wok view portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 19278
Check manpages... to bluez.
author | Aleksej Bobylev <al.bobylev@gmail.com> |
---|---|
date | Tue Jul 05 19:21:55 2016 +0300 (2016-07-05) |
parents | |
children |
line source
1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008
2 +++ Makefile Fri Feb 1 11:55:19 2008
3 @@ -15,9 +15,9 @@
4 # no access control tables. The local system, since it runs the portmap
5 # daemon, is always treated as an authorized host.
7 -HOSTS_ACCESS= -DHOSTS_ACCESS
8 +#HOSTS_ACCESS= -DHOSTS_ACCESS
9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a
10 -WRAP_LIB = -lwrap
11 +#WRAP_LIB = -lwrap
13 # Comment out if your RPC library does not allocate privileged ports for
14 # requests from processes with root privilege, or the new portmap will
15 @@ -25,7 +25,7 @@
16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
17 # daemons use a port >= 1024 you should probably disable the next line.
19 -CHECK_PORT = -DCHECK_PORT
20 +#CHECK_PORT = -DCHECK_PORT
22 # Warning: troublesome feature ahead!! Enable only when you are really
23 # desperate!!