wok diff portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 18015
dropbear: pppssh may use ssh keys
author | Pascal Bellard <pascal.bellard@slitaz.org> |
---|---|
date | Sat May 02 12:05:22 2015 +0200 (2015-05-02) |
parents | |
children |
line diff
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch Sat May 02 12:05:22 2015 +0200 1.3 @@ -0,0 +1,23 @@ 1.4 +--- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008 1.5 ++++ Makefile Fri Feb 1 11:55:19 2008 1.6 +@@ -15,9 +15,9 @@ 1.7 + # no access control tables. The local system, since it runs the portmap 1.8 + # daemon, is always treated as an authorized host. 1.9 + 1.10 +-HOSTS_ACCESS= -DHOSTS_ACCESS 1.11 ++#HOSTS_ACCESS= -DHOSTS_ACCESS 1.12 + #WRAP_LIB = $(WRAP_DIR)/libwrap.a 1.13 +-WRAP_LIB = -lwrap 1.14 ++#WRAP_LIB = -lwrap 1.15 + 1.16 + # Comment out if your RPC library does not allocate privileged ports for 1.17 + # requests from processes with root privilege, or the new portmap will 1.18 +@@ -25,7 +25,7 @@ 1.19 + # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS 1.20 + # daemons use a port >= 1024 you should probably disable the next line. 1.21 + 1.22 +-CHECK_PORT = -DCHECK_PORT 1.23 ++#CHECK_PORT = -DCHECK_PORT 1.24 + 1.25 + # Warning: troublesome feature ahead!! Enable only when you are really 1.26 + # desperate!!