7 @@ AR = ar
+ # the ones provided with this source distribution. The environ.c module
+ # implements setenv(), getenv(), and putenv().
+
+-AUX_OBJ= setenv.o
++#AUX_OBJ= setenv.o
+ #AUX_OBJ= environ.o
+ #AUX_OBJ= environ.o strcasecmp.o
+
+@@ -454,7 +474,7 @@ AUX_OBJ= setenv.o
+ # host name aliases. Compile with -DSOLARIS_24_GETHOSTBYNAME_BUG to work
+ # around this. The workaround does no harm on other Solaris versions.
+
+-BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
++#BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DLIBC_CALLS_STRTOK
+ #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DINET_ADDR_BUG
+ #BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS -DSOLARIS_24_GETHOSTBYNAME_BUG
+
+@@ -472,7 +492,7 @@ BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS
+ # If your system supports vsyslog(), comment out the following definition.
+ # If in doubt leave it in, it won't harm.
+
+-VSYSLOG = -Dvsyslog=myvsyslog
++#VSYSLOG = -Dvsyslog=myvsyslog
+
+ # End of the system dependencies.
+ #################################
+diff -up tcp_wrappers_7.6/misc.c.patch9 tcp_wrappers_7.6/misc.c
+--- tcp_wrappers_7.6/misc.c.patch9 1996-02-11 17:01:30.000000000 +0100
++++ tcp_wrappers_7.6/misc.c 2008-08-29 09:45:12.000000000 +0200
+@@ -58,9 +58,31 @@ int delimiter;
{
char *cp;
@@ -429,15 +399,10 @@
}
/* dot_quad_addr - convert dotted quad to internal form */
-Index: refuse.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/refuse.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- refuse.c 2001/03/02 09:26:27 1.1.1.1
-+++ refuse.c 2001/03/02 09:30:19 1.2
-@@ -25,7 +25,12 @@
+diff -up tcp_wrappers_7.6/refuse.c.patch9 tcp_wrappers_7.6/refuse.c
+--- tcp_wrappers_7.6/refuse.c.patch9 1994-12-28 17:42:40.000000000 +0100
++++ tcp_wrappers_7.6/refuse.c 2008-08-29 09:45:12.000000000 +0200
+@@ -25,7 +25,12 @@ static char sccsid[] = "@(#) refuse.c 1.
void refuse(request)
struct request_info *request;
{
@@ -450,15 +415,10 @@
clean_exit(request);
/* NOTREACHED */
}
-Index: rfc931.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/rfc931.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- rfc931.c 2001/03/02 09:26:26 1.1.1.1
-+++ rfc931.c 2001/03/02 09:30:19 1.2
-@@ -68,20 +68,50 @@
+diff -up tcp_wrappers_7.6/rfc931.c.patch9 tcp_wrappers_7.6/rfc931.c
+--- tcp_wrappers_7.6/rfc931.c.patch9 1995-01-02 16:11:34.000000000 +0100
++++ tcp_wrappers_7.6/rfc931.c 2008-08-29 09:45:12.000000000 +0200
+@@ -68,20 +68,50 @@ int sig;
/* rfc931 - return remote user name, given socket structures */
void rfc931(rmt_sin, our_sin, dest)
@@ -509,7 +469,7 @@
/*
* Use one unbuffered stdio stream for writing to and for reading from
* the RFC931 etc. server. This is done because of a bug in the SunOS
-@@ -92,7 +122,11 @@
+@@ -92,7 +122,11 @@ char *dest;
* sockets.
*/
@@ -521,7 +481,7 @@
setbuf(fp, (char *) 0);
/*
-@@ -112,6 +146,25 @@
+@@ -112,6 +146,25 @@ char *dest;
* addresses from the query socket.
*/
@@ -547,7 +507,7 @@
our_query_sin = *our_sin;
our_query_sin.sin_port = htons(ANY_PORT);
rmt_query_sin = *rmt_sin;
-@@ -121,6 +174,7 @@
+@@ -121,6 +174,7 @@ char *dest;
sizeof(our_query_sin)) >= 0 &&
connect(fileno(fp), (struct sockaddr *) & rmt_query_sin,
sizeof(rmt_query_sin)) >= 0) {
@@ -555,7 +515,7 @@
/*
* Send query to server. Neglect the risk that a 13-byte
-@@ -129,8 +183,13 @@
+@@ -129,8 +183,13 @@ char *dest;
*/
fprintf(fp, "%u,%u\r\n",
@@ -569,7 +529,7 @@
fflush(fp);
/*
-@@ -144,8 +203,13 @@
+@@ -144,8 +203,13 @@ char *dest;
&& ferror(fp) == 0 && feof(fp) == 0
&& sscanf(buffer, "%u , %u : USERID :%*[^:]:%255s",
&rmt_port, &our_port, user) == 3
@@ -583,15 +543,10 @@
/*
* Strip trailing carriage return. It is part of the
-Index: scaffold.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/scaffold.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- scaffold.c 2001/03/02 09:26:27 1.1.1.1
-+++ scaffold.c 2001/03/02 09:30:19 1.2
-@@ -25,7 +25,9 @@
+diff -up tcp_wrappers_7.6/scaffold.c.patch9 tcp_wrappers_7.6/scaffold.c
+--- tcp_wrappers_7.6/scaffold.c.patch9 1997-03-21 19:27:24.000000000 +0100
++++ tcp_wrappers_7.6/scaffold.c 2008-08-29 09:45:12.000000000 +0200
+@@ -25,7 +25,9 @@ static char sccs_id[] = "@(#) scaffold.c
#define INADDR_NONE (-1) /* XXX should be 0xffffffff */
#endif
@@ -601,7 +556,7 @@
/* Application-specific. */
-@@ -39,6 +41,7 @@
+@@ -39,6 +41,7 @@ int allow_severity = SEVERITY;
int deny_severity = LOG_WARNING;
int rfc931_timeout = RFC931_TIMEOUT;
@@ -609,7 +564,7 @@
/* dup_hostent - create hostent in one memory block */
static struct hostent *dup_hostent(hp)
-@@ -73,9 +76,46 @@
+@@ -73,9 +76,46 @@ struct hostent *hp;
}
return (&hb->host);
}
@@ -656,7 +611,7 @@
struct hostent *find_inet_addr(host)
char *host;
{
-@@ -118,6 +158,7 @@
+@@ -118,6 +158,7 @@ char *host;
}
return (dup_hostent(hp));
}
@@ -664,7 +619,7 @@
/* check_dns - give each address thorough workout, return address count */
-@@ -125,8 +166,13 @@
+@@ -125,8 +166,13 @@ int check_dns(host)
char *host;
{
struct request_info request;
@@ -678,7 +633,7 @@
int count;
char *addr;
-@@ -134,11 +180,18 @@
+@@ -134,11 +180,18 @@ char *host;
return (0);
request_init(&request, RQ_CLIENT_SIN, &sin, 0);
sock_methods(&request);
@@ -697,7 +652,7 @@
/*
* Force host name and address conversions. Use the request structure
-@@ -151,7 +204,11 @@
+@@ -151,7 +204,11 @@ char *host;
tcpd_warn("host address %s->name lookup failed",
eval_hostaddr(request.client));
}
@@ -709,14 +664,9 @@
return (count);
}
-Index: scaffold.h
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/scaffold.h,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- scaffold.h 2001/03/02 09:26:27 1.1.1.1
-+++ scaffold.h 2001/03/02 09:30:19 1.2
+diff -up tcp_wrappers_7.6/scaffold.h.patch9 tcp_wrappers_7.6/scaffold.h
+--- tcp_wrappers_7.6/scaffold.h.patch9 1994-12-31 18:19:20.000000000 +0100
++++ tcp_wrappers_7.6/scaffold.h 2008-08-29 09:45:12.000000000 +0200
@@ -4,6 +4,10 @@
* Author: Wietse Venema, Eindhoven University of Technology, The Netherlands.
*/
@@ -728,15 +678,10 @@
+#endif
extern int check_dns();
extern int check_path();
-Index: socket.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/socket.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- socket.c 2001/03/02 09:26:27 1.1.1.1
-+++ socket.c 2001/03/02 09:30:19 1.2
-@@ -24,13 +24,22 @@
+diff -up tcp_wrappers_7.6/socket.c.patch9 tcp_wrappers_7.6/socket.c
+--- tcp_wrappers_7.6/socket.c.patch9 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/socket.c 2008-08-29 09:45:12.000000000 +0200
+@@ -24,13 +24,22 @@ static char sccsid[] = "@(#) socket.c 1.
#include <sys/types.h>
#include <sys/param.h>
#include <sys/socket.h>
@@ -759,7 +704,7 @@
/* Local stuff. */
-@@ -74,8 +83,13 @@
+@@ -79,8 +88,13 @@ char *name;
void sock_host(request)
struct request_info *request;
{
@@ -773,7 +718,7 @@
int len;
char buf[BUFSIZ];
int fd = request->fd;
-@@ -104,7 +118,11 @@
+@@ -109,7 +123,11 @@ struct request_info *request;
memset(buf, 0 sizeof(buf));
#endif
}
@@ -785,7 +730,7 @@
/*
* Determine the server binding. This is used for client username
-@@ -117,7 +135,11 @@
+@@ -122,7 +140,11 @@ struct request_info *request;
tcpd_warn("getsockname: %m");
return;
}
@@ -797,7 +742,7 @@
}
/* sock_hostaddr - map endpoint address to printable form */
-@@ -125,10 +147,26 @@
+@@ -130,10 +152,26 @@ struct request_info *request;
void sock_hostaddr(host)
struct host_info *host;
{
@@ -824,7 +769,7 @@
}
/* sock_hostname - map endpoint address to host name */
-@@ -136,6 +174,160 @@
+@@ -141,6 +179,160 @@ struct host_info *host;
void sock_hostname(host)
struct host_info *host;
{
@@ -985,7 +930,7 @@
struct sockaddr_in *sin = host->sin;
struct hostent *hp;
int i;
-@@ -215,6 +407,7 @@
+@@ -220,6 +412,7 @@ struct host_info *host;
}
strcpy(host->name, paranoid); /* name is bad, clobber it */
}
@@ -993,7 +938,7 @@
}
/* sock_sink - absorb unreceived IP datagram */
-@@ -223,7 +416,11 @@
+@@ -228,7 +421,11 @@ static void sock_sink(fd)
int fd;
{
char buf[BUFSIZ];
@@ -1005,56 +950,10 @@
int size = sizeof(sin);
/*
-Index: tcpd.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/tcpd.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- tcpd.c 2001/03/02 09:26:27 1.1.1.1
-+++ tcpd.c 2001/03/02 09:30:19 1.2
-@@ -120,7 +120,12 @@
-
- /* Report request and invoke the real daemon program. */
-
-+#ifdef INET6
-+ syslog(allow_severity, "connect from %s (%s)",
-+ eval_client(&request), eval_hostaddr(request.client));
-+#else
- syslog(allow_severity, "connect from %s", eval_client(&request));
-+#endif
- closelog();
- (void) execv(path, argv);
- syslog(LOG_ERR, "error: cannot execute %s: %m", path);
-Index: tcpd.h
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/tcpd.h,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- tcpd.h 2001/03/02 09:26:27 1.1.1.1
-+++ tcpd.h 2001/03/02 09:30:19 1.2
-@@ -11,7 +11,11 @@
- struct host_info {
- char name[STRING_LENGTH]; /* access via eval_hostname(host) */
- char addr[STRING_LENGTH]; /* access via eval_hostaddr(host) */
-+#ifdef INET6
-+ struct sockaddr *sin; /* socket address or 0 */
-+#else
- struct sockaddr_in *sin; /* socket address or 0 */
-+#endif
- struct t_unitdata *unit; /* TLI transport address or 0 */
- struct request_info *request; /* for shared information */
- };
-Index: tcpdchk.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/tcpdchk.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- tcpdchk.c 2001/03/02 09:26:27 1.1.1.1
-+++ tcpdchk.c 2001/03/02 09:30:19 1.2
-@@ -22,6 +22,9 @@
+diff -up tcp_wrappers_7.6/tcpdchk.c.patch9 tcp_wrappers_7.6/tcpdchk.c
+--- tcp_wrappers_7.6/tcpdchk.c.patch9 1997-02-12 02:13:25.000000000 +0100
++++ tcp_wrappers_7.6/tcpdchk.c 2008-08-29 09:45:12.000000000 +0200
+@@ -22,6 +22,9 @@ static char sccsid[] = "@(#) tcpdchk.c 1
#include <sys/types.h>
#include <sys/stat.h>
@@ -1064,7 +963,7 @@
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdio.h>
-@@ -397,6 +400,31 @@
+@@ -397,6 +400,31 @@ char *pat;
}
}
@@ -1096,7 +995,7 @@
/* check_host - criticize host pattern */
static int check_host(pat)
-@@ -423,14 +451,27 @@
+@@ -423,14 +451,27 @@ char *pat;
#endif
#endif
} else if (mask = split_at(pat, '/')) { /* network/netmask */
@@ -1124,15 +1023,41 @@
} else if (NOT_INADDR(pat)) { /* internet name */
if (pat[strlen(pat) - 1] == '.') {
tcpd_warn("%s: domain or host name ends in dot", pat);
-Index: tcpdmatch.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/tcpdmatch.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- tcpdmatch.c 2001/03/02 09:26:27 1.1.1.1
-+++ tcpdmatch.c 2001/03/02 09:30:19 1.2
-@@ -57,7 +57,11 @@
+diff -up tcp_wrappers_7.6/tcpd.c.patch9 tcp_wrappers_7.6/tcpd.c
+--- tcp_wrappers_7.6/tcpd.c.patch9 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/tcpd.c 2008-08-29 09:45:12.000000000 +0200
+@@ -120,7 +120,12 @@ char **argv;
+
+ /* Report request and invoke the real daemon program. */
+
++#ifdef INET6
++ syslog(allow_severity, "connect from %s (%s)",
++ eval_client(&request), eval_hostaddr(request.client));
++#else
+ syslog(allow_severity, "connect from %s", eval_client(&request));
++#endif
+ closelog();
+ (void) execv(path, argv);
+ syslog(LOG_ERR, "error: cannot execute %s: %m", path);
+diff -up tcp_wrappers_7.6/tcpd.h.patch9 tcp_wrappers_7.6/tcpd.h
+--- tcp_wrappers_7.6/tcpd.h.patch9 1996-03-19 16:22:25.000000000 +0100
++++ tcp_wrappers_7.6/tcpd.h 2008-08-29 09:45:12.000000000 +0200
+@@ -11,7 +11,11 @@
+ struct host_info {
+ char name[STRING_LENGTH]; /* access via eval_hostname(host) */
+ char addr[STRING_LENGTH]; /* access via eval_hostaddr(host) */
++#ifdef INET6
++ struct sockaddr *sin; /* socket address or 0 */
++#else
+ struct sockaddr_in *sin; /* socket address or 0 */
++#endif
+ struct t_unitdata *unit; /* TLI transport address or 0 */
+ struct request_info *request; /* for shared information */
+ };
+diff -up tcp_wrappers_7.6/tcpdmatch.c.patch9 tcp_wrappers_7.6/tcpdmatch.c
+--- tcp_wrappers_7.6/tcpdmatch.c.patch9 1996-02-11 17:01:36.000000000 +0100
++++ tcp_wrappers_7.6/tcpdmatch.c 2008-08-29 09:45:12.000000000 +0200
+@@ -57,7 +57,11 @@ int main(argc, argv)
int argc;
char **argv;
{
@@ -1144,7 +1069,7 @@
char *myname = argv[0];
char *client;
char *server;
-@@ -68,8 +72,13 @@
+@@ -68,8 +72,13 @@ char **argv;
int ch;
char *inetcf = 0;
int count;
@@ -1158,7 +1083,7 @@
struct stat st;
/*
-@@ -172,13 +181,20 @@
+@@ -172,13 +181,20 @@ char **argv;
if (NOT_INADDR(server) == 0 || HOSTNAME_KNOWN(server)) {
if ((hp = find_inet_addr(server)) == 0)
exit(1);
@@ -1179,7 +1104,7 @@
/*
* Force evaluation of server host name and address. Host name
-@@ -194,7 +210,11 @@
+@@ -194,7 +210,11 @@ char **argv;
fprintf(stderr, "Please specify an address instead\n");
exit(1);
}
@@ -1191,7 +1116,7 @@
} else {
request_set(&request, RQ_SERVER_NAME, server, 0);
}
-@@ -208,6 +228,18 @@
+@@ -208,6 +228,18 @@ char **argv;
tcpdmatch(&request);
exit(0);
}
@@ -1210,7 +1135,7 @@
/*
* Perhaps they are testing special client hostname patterns that aren't
-@@ -229,6 +261,34 @@
+@@ -229,6 +261,34 @@ char **argv;
*/
if ((hp = find_inet_addr(client)) == 0)
exit(1);
@@ -1245,7 +1170,7 @@
memset((char *) &client_sin, 0, sizeof(client_sin));
client_sin.sin_family = AF_INET;
request_set(&request, RQ_CLIENT_SIN, &client_sin, 0);
-@@ -250,6 +310,7 @@
+@@ -250,6 +310,7 @@ char **argv;
printf("\n");
}
free((char *) hp);
@@ -1253,15 +1178,10 @@
exit(0);
}
-Index: tli.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/tli.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- tli.c 2001/03/02 09:26:27 1.1.1.1
-+++ tli.c 2001/03/02 09:30:19 1.2
-@@ -65,8 +65,13 @@
+diff -up tcp_wrappers_7.6/tli.c.patch9 tcp_wrappers_7.6/tli.c
+--- tcp_wrappers_7.6/tli.c.patch9 1997-03-21 19:27:26.000000000 +0100
++++ tcp_wrappers_7.6/tli.c 2008-08-29 09:45:12.000000000 +0200
+@@ -65,8 +65,13 @@ static void tli_sink();
void tli_host(request)
struct request_info *request;
{
@@ -1275,7 +1195,7 @@
/*
* If we discover that we are using an IP transport, pretend we never
-@@ -76,14 +81,29 @@
+@@ -76,14 +81,29 @@ struct request_info *request;
tli_endpoints(request);
if ((request->config = tli_transport(request->fd)) != 0
@@ -1305,7 +1225,7 @@
}
tli_cleanup(request);
sock_methods(request);
-@@ -187,7 +207,15 @@
+@@ -187,7 +207,15 @@ int fd;
}
while (config = getnetconfig(handlep)) {
if (stat(config->nc_device, &from_config) == 0) {
@@ -1321,15 +1241,10 @@
break;
}
}
-Index: update.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/update.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- update.c 2001/03/02 09:26:27 1.1.1.1
-+++ update.c 2001/03/02 09:30:19 1.2
-@@ -46,10 +46,18 @@
+diff -up tcp_wrappers_7.6/update.c.patch9 tcp_wrappers_7.6/update.c
+--- tcp_wrappers_7.6/update.c.patch9 1994-12-28 17:42:56.000000000 +0100
++++ tcp_wrappers_7.6/update.c 2008-08-29 09:45:12.000000000 +0200
+@@ -46,10 +46,18 @@ va_list ap;
request->fd = va_arg(ap, int);
continue;
case RQ_CLIENT_SIN:
@@ -1348,15 +1263,10 @@
continue;
/*
-Index: workarounds.c
-===================================================================
-RCS file: /cvsroot/usagi/usagi/src/tcp_wrappers/workarounds.c,v
-retrieving revision 1.1.1.1
-retrieving revision 1.2
-diff -u -r1.1.1.1 -r1.2
---- workarounds.c 2001/03/02 09:26:27 1.1.1.1
-+++ workarounds.c 2001/03/02 09:30:19 1.2
-@@ -166,11 +166,22 @@
+diff -up tcp_wrappers_7.6/workarounds.c.patch9 tcp_wrappers_7.6/workarounds.c
+--- tcp_wrappers_7.6/workarounds.c.patch9 1996-03-19 16:22:26.000000000 +0100
++++ tcp_wrappers_7.6/workarounds.c 2008-08-29 09:45:12.000000000 +0200
+@@ -166,11 +166,22 @@ struct sockaddr *sa;
int *len;
{
int ret;
tcp_wrappers_7.6-249430.patch:
Index: tcp_wrappers_7.6-249430.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcp_wrappers_7.6-249430.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcp_wrappers_7.6-249430.patch 25 Jul 2007 13:30:29 -0000 1.1
+++ tcp_wrappers_7.6-249430.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/hosts_access.c.249430 2007-07-25 15:20:51.000000000 +0200
-+++ tcp_wrappers_7.6/hosts_access.c 2007-07-25 15:22:05.000000000 +0200
-@@ -426,7 +426,9 @@
+diff -up tcp_wrappers_7.6/hosts_access.c.patch22 tcp_wrappers_7.6/hosts_access.c
+--- tcp_wrappers_7.6/hosts_access.c.patch22 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/hosts_access.c 2008-08-29 09:45:12.000000000 +0200
+@@ -426,7 +426,9 @@ char *string;
if ((addr = dot_quad_addr(string)) == INADDR_NONE)
return (NO);
if ((net = dot_quad_addr(net_tok)) == INADDR_NONE
tcpw7.2-config.patch:
Index: tcpw7.2-config.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcpw7.2-config.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcpw7.2-config.patch 9 Sep 2004 13:06:25 -0000 1.1
+++ tcpw7.2-config.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.4/Makefile.orig Mon Mar 25 13:22:25 1996
-+++ tcp_wrappers_7.4/Makefile Fri Aug 9 17:31:01 1996
-@@ -43,7 +43,7 @@
+diff -up tcp_wrappers_7.6/Makefile.patch1 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch1 1997-03-21 19:27:21.000000000 +0100
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -44,7 +44,7 @@ what:
#REAL_DAEMON_DIR=/usr/etc
#
# SysV.4 Solaris 2.x OSF AIX
@@ -9,7 +10,7 @@
#
# BSD 4.4
#REAL_DAEMON_DIR=/usr/libexec
-@@ -143,7 +143,7 @@
+@@ -144,7 +144,7 @@ freebsd:
linux:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
LIBS= RANLIB=ranlib ARFLAGS=rv AUX_OBJ=setenv.o \
@@ -17,8 +18,8 @@
+ NETGROUP= TLI= EXTRA_CFLAGS="$(RPM_OPT_FLAGS) -DSYS_ERRLIST_DEFINED -DBROKEN_SO_LINGER" all
# This is good for many SYSV+BSD hybrids with NIS, probably also for HP-UX 7.x.
- hpux hpux8 hpux9:
-@@ -461,7 +461,7 @@
+ hpux hpux8 hpux9 hpux10:
+@@ -491,7 +491,7 @@ VSYSLOG = -Dvsyslog=myvsyslog
# Uncomment the next definition to turn on the language extensions
# (examples: allow, deny, banners, twist and spawn).
#
@@ -27,7 +28,7 @@
################################################################
# Optional: Changing the default disposition of logfile records
-@@ -484,7 +484,8 @@
+@@ -514,7 +514,8 @@ VSYSLOG = -Dvsyslog=myvsyslog
#
# The LOG_XXX names below are taken from the /usr/include/syslog.h file.
@@ -37,16 +38,16 @@
# The syslog priority at which successful connections are logged.
-@@ -500,7 +501,7 @@
- # off by default because it causes problems on sites that don't use DNS
- # and with Solaris < 2.4.
+@@ -531,7 +532,7 @@ SEVERITY= LOG_INFO # LOG_INFO is normall
+ # and with Solaris < 2.4. APPEND_DOT will not work with hostnames taken
+ # from /etc/hosts or from NIS maps. It does work with DNS through NIS.
#
-# DOT= -DAPPEND_DOT
+DOT= -DAPPEND_DOT
##################################################
# Optional: Always attempt remote username lookups
-@@ -520,7 +521,7 @@
+@@ -551,7 +552,7 @@ SEVERITY= LOG_INFO # LOG_INFO is normall
# still do selective username lookups as documented in the hosts_access.5
# and hosts_options.5 manual pages (`nroff -man' format).
#
@@ -55,7 +56,7 @@
#
# The default username lookup timeout is 10 seconds. This may not be long
# enough for slow hosts or networks, but is enough to irritate PC users.
-@@ -579,7 +580,7 @@
+@@ -610,7 +611,7 @@ TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\
# Paranoid mode implies hostname lookup. In order to disable hostname
# lookups altogether, see the next section.
@@ -64,7 +65,7 @@
########################################
# Optional: turning off hostname lookups
-@@ -592,7 +593,7 @@
+@@ -623,7 +624,7 @@ PARANOID= -DPARANOID
# In order to perform selective hostname lookups, disable paranoid
# mode (see previous section) and comment out the following definition.
@@ -73,16 +74,16 @@
#############################################
# Optional: Turning on host ADDRESS checking
-@@ -617,7 +618,7 @@
- #
- # Uncomment the following macro definition if your getsockopt() is OK.
+@@ -649,7 +650,7 @@ HOSTNAME= -DALWAYS_HOSTNAME
+ # source-routed traffic in the kernel. Examples: 4.4BSD derivatives,
+ # Solaris 2.x, and Linux. See your system documentation for details.
#
-# KILL_OPT= -DKILL_IP_OPTIONS
+KILL_OPT= -DKILL_IP_OPTIONS
## End configuration options
############################
-@@ -627,7 +628,7 @@
+@@ -659,7 +660,7 @@ HOSTNAME= -DALWAYS_HOSTNAME
SHELL = /bin/sh
.c.o:; $(CC) $(CFLAGS) -c $*.c
tcpw7.2-setenv.patch:
Index: tcpw7.2-setenv.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcpw7.2-setenv.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcpw7.2-setenv.patch 9 Sep 2004 13:06:25 -0000 1.1
+++ tcpw7.2-setenv.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/Makefile.old Thu Jun 25 22:54:24 1998
-+++ tcp_wrappers_7.6/Makefile Thu Jun 25 22:54:50 1998
-@@ -143,7 +143,7 @@
+diff -up tcp_wrappers_7.6/Makefile.patch2 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch2 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -143,7 +143,7 @@ freebsd:
linux:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
tcpw7.6-netgroup.patch:
Index: tcpw7.6-netgroup.patch
===================================================================
RCS file: /cvs/pkgs/rpms/tcp_wrappers/devel/tcpw7.6-netgroup.patch,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -r1.1 -r1.2
--- tcpw7.6-netgroup.patch 9 Sep 2004 13:06:25 -0000 1.1
+++ tcpw7.6-netgroup.patch 29 Aug 2008 07:49:41 -0000 1.2
@@ -1,6 +1,7 @@
---- tcp_wrappers_7.6/Makefile.netgroup Mon Aug 23 17:24:17 1999
-+++ tcp_wrappers_7.6/Makefile Mon Aug 23 17:25:22 1999
-@@ -143,8 +143,8 @@
+diff -up tcp_wrappers_7.6/Makefile.patch3 tcp_wrappers_7.6/Makefile
+--- tcp_wrappers_7.6/Makefile.patch3 2008-08-29 09:45:12.000000000 +0200
++++ tcp_wrappers_7.6/Makefile 2008-08-29 09:45:12.000000000 +0200
+@@ -143,8 +143,8 @@ freebsd:
linux:
@make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
More information about the fedora-extras-commits
mailing list