Blame SOURCES/tcp_wrappers-7.6-inetdconf.patch

c863fc
diff -up tcp_wrappers_7.6/tcpdmatch.8.inetdconf tcp_wrappers_7.6/tcpdmatch.8
c863fc
--- tcp_wrappers_7.6/tcpdmatch.8.inetdconf	2010-06-16 14:39:32.000000000 +0200
c863fc
+++ tcp_wrappers_7.6/tcpdmatch.8	2010-06-16 14:42:25.000000000 +0200
c863fc
@@ -2,9 +2,9 @@
c863fc
 .SH NAME
c863fc
 tcpdmatch \- tcp wrapper oracle
c863fc
 .SH SYNOPSYS
c863fc
-tcpdmatch [-d] [-i inet_conf] daemon client
c863fc
+tcpdmatch [-d] daemon client
c863fc
 .sp
c863fc
-tcpdmatch [-d] [-i inet_conf] daemon[@server] [user@]client
c863fc
+tcpdmatch [-d] daemon[@server] [user@]client
c863fc
 .SH DESCRIPTION
c863fc
 .PP
c863fc
 \fItcpdmatch\fR predicts how the tcp wrapper would handle a specific
c863fc
@@ -48,10 +48,6 @@ The default user name is `unknown'.
c863fc
 .IP -d
c863fc
 Examine \fIhosts.allow\fR and \fIhosts.deny\fR files in the current
c863fc
 directory instead of the default ones.
c863fc
-.IP "-i inet_conf"
c863fc
-Specify this option when \fItcpdmatch\fR is unable to find your
c863fc
-\fIinetd.conf\fR or \fItlid.conf\fR network configuration file, or when
c863fc
-you suspect that the program uses the wrong one.
c863fc
 .SH EXAMPLES
c863fc
 To predict how \fItcpd\fR would handle a telnet request from the local
c863fc
 system:
c863fc
@@ -82,11 +78,8 @@ The default locations of the \fItcpd\fR 
c863fc
 .SH SEE ALSO
c863fc
 .na
c863fc
 .nf
c863fc
-tcpdchk(8), tcpd configuration checker
c863fc
 hosts_access(5), format of the tcpd access control tables.
c863fc
 hosts_options(5), format of the language extensions.
c863fc
-inetd.conf(5), format of the inetd control file.
c863fc
-tlid.conf(5), format of the tlid control file.
c863fc
 .SH AUTHORS
c863fc
 .na
c863fc
 .nf
c863fc
diff -up tcp_wrappers_7.6/tcpdmatch.c.inetdconf tcp_wrappers_7.6/tcpdmatch.c
c863fc
--- tcp_wrappers_7.6/tcpdmatch.c.inetdconf	2010-06-16 14:37:09.000000000 +0200
c863fc
+++ tcp_wrappers_7.6/tcpdmatch.c	2010-06-16 14:39:18.000000000 +0200
c863fc
@@ -140,25 +140,6 @@ char  **argv;
c863fc
     }
c863fc
 
c863fc
     /*
c863fc
-     * Analyze the inetd (or tlid) configuration file, so that we can warn
c863fc
-     * the user about services that may not be wrapped, services that are not
c863fc
-     * configured, or services that are wrapped in an incorrect manner. Allow
c863fc
-     * for services that are not run from inetd, or that have tcpd access
c863fc
-     * control built into them.
c863fc
-     */
c863fc
-    inetcf = inet_cfg(inetcf);
c863fc
-    inet_set("portmap", WR_NOT);
c863fc
-    inet_set("rpcbind", WR_NOT);
c863fc
-    switch (inet_get(daemon)) {
c863fc
-    case WR_UNKNOWN:
c863fc
-	tcpd_warn("%s: no such process name in %s", daemon, inetcf);
c863fc
-	break;
c863fc
-    case WR_NOT:
c863fc
-	tcpd_warn("%s: service possibly not wrapped", daemon);
c863fc
-	break;
c863fc
-    }
c863fc
-
c863fc
-    /*
c863fc
      * Check accessibility of access control files.
c863fc
      */
c863fc
     (void) check_path(hosts_allow_table, &st);
c863fc
@@ -319,10 +300,9 @@ char  **argv;
c863fc
 static void usage(myname)
c863fc
 char   *myname;
c863fc
 {
c863fc
-    fprintf(stderr, "usage: %s [-d] [-i inet_conf] daemon[@host] [user@]host\n",
c863fc
+    fprintf(stderr, "usage: %s [-d] daemon[@host] [user@]host\n",
c863fc
 	    myname);
c863fc
     fprintf(stderr, "	-d: use allow/deny files in current directory\n");
c863fc
-    fprintf(stderr, "	-i: location of inetd.conf file\n");
c863fc
     exit(1);
c863fc
 }
c863fc