commit tcpd for openSUSE:Factory
Hello community, here is the log from the commit of package tcpd for openSUSE:Factory checked in at 2012-04-23 16:13:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/tcpd (Old) and /work/SRC/openSUSE:Factory/.tcpd.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "tcpd", Maintainer is "JJZhang@suse.com" Changes: -------- --- /work/SRC/openSUSE:Factory/tcpd/tcpd.changes 2011-10-07 00:53:53.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.tcpd.new/tcpd.changes 2012-04-23 16:13:54.000000000 +0200 @@ -1,0 +2,6 @@ +Sun Apr 22 01:18:07 UTC 2012 - crrodriguez@opensuse.org + +- Refresh all patches +- Also, pass getconf LFS_CFLAGS into CFLAGS + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ tcpd.spec ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,7 +1,7 @@ # # spec file for package tcpd # -# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany. +# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -15,24 +15,21 @@ # Please submit bugfixes or comments via http://bugs.opensuse.org/ # -# norootforbuild - Name: tcpd Url: ftp://ftp.porcupine.org/pub/security/index.html -License: BSD-3-Clause -Group: Productivity/Networking/System Provides: nkitb:/usr/sbin/tcpd BuildRequires: linux-kernel-headers -AutoReqProv: on # bug437293 %ifarch ppc64 Obsoletes: tcpd-64bit %endif # Version: 7.6 -Release: 859 +Release: 0 Summary: A security wrapper for TCP daemons +License: BSD-3-Clause +Group: Productivity/Networking/System Source: tcp_wrappers_%{version}.tar.bz2 Source2: baselibs.conf Patch0: tcp_wrappers_%{version}.diff @@ -78,7 +75,6 @@ Wietse Venema <wietse@wzv.win.tue.nl> %package devel -License: BSD-3-Clause Summary: Include Files and Libraries for the TCP wrapper library Group: Productivity/Networking/System Requires: %{name} = %{version} ++++++ tcp_wrappers_7.6-builtin.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- scaffold.c +--- scaffold.c.orig +++ scaffold.c -@@ -20,6 +20,8 @@ +@@ -20,6 +20,8 @@ static char sccs_id[] = "@(#) scaffold.c #include <syslog.h> #include <setjmp.h> #include <string.h> @@ -9,7 +9,7 @@ #if defined(INET6) && !defined(USE_GETIPNODEBY) #include <resolv.h> #endif -@@ -28,7 +30,6 @@ +@@ -28,7 +30,6 @@ static char sccs_id[] = "@(#) scaffold.c #define INADDR_NONE (-1) /* XXX should be 0xffffffff */ #endif ++++++ tcp_wrappers_7.6-fedora-bug11881.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- eval.c +--- eval.c.orig +++ eval.c -@@ -111,7 +111,7 @@ +@@ -111,7 +111,7 @@ struct request_info *request; return (hostinfo); #endif if (STR_NE(eval_user(request), unknown)) { @@ -9,7 +9,7 @@ return (both); } else { return (hostinfo); -@@ -128,7 +128,7 @@ +@@ -128,7 +128,7 @@ struct request_info *request; char *daemon = eval_daemon(request); if (STR_NE(host, unknown)) { @@ -18,9 +18,9 @@ return (both); } else { return (daemon); ---- tcpd.c +--- tcpd.c.orig +++ tcpd.c -@@ -61,10 +61,10 @@ +@@ -61,10 +61,10 @@ char **argv; */ if (argv[0][0] == '/') { ++++++ tcp_wrappers_7.6-fedora-bug141110.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -146,7 +146,7 @@ +@@ -146,7 +146,7 @@ struct request_info *request; verdict = setjmp(tcpd_buf); if (verdict != 0) return (verdict == AC_PERMIT); @@ -9,7 +9,7 @@ return (YES); if (table_match(hosts_deny_table, request)) return (NO); -@@ -195,7 +195,7 @@ +@@ -195,7 +195,7 @@ struct request_info *request; } else if (errno != ENOENT) { tcpd_warn("cannot open %s: %m", table); } ++++++ tcp_wrappers_7.6-fedora-bug17795.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.5 +--- hosts_access.5.orig +++ hosts_access.5 -@@ -90,6 +90,13 @@ +@@ -90,6 +90,13 @@ bitwise AND of the address and the `mask pattern `131.155.72.0/255.255.254.0\' matches every address in the range `131.155.72.0\' through `131.155.73.255\'. .IP \(bu @@ -14,9 +14,9 @@ An expression of the form `[n:n:n:n:n:n:n:n]/m\' is interpreted as a `[net]/prefixlen\' pair. A IPv6 host address is matched if `prefixlen\' bits of `net\' is equal to the `prefixlen\' bits of the ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -273,6 +273,26 @@ +@@ -273,6 +273,26 @@ struct request_info *request; } } @@ -43,7 +43,7 @@ /* host_match - match host name and/or address against pattern */ static int host_match(tok, host) -@@ -300,6 +320,8 @@ +@@ -300,6 +320,8 @@ struct host_info *host; tcpd_warn("netgroup support is disabled"); /* not tcpd_jump() */ return (NO); #endif ++++++ tcp_wrappers_7.6-fedora-bug17847.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.5 +--- hosts_access.5.orig +++ hosts_access.5 -@@ -103,6 +103,10 @@ +@@ -103,6 +103,10 @@ An expression of the form `[n:n:n:n:n:n: address. For example, the [net]/prefixlen pattern `[3ffe:505:2:1::]/64\' matches every address in the range `3ffe:505:2:1::\' through `3ffe:505:2:1:ffff:ffff:ffff:ffff\'. @@ -11,9 +11,9 @@ .SH WILDCARDS The access control language supports explicit wildcards: .IP ALL ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -346,6 +346,12 @@ +@@ -346,6 +346,12 @@ char *string; { int n; @@ -26,7 +26,7 @@ if (tok[0] == '.') { /* suffix */ n = strlen(string) - strlen(tok); return (n > 0 && STR_EQ(tok, string + n)); -@@ -454,3 +460,71 @@ +@@ -454,3 +460,71 @@ char *string; } #endif } ++++++ tcp_wrappers_7.6-fedora-bug220015.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_ctl.c +--- hosts_ctl.c.orig +++ hosts_ctl.c -@@ -29,10 +29,12 @@ +@@ -29,10 +29,12 @@ char *user; { struct request_info request; @@ -19,9 +19,9 @@ + + return (hosts_access(&request)); } ---- socket.c +--- socket.c.orig +++ socket.c -@@ -140,6 +140,53 @@ +@@ -140,6 +140,53 @@ struct request_info *request; #endif } @@ -75,9 +75,9 @@ /* sock_hostaddr - map endpoint address to printable form */ void sock_hostaddr(host) ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h -@@ -174,10 +174,12 @@ +@@ -174,10 +174,12 @@ extern char *eval_server(); /* whatever #ifdef __STDC__ extern void sock_host(struct request_info *); ++++++ tcp_wrappers_7.6-fedora-docu.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.5 +--- hosts_access.5.orig +++ hosts_access.5 -@@ -329,7 +329,7 @@ +@@ -329,7 +329,7 @@ in.tftpd: LOCAL, .my.domain /etc/hosts.deny: .in +3 .nf ++++++ tcp_wrappers_7.6-fedora-fixgethostbyname.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- socket.c +--- socket.c.orig +++ socket.c -@@ -54,6 +54,7 @@ +@@ -54,6 +54,7 @@ static struct hostent *gethostbyname_dot char *name; { char dot_name[MAXHOSTNAMELEN + 1]; @@ -8,7 +8,7 @@ /* * Don't append dots to unqualified names. Such names are likely to come -@@ -63,8 +64,12 @@ +@@ -63,8 +64,12 @@ char *name; if (strchr(name, '.') == 0 || strlen(name) >= MAXHOSTNAMELEN - 1) { return (gethostbyname(name)); } else { ++++++ tcp_wrappers_7.6-fedora-sig.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -63,6 +63,7 @@ +@@ -63,6 +63,7 @@ static char sep[] = ", \t\r\n"; #define YES 1 #define NO 0 @@ -8,7 +8,7 @@ /* * These variables are globally visible so that they can be redirected in -@@ -125,7 +126,6 @@ +@@ -125,7 +126,6 @@ int hosts_access(request) struct request_info *request; { int verdict; @@ -16,7 +16,7 @@ /* * If the (daemon, client) pair is matched by an entry in the file * /etc/hosts.allow, access is granted. Otherwise, if the (daemon, -@@ -148,9 +148,9 @@ +@@ -148,9 +148,9 @@ struct request_info *request; return (verdict == AC_PERMIT); if (table_match(hosts_allow_table, request) == YES) return (YES); @@ -29,7 +29,7 @@ } /* table_match - match table entries with (daemon, client) pair */ -@@ -194,6 +194,7 @@ +@@ -194,6 +194,7 @@ struct request_info *request; (void) fclose(fp); } else if (errno != ENOENT) { tcpd_warn("cannot open %s: %m", table); ++++++ tcp_wrappers_7.6-fedora-sigalarm.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- rfc931.c +--- rfc931.c.orig +++ rfc931.c -@@ -92,6 +92,8 @@ +@@ -92,6 +92,8 @@ char *dest; char *cp; char *result = unknown; FILE *fp; @@ -9,7 +9,7 @@ #ifdef INET6 /* address family must be the same */ -@@ -134,7 +136,12 @@ +@@ -134,7 +136,12 @@ char *dest; */ if (sigsetjmp(timebuf, 1) == 0) { @@ -23,7 +23,7 @@ alarm(rfc931_timeout); /* -@@ -223,6 +230,10 @@ +@@ -223,6 +230,10 @@ char *dest; } alarm(0); } ++++++ tcp_wrappers_7.6-fedora-sigchld.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- shell_cmd.c +--- shell_cmd.c.orig +++ shell_cmd.c -@@ -24,6 +24,11 @@ +@@ -24,6 +24,11 @@ static char sccsid[] = "@(#) shell_cmd.c #include <unistd.h> #include <syslog.h> #include <string.h> @@ -12,7 +12,7 @@ extern void exit(); -@@ -35,13 +40,42 @@ +@@ -35,13 +40,42 @@ extern void exit(); static void do_child(); @@ -56,7 +56,7 @@ /* * Most of the work is done within the child process, to minimize the -@@ -53,12 +87,26 @@ +@@ -53,12 +87,26 @@ char *command; tcpd_warn("cannot fork: %m"); break; case 00: /* child */ ++++++ tcp_wrappers_7.6-fedora-sigjmp.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- rfc931.c +--- rfc931.c.orig +++ rfc931.c -@@ -33,7 +33,7 @@ +@@ -33,7 +33,7 @@ static char sccsid[] = "@(#) rfc931.c 1. int rfc931_timeout = RFC931_TIMEOUT;/* Global so it can be changed */ @@ -9,7 +9,7 @@ /* fsocket - open stdio stream on top of socket */ -@@ -62,7 +62,7 @@ +@@ -62,7 +62,7 @@ int protocol; static void timeout(sig) int sig; { @@ -18,7 +18,7 @@ } /* rfc931 - return remote user name, given socket structures */ -@@ -133,7 +133,7 @@ +@@ -133,7 +133,7 @@ char *dest; * Set up a timer so we won't get stuck while waiting for the server. */ ++++++ tcp_wrappers_7.6-fedora-strerror.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- percent_m.c +--- percent_m.c.orig +++ percent_m.c -@@ -13,7 +13,7 @@ +@@ -13,7 +13,7 @@ static char sccsid[] = "@(#) percent_m.c #include <string.h> extern int errno; @@ -9,7 +9,7 @@ extern char *sys_errlist[]; extern int sys_nerr; #endif -@@ -29,11 +29,15 @@ +@@ -29,11 +29,15 @@ char *ibuf; while (*bp = *cp) if (*cp == '%' && cp[1] == 'm') { ++++++ tcp_wrappers_7.6-fix_options-fix.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- fix_options.c +--- fix_options.c.orig +++ fix_options.c -@@ -53,7 +53,7 @@ +@@ -53,7 +53,7 @@ struct request_info *request; * XXX IPv6 support? */ sslen = sizeof(ss); ++++++ tcp_wrappers_7.6-host_name_mapping-fix.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- socket.c +--- socket.c.orig +++ socket.c -@@ -270,7 +270,6 @@ +@@ -270,7 +270,6 @@ sock_hostname(struct host_info *host) res = res->ai_next; } @@ -8,7 +8,7 @@ if (res == NULL) { -@@ -279,6 +278,7 @@ +@@ -279,6 +278,7 @@ sock_hostname(struct host_info *host) host->name, inet_ntop2 (sin6->sin6_family, &sin6->sin6_addr)); strncpy(host->name, paranoid, sizeof(host->name)); @@ -16,7 +16,7 @@ return; } -@@ -289,7 +289,7 @@ +@@ -289,7 +289,7 @@ sock_hostname(struct host_info *host) host->name, res->ai_canonname, inet_ntop2 (sin6->sin6_family, &sin6->sin6_addr)); } ++++++ tcp_wrappers_7.6-hosts_ctl.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h -@@ -128,6 +128,7 @@ +@@ -128,6 +128,7 @@ extern int resident; /* > 0 if residen #ifdef __STDC__ extern struct request_info *request_init(struct request_info *,...); extern struct request_info *request_set(struct request_info *,...); ++++++ tcp_wrappers_7.6-implicit-decl.patch ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,7 +1,5 @@ -Index: rfc931.c -=================================================================== ---- rfc931.c.orig 2009-10-30 20:14:38.000000000 +0100 -+++ rfc931.c 2009-10-30 20:17:34.000000000 +0100 +--- rfc931.c.orig ++++ rfc931.c @@ -23,7 +23,7 @@ static char sccsid[] = "@(#) rfc931.c 1. #include <setjmp.h> #include <signal.h> @@ -11,10 +9,8 @@ /* Local stuff. */ #include "tcpd.h" -Index: safe_finger.c -=================================================================== ---- safe_finger.c.orig 2009-10-30 20:14:36.000000000 +0100 -+++ safe_finger.c 2009-10-30 20:32:39.000000000 +0100 +--- safe_finger.c.orig ++++ safe_finger.c @@ -19,13 +19,16 @@ static char sccsid[] = "@(#) safe_finger #endif @@ -33,10 +29,8 @@ extern void exit(); -Index: tcpdchk.c -=================================================================== ---- tcpdchk.c.orig 2009-10-30 20:14:36.000000000 +0100 -+++ tcpdchk.c 2009-10-30 20:28:19.000000000 +0100 +--- tcpdchk.c.orig ++++ tcpdchk.c @@ -20,6 +20,7 @@ static char sccsid[] = "@(#) tcpdchk.c 1 /* System libraries. */ @@ -53,10 +47,8 @@ extern int errno; extern void exit(); -Index: tcpdmatch.c -=================================================================== ---- tcpdmatch.c.orig 2009-10-30 20:14:36.000000000 +0100 -+++ tcpdmatch.c 2009-10-30 20:29:17.000000000 +0100 +--- tcpdmatch.c.orig ++++ tcpdmatch.c @@ -19,6 +19,7 @@ static char sccsid[] = "@(#) tcpdmatch.c /* System libraries. */ ++++++ tcp_wrappers_7.6-ipv6-1.6.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -16,9 +16,9 @@ ;; If your libc doesn't have sockaddr_storage, try target `linux-old'. ================================================================================ ---- fix_options.c +--- fix_options.c.orig +++ fix_options.c -@@ -11,6 +11,9 @@ +@@ -11,6 +11,9 @@ static char sccsid[] = "@(#) fix_options #include <sys/types.h> #include <sys/param.h> @@ -28,7 +28,7 @@ #include <netinet/in.h> #include <netinet/in_systm.h> #include <netinet/ip.h> -@@ -41,6 +44,22 @@ +@@ -41,6 +44,22 @@ struct request_info *request; unsigned int opt; int optlen; struct in_addr dummy; @@ -51,9 +51,9 @@ if ((ip = getprotobyname("ip")) != 0) ipproto = ip->p_proto; ---- hosts_access.5 +--- hosts_access.5.orig +++ hosts_access.5 -@@ -85,10 +85,17 @@ +@@ -85,10 +85,17 @@ member of the specified netgroup. Netgro for daemon process names or for client user names. .IP \(bu An expression of the form `n.n.n.n/m.m.m.m\' is interpreted as a @@ -72,9 +72,9 @@ .SH WILDCARDS The access control language supports explicit wildcards: .IP ALL ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -25,6 +25,9 @@ +@@ -25,6 +25,9 @@ static char sccsid[] = "@(#) hosts_acces #include <sys/types.h> #include <sys/param.h> @@ -84,7 +84,7 @@ #include <netinet/in.h> #include <arpa/inet.h> #include <stdio.h> -@@ -83,6 +86,10 @@ +@@ -83,6 +86,10 @@ static int client_match(); static int host_match(); static int string_match(); static int masked_match(); @@ -95,7 +95,7 @@ /* Size of logical line buffer. */ -@@ -317,6 +324,13 @@ +@@ -317,6 +324,13 @@ char *string; { int n; @@ -109,7 +109,7 @@ if (tok[0] == '.') { /* suffix */ n = strlen(string) - strlen(tok); return (n > 0 && STR_EQ(tok, string + n)); -@@ -327,20 +341,55 @@ +@@ -327,20 +341,55 @@ char *string; } else if (tok[(n = strlen(tok)) - 1] == '.') { /* prefix */ return (STRN_EQ(tok, string, n)); } else { /* exact match */ @@ -165,7 +165,7 @@ /* * Disallow forms other than dotted quad: the treatment that inet_addr() -@@ -352,8 +401,61 @@ +@@ -352,8 +401,61 @@ char *string; return (NO); if ((net = dot_quad_addr(net_tok)) == INADDR_NONE || (mask = dot_quad_addr(mask_tok)) == INADDR_NONE) { @@ -227,9 +227,9 @@ + return YES; +} +#endif /* INET6 */ ---- inetcf.c +--- inetcf.c.orig +++ inetcf.c -@@ -26,6 +26,9 @@ +@@ -26,6 +26,9 @@ extern void exit(); * guesses. Shorter names follow longer ones. */ char *inet_files[] = { @@ -239,9 +239,9 @@ "/private/etc/inetd.conf", /* NEXT */ "/etc/inet/inetd.conf", /* SYSV4 */ "/usr/etc/inetd.conf", /* IRIX?? */ ---- misc.c +--- misc.c.orig +++ misc.c -@@ -58,9 +58,31 @@ +@@ -58,9 +58,31 @@ int delimiter; { char *cp; @@ -273,9 +273,9 @@ } /* dot_quad_addr - convert dotted quad to internal form */ ---- refuse.c +--- refuse.c.orig +++ refuse.c -@@ -25,7 +25,12 @@ +@@ -25,7 +25,12 @@ static char sccsid[] = "@(#) refuse.c 1. void refuse(request) struct request_info *request; { @@ -288,9 +288,9 @@ clean_exit(request); /* NOTREACHED */ } ---- rfc931.c +--- rfc931.c.orig +++ rfc931.c -@@ -68,20 +68,50 @@ +@@ -68,20 +68,50 @@ int sig; /* rfc931 - return remote user name, given socket structures */ void rfc931(rmt_sin, our_sin, dest) @@ -341,7 +341,7 @@ /* * Use one unbuffered stdio stream for writing to and for reading from * the RFC931 etc. server. This is done because of a bug in the SunOS -@@ -92,7 +122,11 @@ +@@ -92,7 +122,11 @@ char *dest; * sockets. */ @@ -353,7 +353,7 @@ setbuf(fp, (char *) 0); /* -@@ -112,6 +146,25 @@ +@@ -112,6 +146,25 @@ char *dest; * addresses from the query socket. */ @@ -379,7 +379,7 @@ our_query_sin = *our_sin; our_query_sin.sin_port = htons(ANY_PORT); rmt_query_sin = *rmt_sin; -@@ -121,6 +174,7 @@ +@@ -121,6 +174,7 @@ char *dest; sizeof(our_query_sin)) >= 0 && connect(fileno(fp), (struct sockaddr *) & rmt_query_sin, sizeof(rmt_query_sin)) >= 0) { @@ -387,7 +387,7 @@ /* * Send query to server. Neglect the risk that a 13-byte -@@ -129,8 +183,13 @@ +@@ -129,8 +183,13 @@ char *dest; */ fprintf(fp, "%u,%u\r\n", @@ -401,7 +401,7 @@ fflush(fp); /* -@@ -144,8 +203,13 @@ +@@ -144,8 +203,13 @@ char *dest; && ferror(fp) == 0 && feof(fp) == 0 && sscanf(buffer, "%u , %u : USERID :%*[^:]:%255s", &rmt_port, &our_port, user) == 3 @@ -415,9 +415,9 @@ /* * Strip trailing carriage return. It is part of the ---- scaffold.c +--- scaffold.c.orig +++ scaffold.c -@@ -20,6 +20,9 @@ +@@ -20,6 +20,9 @@ static char sccs_id[] = "@(#) scaffold.c #include <syslog.h> #include <setjmp.h> #include <string.h> @@ -427,7 +427,7 @@ #ifndef INADDR_NONE #define INADDR_NONE (-1) /* XXX should be 0xffffffff */ -@@ -57,6 +60,9 @@ +@@ -57,6 +60,9 @@ struct hostent *hp; /* void */ ; if ((hb = (struct hostent_block *) malloc(sizeof(struct hostent_block) @@ -437,7 +437,7 @@ + (hp->h_length + sizeof(char *)) * count)) == 0) { fprintf(stderr, "Sorry, out of memory\n"); exit(1); -@@ -66,6 +72,11 @@ +@@ -66,6 +72,11 @@ struct hostent *hp; hb->host.h_addr_list = hb->addr_list; hb->host.h_addr_list[count] = 0; data = (char *) (hb->host.h_addr_list + count + 1); @@ -449,7 +449,7 @@ for (count = 0; (addr = hp->h_addr_list[count]) != 0; count++) { hb->host.h_addr_list[count] = data + hp->h_length * count; -@@ -74,6 +85,100 @@ +@@ -74,6 +85,100 @@ struct hostent *hp; return (&hb->host); } @@ -550,7 +550,7 @@ /* find_inet_addr - find all addresses for this host, result to free() */ struct hostent *find_inet_addr(host) -@@ -91,6 +196,15 @@ +@@ -91,6 +196,15 @@ char *host; h.h_addr_list = addr_list; h.h_addr_list[0] = (char *) &addr; h.h_length = sizeof(addr); @@ -566,7 +566,7 @@ return (dup_hostent(&h)); } -@@ -104,19 +218,33 @@ +@@ -104,19 +218,33 @@ char *host; tcpd_warn("%s: not an internet address", host); return (0); } @@ -600,7 +600,7 @@ } /* check_dns - give each address thorough workout, return address count */ -@@ -125,7 +253,13 @@ +@@ -125,7 +253,13 @@ int check_dns(host) char *host; { struct request_info request; @@ -614,7 +614,7 @@ struct hostent *hp; int count; char *addr; -@@ -135,10 +269,30 @@ +@@ -135,10 +269,30 @@ char *host; request_init(&request, RQ_CLIENT_SIN, &sin, 0); sock_methods(&request); memset((char *) &sin, 0, sizeof(sin)); @@ -645,9 +645,9 @@ /* * Force host name and address conversions. Use the request structure ---- socket.c +--- socket.c.orig +++ socket.c -@@ -30,6 +30,12 @@ +@@ -30,6 +30,12 @@ static char sccsid[] = "@(#) socket.c 1. #include <syslog.h> #include <string.h> @@ -660,7 +660,7 @@ extern char *inet_ntoa(); /* Local stuff. */ -@@ -74,8 +80,13 @@ +@@ -74,8 +80,13 @@ char *name; void sock_host(request) struct request_info *request; { @@ -674,7 +674,7 @@ int len; char buf[BUFSIZ]; int fd = request->fd; -@@ -104,7 +115,11 @@ +@@ -104,7 +115,11 @@ struct request_info *request; memset(buf, 0 sizeof(buf)); #endif } @@ -686,7 +686,7 @@ /* * Determine the server binding. This is used for client username -@@ -117,7 +132,11 @@ +@@ -117,7 +132,11 @@ struct request_info *request; tcpd_warn("getsockname: %m"); return; } @@ -698,7 +698,7 @@ } /* sock_hostaddr - map endpoint address to printable form */ -@@ -125,10 +144,33 @@ +@@ -125,10 +144,33 @@ struct request_info *request; void sock_hostaddr(host) struct host_info *host; { @@ -732,7 +732,7 @@ } /* sock_hostname - map endpoint address to host name */ -@@ -136,8 +178,21 @@ +@@ -136,8 +178,21 @@ struct host_info *host; void sock_hostname(host) struct host_info *host; { @@ -754,7 +754,7 @@ int i; /* -@@ -147,11 +202,42 @@ +@@ -147,11 +202,42 @@ struct host_info *host; * have to special-case 0.0.0.0, in order to avoid false alerts from the * host name/address checking code below. */ @@ -797,7 +797,7 @@ /* * Verify that the address is a member of the address list returned -@@ -166,15 +252,53 @@ +@@ -166,15 +252,53 @@ struct host_info *host; * we're in big trouble anyway. */ @@ -851,7 +851,7 @@ } else if (STR_NE(host->name, hp->h_name) && STR_NE(host->name, "localhost")) { -@@ -198,10 +322,19 @@ +@@ -198,10 +322,19 @@ struct host_info *host; */ for (i = 0; hp->h_addr_list[i]; i++) { @@ -871,7 +871,7 @@ } /* -@@ -210,10 +343,20 @@ +@@ -210,10 +343,20 @@ struct host_info *host; * server. */ @@ -892,7 +892,7 @@ } } -@@ -223,7 +366,11 @@ +@@ -223,7 +366,11 @@ static void sock_sink(fd) int fd; { char buf[BUFSIZ]; @@ -904,9 +904,9 @@ int size = sizeof(sin); /* ---- tcpd.c +--- tcpd.c.orig +++ tcpd.c -@@ -24,6 +24,7 @@ +@@ -24,6 +24,7 @@ static char sccsid[] = "@(#) tcpd.c 1.10 #include <stdio.h> #include <syslog.h> #include <string.h> @@ -914,7 +914,7 @@ #ifndef MAXPATHNAMELEN #define MAXPATHNAMELEN BUFSIZ -@@ -120,7 +121,12 @@ +@@ -120,7 +121,12 @@ char **argv; /* Report request and invoke the real daemon program. */ @@ -927,7 +927,7 @@ closelog(); (void) execv(path, argv); syslog(LOG_ERR, "error: cannot execute %s: %m", path); ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h @@ -17,7 +17,11 @@ struct host_info { @@ -941,9 +941,9 @@ struct t_unitdata *unit; /* TLI transport address or 0 */ struct request_info *request; /* for shared information */ }; ---- tcpdchk.c +--- tcpdchk.c.orig +++ tcpdchk.c -@@ -22,6 +22,9 @@ +@@ -22,6 +22,9 @@ static char sccsid[] = "@(#) tcpdchk.c 1 #include <sys/types.h> #include <sys/stat.h> @@ -953,7 +953,7 @@ #include <netinet/in.h> #include <arpa/inet.h> #include <stdio.h> -@@ -397,6 +400,26 @@ +@@ -397,6 +400,26 @@ char *pat; } } @@ -980,7 +980,7 @@ /* check_host - criticize host pattern */ static int check_host(pat) -@@ -423,14 +446,27 @@ +@@ -423,14 +446,27 @@ char *pat; #endif #endif } else if (mask = split_at(pat, '/')) { /* network/netmask */ @@ -1008,9 +1008,9 @@ } else if (NOT_INADDR(pat)) { /* internet name */ if (pat[strlen(pat) - 1] == '.') { tcpd_warn("%s: domain or host name ends in dot", pat); ---- tcpdmatch.c +--- tcpdmatch.c.orig +++ tcpdmatch.c -@@ -68,8 +68,15 @@ +@@ -68,8 +68,15 @@ char **argv; int ch; char *inetcf = 0; int count; @@ -1026,7 +1026,7 @@ struct stat st; /* -@@ -173,12 +180,35 @@ +@@ -173,12 +180,35 @@ char **argv; if ((hp = find_inet_addr(server)) == 0) exit(1); memset((char *) &server_sin, 0, sizeof(server_sin)); @@ -1062,7 +1062,7 @@ /* * Force evaluation of server host name and address. Host name -@@ -230,12 +260,35 @@ +@@ -230,12 +260,35 @@ char **argv; if ((hp = find_inet_addr(client)) == 0) exit(1); memset((char *) &client_sin, 0, sizeof(client_sin)); @@ -1098,9 +1098,9 @@ /* * Force evaluation of client host name and address. Host name ---- update.c +--- update.c.orig +++ update.c -@@ -46,10 +46,18 @@ +@@ -46,10 +46,18 @@ va_list ap; request->fd = va_arg(ap, int); continue; case RQ_CLIENT_SIN: @@ -1119,9 +1119,9 @@ continue; /* ---- workarounds.c +--- workarounds.c.orig +++ workarounds.c -@@ -166,11 +166,22 @@ +@@ -166,11 +166,22 @@ struct sockaddr *sa; int *len; { int ret; ++++++ tcp_wrappers_7.6-ipv6-fix.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -13,7 +13,7 @@ # November , 2002 # ================================================================================ ---- Makefile +--- Makefile.orig +++ Makefile @@ -1,5 +1,7 @@ # @(#) Makefile 1.23 97/03/21 19:27:20 @@ -23,7 +23,7 @@ what: @echo @echo "Usage: edit the REAL_DAEMON_DIR definition in the Makefile then:" -@@ -670,7 +672,7 @@ +@@ -670,7 +672,7 @@ CFLAGS = -O2 -pipe -DFACILITY=$(FACILITY LIB_OBJ= hosts_access.o options.o shell_cmd.o rfc931.o eval.o \ hosts_ctl.o refuse.o percent_x.o clean_exit.o $(AUX_OBJ) \ $(FROM_OBJ) fix_options.o socket.o tli.o workarounds.o \ @@ -32,7 +32,7 @@ FROM_OBJ= fromhost.o -@@ -683,6 +685,7 @@ +@@ -683,6 +685,7 @@ KIT = README miscd.c tcpd.c fromhost.c h tli-sequent.h misc.c diag.c ncr.c tcpdchk.c percent_m.c \ myvsyslog.c mystdarg.h printf.ck README.IRIX Banners.Makefile \ refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \ @@ -40,7 +40,7 @@ scaffold.h tcpdmatch.8 README.NIS LIB = libwrap.a -@@ -812,6 +815,7 @@ +@@ -812,6 +815,7 @@ printfck: # Internal compilation dependencies. @@ -48,9 +48,9 @@ clean_exit.o: cflags clean_exit.o: tcpd.h diag.o: cflags ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -85,11 +85,6 @@ +@@ -85,11 +85,6 @@ static int server_match(); static int client_match(); static int host_match(); static int string_match(); @@ -62,7 +62,7 @@ /* Size of logical line buffer. */ -@@ -308,15 +303,17 @@ +@@ -308,15 +303,17 @@ struct host_info *host; } else if (STR_EQ(tok, "LOCAL")) { /* local: no dots in name */ char *name = eval_hostname(host); return (strchr(name, '.') == 0 && HOSTNAME_KNOWN(name)); @@ -83,7 +83,7 @@ static int string_match(tok, string) char *tok; -@@ -324,13 +321,6 @@ +@@ -324,13 +321,6 @@ char *string; { int n; @@ -97,7 +97,7 @@ if (tok[0] == '.') { /* suffix */ n = strlen(string) - strlen(tok); return (n > 0 && STR_EQ(tok, string + n)); -@@ -340,122 +330,65 @@ +@@ -340,122 +330,65 @@ char *string; return (STR_NE(string, unknown)); } else if (tok[(n = strlen(tok)) - 1] == '.') { /* prefix */ return (STRN_EQ(tok, string, n)); @@ -274,7 +274,7 @@ +#endif } -#endif /* INET6 */ ---- ip6utils.c +--- /dev/null +++ ip6utils.c @@ -0,0 +1,152 @@ +#include <sys/types.h> @@ -429,7 +429,7 @@ + + return 0; +} ---- ip6utils.h +--- /dev/null +++ ip6utils.h @@ -0,0 +1,33 @@ +#ifndef IP6UTILS_H @@ -465,9 +465,9 @@ +int apply_v6_prefix (struct in6_addr *src, int prefixlen); + +#endif /* IP6UTILS_H */ ---- socket.c +--- socket.c.orig +++ socket.c -@@ -25,16 +25,12 @@ +@@ -25,16 +25,12 @@ static char sccsid[] = "@(#) socket.c 1. #include <sys/param.h> #include <sys/socket.h> #include <netinet/in.h> @@ -486,7 +486,7 @@ extern char *inet_ntoa(); -@@ -65,10 +61,10 @@ +@@ -65,10 +61,10 @@ char *name; */ if (strchr(name, '.') == 0 || strlen(name) >= MAXHOSTNAMELEN - 1) { @@ -500,7 +500,7 @@ } } -@@ -104,15 +100,15 @@ +@@ -104,15 +100,15 @@ struct request_info *request; len = sizeof(client); if (getpeername(fd, (struct sockaddr *) & client, &len) < 0) { @@ -524,7 +524,7 @@ #endif } #ifdef INET6 -@@ -129,8 +125,8 @@ +@@ -129,8 +125,8 @@ struct request_info *request; len = sizeof(server); if (getsockname(fd, (struct sockaddr *) & server, &len) < 0) { @@ -535,7 +535,7 @@ } #ifdef INET6 request->server->sin = (struct sockaddr *)&server; -@@ -150,18 +146,18 @@ +@@ -150,18 +146,18 @@ struct host_info *host; int alen; if (!sin) @@ -565,7 +565,7 @@ } host->addr[0] = '\0'; inet_ntop(sin->sa_family, ap, host->addr, sizeof(host->addr)); -@@ -169,30 +165,139 @@ +@@ -169,30 +165,139 @@ struct host_info *host; struct sockaddr_in *sin = host->sin; if (sin != 0) @@ -720,7 +720,7 @@ int i; /* -@@ -202,163 +307,76 @@ +@@ -202,163 +307,76 @@ struct host_info *host; * have to special-case 0.0.0.0, in order to avoid false alerts from the * host name/address checking code below. */ @@ -943,7 +943,7 @@ /* sock_sink - absorb unreceived IP datagram */ ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h @@ -10,6 +10,8 @@ #include <sys/socket.h> ++++++ tcp_wrappers_7.6-ipv6.fix.fix.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -354,7 +354,26 @@ +@@ -354,7 +354,26 @@ char *string; /* If prefix was given, handle it */ if ((mask = split_at(token, '/')) != 0) { ++++++ tcp_wrappers_7.6-ipv6.fix.fix2.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -328,8 +328,6 @@ +@@ -328,8 +328,6 @@ char *string; return (YES); } else if (STR_EQ(tok, "KNOWN")) { /* not unknown */ return (STR_NE(string, unknown)); @@ -9,7 +9,7 @@ } else if (STR_EQ(tok, string)) /* exact match */ return (YES); #ifdef INET6 -@@ -337,11 +335,31 @@ +@@ -337,11 +335,31 @@ char *string; { /* For simplicity we convert everything to IPv6 (or v4 mapped) */ struct in6_addr pat, addr; ++++++ tcp_wrappers_7.6-multi_local_interfaces-fix.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- socket.c +--- socket.c.orig +++ socket.c -@@ -282,7 +282,7 @@ +@@ -282,7 +282,7 @@ sock_hostname(struct host_info *host) return; } ++++++ tcp_wrappers_7.6-nonvoid.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- fakelog.c +--- fakelog.c.orig +++ fakelog.c -@@ -16,7 +16,7 @@ +@@ -16,7 +16,7 @@ static char sccsid[] = "@(#) fakelog.c 1 /* openlog - dummy */ /* ARGSUSED */ @@ -9,7 +9,7 @@ openlog(name, logopt, facility) char *name; int logopt; -@@ -26,7 +26,7 @@ +@@ -26,7 +26,7 @@ int facility; } /* vsyslog - format one record */ @@ -18,7 +18,7 @@ vsyslog(severity, fmt, ap) int severity; char *fmt; -@@ -42,7 +42,7 @@ +@@ -42,7 +42,7 @@ va_list ap; /* syslog - format one record */ /* VARARGS */ @@ -27,7 +27,7 @@ VARARGS(syslog, int, severity) { va_list ap; -@@ -55,7 +55,7 @@ +@@ -55,7 +55,7 @@ VARARGS(syslog, int, severity) } /* closelog - dummy */ @@ -36,9 +36,9 @@ closelog() { /* void */ ---- fix_options.c +--- fix_options.c.orig +++ fix_options.c -@@ -31,7 +31,7 @@ +@@ -31,7 +31,7 @@ static char sccsid[] = "@(#) fix_options #define BUFFER_SIZE 512 /* Was: BUFSIZ */ /* fix_options - get rid of IP-level socket options */ @@ -47,9 +47,9 @@ fix_options(request) struct request_info *request; { ---- options.c +--- options.c.orig +++ options.c -@@ -541,6 +541,7 @@ +@@ -541,6 +541,7 @@ char *name; return (t->value); tcpd_jump("bad syslog facility or severity: \"%s\"", name); /* NOTREACHED */ @@ -57,9 +57,9 @@ } /* severity_option - change logging severity for this event (Dave Mitchell) */ ---- tcpd.c +--- tcpd.c.orig +++ tcpd.c -@@ -132,4 +132,5 @@ +@@ -132,4 +132,5 @@ char **argv; syslog(LOG_ERR, "error: cannot execute %s: %m", path); clean_exit(&request); /* NOTREACHED */ ++++++ tcp_wrappers_7.6-optflags.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,15 +1,15 @@ ---- Makefile +--- Makefile.orig +++ Makefile -@@ -673,7 +673,7 @@ +@@ -673,7 +673,7 @@ SHLIBFLAGS = -Lshared -lwrap shared/%.o: %.c $(CC) $(CFLAGS) $(SHCFLAGS) -c $< -o $@ -CFLAGS = -O2 -pipe -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ -+CFLAGS = $(RPM_OPT_FLAGS) -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ ++CFLAGS = $(RPM_OPT_FLAGS) $(shell getconf LFS_CFLAGS) -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \ -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \ -DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \ -@@ -730,13 +730,13 @@ +@@ -730,13 +730,13 @@ $(SHLIB): $(SHLIB_OBJ) ln -s $(notdir $(SHLIBSOMAJ)) $(SHLIBSO) tcpd: tcpd.o $(SHLIB) @@ -25,7 +25,7 @@ TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.o -@@ -744,7 +744,7 @@ +@@ -744,7 +744,7 @@ tcpdmatch: $(TCPDMATCH_OBJ) $(SHLIB) $(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(SHLIBFLAGS) try-from: try-from.o fakelog.o $(SHLIB) ++++++ tcp_wrappers_7.6-prototypes.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- clean_exit.c +--- clean_exit.c.orig +++ clean_exit.c -@@ -13,6 +13,8 @@ +@@ -13,6 +13,8 @@ static char sccsid[] = "@(#) clean_exit. #endif #include <stdio.h> @@ -9,9 +9,9 @@ extern void exit(); ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -31,6 +31,8 @@ +@@ -31,6 +31,8 @@ static char sccsid[] = "@(#) hosts_acces #include <netinet/in.h> #include <arpa/inet.h> #include <stdio.h> @@ -20,9 +20,9 @@ #include <syslog.h> #include <ctype.h> #include <errno.h> ---- inetcf.c +--- inetcf.c.orig +++ inetcf.c -@@ -88,7 +88,7 @@ +@@ -88,7 +88,7 @@ char *conf; } else { for (i = 0; inet_files[i] && (fp = fopen(inet_files[i], "r")) == 0; i++) /* void */ ; @@ -31,7 +31,7 @@ fprintf(stderr, "Cannot find your inetd.conf or tlid.conf file.\n"); fprintf(stderr, "Please specify its location.\n"); exit(1); ---- ip6utils.c +--- ip6utils.c.orig +++ ip6utils.c @@ -2,6 +2,7 @@ #include <sys/socket.h> @@ -41,9 +41,9 @@ #include <errno.h> #include "ip6utils.h" ---- options.c +--- options.c.orig +++ options.c -@@ -41,6 +41,8 @@ +@@ -41,6 +41,8 @@ static char sccsid[] = "@(#) options.c 1 #include <netinet/in.h> #include <netdb.h> #include <stdio.h> @@ -52,9 +52,9 @@ #include <syslog.h> #include <pwd.h> #include <grp.h> ---- percent_x.c +--- percent_x.c.orig +++ percent_x.c -@@ -18,6 +18,8 @@ +@@ -18,6 +18,8 @@ static char sccsid[] = "@(#) percent_x.c #include <stdio.h> #include <syslog.h> @@ -63,9 +63,9 @@ #include <string.h> extern void exit(); ---- shell_cmd.c +--- shell_cmd.c.orig +++ shell_cmd.c -@@ -15,9 +15,13 @@ +@@ -15,9 +15,13 @@ static char sccsid[] = "@(#) shell_cmd.c /* System libraries. */ #include <sys/types.h> @@ -79,9 +79,9 @@ #include <syslog.h> #include <string.h> ---- update.c +--- update.c.orig +++ update.c -@@ -21,6 +21,7 @@ +@@ -21,6 +21,7 @@ static char sccsid[] = "@(#) update.c 1. #include <stdio.h> #include <syslog.h> ++++++ tcp_wrappers_7.6-shared-lib.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- Makefile +--- Makefile.orig +++ Makefile -@@ -145,9 +145,9 @@ +@@ -145,9 +145,9 @@ freebsd: linux: @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \ @@ -12,7 +12,7 @@ # This is good for many SYSV+BSD hybrids with NIS, probably also for HP-UX 7.x. hpux hpux8 hpux9 hpux10: -@@ -660,7 +660,18 @@ +@@ -660,7 +660,18 @@ HOSTNAME= -DALWAYS_HOSTNAME # Protection against weird shells or weird make programs. SHELL = /bin/sh @@ -32,7 +32,7 @@ CFLAGS = -O2 -pipe -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \ $(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \ -@@ -669,11 +680,16 @@ +@@ -669,11 +680,16 @@ CFLAGS = -O2 -pipe -DFACILITY=$(FACILITY $(UCHAR) $(TABLES) $(STRINGS) $(TLI) $(EXTRA_CFLAGS) $(DOT) \ $(VSYSLOG) @@ -49,7 +49,7 @@ FROM_OBJ= fromhost.o KIT = README miscd.c tcpd.c fromhost.c hosts_access.c shell_cmd.c \ -@@ -688,9 +704,8 @@ +@@ -688,9 +704,8 @@ KIT = README miscd.c tcpd.c fromhost.c h ip6utils.c ip6utils.h \ scaffold.h tcpdmatch.8 README.NIS @@ -60,7 +60,7 @@ # Invalidate all object files when the compiler options (CFLAGS) have changed. -@@ -701,33 +716,40 @@ +@@ -701,33 +716,40 @@ config-check: then rm /tmp/cflags.$$$$ ; \ else mv /tmp/cflags.$$$$ cflags ; \ fi >/dev/null 2>/dev/null @@ -113,7 +113,7 @@ shar: $(KIT) @shar $(KIT) -@@ -743,7 +765,8 @@ +@@ -743,7 +765,8 @@ archive: clean: rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \ @@ -123,16 +123,16 @@ tidy: clean chmod -R a+r . -@@ -890,5 +913,6 @@ +@@ -890,5 +913,6 @@ update.o: cflags update.o: mystdarg.h update.o: tcpd.h vfprintf.o: cflags +weak_symbols.o: tcpd.h workarounds.o: cflags workarounds.o: tcpd.h ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h -@@ -106,8 +106,14 @@ +@@ -106,8 +106,14 @@ extern unsigned long dot_quad_addr(); /* /* Global variables. */ @@ -147,7 +147,7 @@ extern char *hosts_allow_table; /* for verification mode redirection */ extern char *hosts_deny_table; /* for verification mode redirection */ extern int hosts_access_verbose; /* for verbose matching mode */ ---- weak_symbols.c +--- /dev/null +++ weak_symbols.c @@ -0,0 +1,11 @@ +/* ++++++ tcp_wrappers_7.6-shared-lib2.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h -@@ -126,10 +126,15 @@ +@@ -126,10 +126,15 @@ extern int resident; /* > 0 if residen */ #ifdef __STDC__ ++++++ tcp_wrappers_7.6-uninitialized.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- inetcf.c +--- inetcf.c.orig +++ inetcf.c -@@ -61,7 +61,7 @@ +@@ -61,7 +61,7 @@ char *inet_cfg(conf) char *conf; { char buf[BUFSIZ]; ++++++ tcp_wrappers_7.6.diff ++++++ --- /var/tmp/diff_new_pack.S1V3zq/_old 2012-04-23 16:13:56.000000000 +0200 +++ /var/tmp/diff_new_pack.S1V3zq/_new 2012-04-23 16:13:56.000000000 +0200 @@ -1,6 +1,6 @@ ---- Makefile +--- Makefile.orig +++ Makefile -@@ -44,7 +44,7 @@ +@@ -44,7 +44,7 @@ what: #REAL_DAEMON_DIR=/usr/etc # # SysV.4 Solaris 2.x OSF AIX @@ -9,7 +9,7 @@ # # BSD 4.4 #REAL_DAEMON_DIR=/usr/libexec -@@ -143,8 +143,9 @@ +@@ -143,8 +143,9 @@ freebsd: linux: @make REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \ @@ -21,7 +21,7 @@ # This is good for many SYSV+BSD hybrids with NIS, probably also for HP-UX 7.x. hpux hpux8 hpux9 hpux10: -@@ -229,7 +230,7 @@ +@@ -229,7 +230,7 @@ tandem: # Amdahl UTS 2.1.5 (Richard.Richmond@bridge.bst.bls.com) uts215: @@ -30,7 +30,7 @@ LIBS="-lsocket" RANLIB=echo \ ARFLAGS=rv AUX_OBJ=setenv.o NETGROUP=-DNO_NETGROUP TLI= all -@@ -472,7 +473,7 @@ +@@ -472,7 +473,7 @@ BUGS = -DGETPEERNAME_BUG -DBROKEN_FGETS # If your system supports vsyslog(), comment out the following definition. # If in doubt leave it in, it won't harm. @@ -39,7 +39,7 @@ # End of the system dependencies. ################################# -@@ -491,7 +492,7 @@ +@@ -491,7 +492,7 @@ VSYSLOG = -Dvsyslog=myvsyslog # Uncomment the next definition to turn on the language extensions # (examples: allow, deny, banners, twist and spawn). # @@ -48,7 +48,7 @@ ################################################################ # Optional: Changing the default disposition of logfile records -@@ -514,7 +515,7 @@ +@@ -514,7 +515,7 @@ VSYSLOG = -Dvsyslog=myvsyslog # # The LOG_XXX names below are taken from the /usr/include/syslog.h file. @@ -57,7 +57,7 @@ # The syslog priority at which successful connections are logged. -@@ -531,7 +532,7 @@ +@@ -531,7 +532,7 @@ SEVERITY= LOG_INFO # LOG_INFO is normall # and with Solaris < 2.4. APPEND_DOT will not work with hostnames taken # from /etc/hosts or from NIS maps. It does work with DNS through NIS. # @@ -66,7 +66,7 @@ ################################################## # Optional: Always attempt remote username lookups -@@ -610,7 +611,7 @@ +@@ -610,7 +611,7 @@ TABLES = -DHOSTS_DENY=\"/etc/hosts.deny\ # Paranoid mode implies hostname lookup. In order to disable hostname # lookups altogether, see the next section. @@ -75,7 +75,7 @@ ######################################## # Optional: turning off hostname lookups -@@ -649,7 +650,7 @@ +@@ -649,7 +650,7 @@ HOSTNAME= -DALWAYS_HOSTNAME # source-routed traffic in the kernel. Examples: 4.4BSD derivatives, # Solaris 2.x, and Linux. See your system documentation for details. # @@ -84,7 +84,7 @@ ## End configuration options ############################ -@@ -659,12 +660,12 @@ +@@ -659,12 +660,12 @@ HOSTNAME= -DALWAYS_HOSTNAME SHELL = /bin/sh .c.o:; $(CC) $(CFLAGS) -c $*.c @@ -99,7 +99,7 @@ LIB_OBJ= hosts_access.o options.o shell_cmd.o rfc931.o eval.o \ hosts_ctl.o refuse.o percent_x.o clean_exit.o $(AUX_OBJ) \ ---- README.ipv6 +--- /dev/null +++ README.ipv6 @@ -0,0 +1,17 @@ +;; IPv6 patch for tcp_wrappers_7.6 1.6 @@ -119,9 +119,9 @@ +;; For Linux users: +;; If your libc doesn't have sockaddr_storage, try target `linux-old'. + ---- hosts_access.c +--- hosts_access.c.orig +++ hosts_access.c -@@ -33,6 +33,7 @@ +@@ -33,6 +33,7 @@ static char sccsid[] = "@(#) hosts_acces #include <errno.h> #include <setjmp.h> #include <string.h> @@ -129,7 +129,7 @@ extern char *fgets(); extern int errno; -@@ -89,6 +90,33 @@ +@@ -89,6 +90,33 @@ static int masked_match(); /* hosts_access - host access control facility */ @@ -163,9 +163,9 @@ int hosts_access(request) struct request_info *request; { ---- safe_finger.c +--- safe_finger.c.orig +++ safe_finger.c -@@ -31,7 +31,7 @@ +@@ -31,7 +31,7 @@ extern void exit(); /* Local stuff */ @@ -174,9 +174,9 @@ #define TIME_LIMIT 60 /* Do not keep listinging forever */ #define INPUT_LENGTH 100000 /* Do not keep listinging forever */ ---- scaffold.c +--- scaffold.c.orig +++ scaffold.c -@@ -180,10 +180,17 @@ +@@ -180,10 +180,17 @@ struct request_info *request; /* ARGSUSED */ @@ -197,7 +197,7 @@ } /* check_path - examine accessibility */ ---- tcpd.h +--- tcpd.h.orig +++ tcpd.h @@ -4,6 +4,12 @@ * Author: Wietse Venema, Eindhoven University of Technology, The Netherlands. @@ -212,7 +212,7 @@ /* Structure to describe one communications endpoint. */ #define STRING_LENGTH 128 /* hosts, users, processes */ -@@ -61,11 +67,26 @@ +@@ -61,11 +67,26 @@ extern char paranoid[]; /* Global functions. */ #if defined(TLI) || defined(PTX) || defined(TLI_SEQUENT) @@ -239,7 +239,7 @@ extern int hosts_access(); /* access control */ extern void shell_cmd(); /* execute shell command */ extern char *percent_x(); /* do %<char> expansion */ -@@ -75,6 +96,7 @@ +@@ -75,6 +96,7 @@ extern void refuse(); /* clean up and extern char *xgets(); /* fgets() on steroids */ extern char *split_at(); /* strchr() and split */ extern unsigned long dot_quad_addr(); /* restricted inet_addr() */ @@ -247,7 +247,7 @@ /* Global variables. */ -@@ -117,28 +139,47 @@ +@@ -117,28 +139,47 @@ extern struct request_info *request_set( * host_info structures serve as caches for the lookup results. */ @@ -295,7 +295,7 @@ /* * Problem reporting interface. Additional file/line context is reported -@@ -178,42 +219,74 @@ +@@ -178,42 +219,74 @@ extern struct tcpd_context tcpd_context; * behavior. */ -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org
participants (1)
-
root@hilbert.suse.de