Gentoo Archives: gentoo-commits

From: Patrice Clement <monsieurp@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-misc/raccess/files/, net-misc/raccess/
Date: Wed, 15 Feb 2017 23:00:27
Message-Id: 1487199617.5f06fce745e532ed5afd015944a3d5177e0cf2f2.monsieurp@gentoo
1 commit: 5f06fce745e532ed5afd015944a3d5177e0cf2f2
2 Author: Patrice Clement <monsieurp <AT> gentoo <DOT> org>
3 AuthorDate: Wed Feb 15 22:53:56 2017 +0000
4 Commit: Patrice Clement <monsieurp <AT> gentoo <DOT> org>
5 CommitDate: Wed Feb 15 23:00:17 2017 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5f06fce7
7
8 net-misc/raccess: removal.
9
10 net-misc/raccess/Manifest | 1 -
11 net-misc/raccess/files/raccess-0.7-glibc210.patch | 585 ---------------------
12 .../raccess/files/raccess-0.7-r1-asneeded.patch | 11 -
13 net-misc/raccess/metadata.xml | 5 -
14 net-misc/raccess/raccess-0.7.ebuild | 36 --
15 5 files changed, 638 deletions(-)
16
17 diff --git a/net-misc/raccess/Manifest b/net-misc/raccess/Manifest
18 deleted file mode 100644
19 index 09aeee846c..0000000000
20 --- a/net-misc/raccess/Manifest
21 +++ /dev/null
22 @@ -1 +0,0 @@
23 -DIST raccess-0.7.tar.gz 228067 SHA256 df48138333e674aea7b76f00ca67fccae74af9972ddd421c1c959ea2aaa34a50 SHA512 610c0d4cebf5130eb2de4b64e76ff55210645331ce8a24b6a3e6975f456b6f447e737a59634a052e5bacf74cb300b6ef02d95a5ab133d2af5f7e239ee006675d WHIRLPOOL e0b95536c2204fedfc6a2b73ef2fb4c496487ba7f96c4f58e269d4218f8b746e7f36bc01d8dcfb2397e5b38402d29015fa293df316786cbe2646e42cb6c1ba18
24
25 diff --git a/net-misc/raccess/files/raccess-0.7-glibc210.patch b/net-misc/raccess/files/raccess-0.7-glibc210.patch
26 deleted file mode 100644
27 index 2ffb5660ed..0000000000
28 --- a/net-misc/raccess/files/raccess-0.7-glibc210.patch
29 +++ /dev/null
30 @@ -1,585 +0,0 @@
31 -diff -NrU5 raccess-0.7.original/exploits/wu2.5.0a.c raccess-0.7/exploits/wu2.5.0a.c
32 ---- raccess-0.7.original/exploits/wu2.5.0a.c 2009-07-08 17:55:35.000000000 +0000
33 -+++ raccess-0.7/exploits/wu2.5.0a.c 2009-07-08 18:09:23.000000000 +0000
34 -@@ -104,11 +104,11 @@
35 - int xconnect (int sockfd, struct sockaddr *serv_addr, int addrlen);
36 - void sighandler (int signal);
37 - struct hostent *xgethostbyname (const char *name);
38 - struct hostent *xgethostbyaddr (const char *addr, int len, int type);
39 - void putserv (const char *fmt, ...);
40 --char *getline (void);
41 -+char *get_line (void);
42 - char *getmsg (const char *msg);
43 - int wuftpd_250_sploitit (void);
44 - dirptr newdir (char *name);
45 - char *getdir (char *stat);
46 - char *int2char (int addr);
47 -@@ -759,16 +759,16 @@
48 - }
49 -
50 - #define LINEBUFLEN 8192
51 - char linebuf[LINEBUFLEN]; /* saves us free()ing trouble. */
52 -
53 --/* getline
54 -+/* get_line
55 - *
56 - * get next line from server or local buffer
57 - */
58 - char *
59 --getline (void)
60 -+get_line (void)
61 - {
62 - char y[2];
63 - int i = 0;
64 -
65 - memset (linebuf, '\0', sizeof (linebuf));
66 -@@ -776,11 +776,11 @@
67 -
68 - while (strncmp (y, "\n", 1) != 0)
69 - {
70 - if (i > (sizeof (linebuf) + 2))
71 - {
72 -- err (0, "getline() buffer full");
73 -+ err (0, "get_line() buffer full");
74 - }
75 - i += xread (fd, y, 1);
76 - strcat (linebuf, y);
77 - }
78 -
79 -@@ -835,11 +835,11 @@
80 - char *line;
81 - int i = strlen (msg);
82 -
83 - do
84 - {
85 -- line = getline ();
86 -+ line = get_line ();
87 - }
88 - while (strncmp (line, msg, i) != 0 && strncmp (line, "5", 1) != 0);
89 -
90 - return (line);
91 - }
92 -@@ -919,11 +919,11 @@
93 - nostat = 0;
94 - putserv ("STAT .\n");
95 -
96 - while (strncmp (line, "213 ", 4) != 0)
97 - {
98 -- line = getline ();
99 -+ line = get_line ();
100 - tmp = getdir (line);
101 -
102 - if (tmp == NULL)
103 - continue;
104 - if (dirroot == NULL)
105 -@@ -1279,14 +1279,14 @@
106 - break;
107 - }
108 -
109 - string[tesopt.dirlen] = 0;
110 - putserv ("MKD %s\n", string);
111 -- getline ();
112 -+ get_line ();
113 -
114 - putserv ("CWD %s\n", string);
115 -- getline ();
116 -+ get_line ();
117 - }
118 -
119 - getpwd ();
120 - disp = 1;
121 -
122 -@@ -1318,11 +1318,11 @@
123 -
124 - if (strlen (string) < 20)
125 - err (0, "cwd string too short.. check for 0x0's.\n");
126 -
127 - putserv ("CWD %s\n", string);
128 -- getline ();
129 -+ get_line ();
130 -
131 - /************ jmpbuf ***********/
132 -
133 - if (debug > 0)
134 - printf ("Sending jmpbuf\n");
135 -@@ -1334,11 +1334,11 @@
136 - if (strlen (string) != 32)
137 - err (0, "jmpbuf string too short.. check for 0x0's.\n");
138 -
139 - putserv ("%s\n", string);
140 -
141 -- getline ();
142 -+ get_line ();
143 -
144 - return (1);
145 - }
146 -
147 - /* shell
148 -diff -NrU5 raccess-0.7.original/exploits/wu2.5.0b.c raccess-0.7/exploits/wu2.5.0b.c
149 ---- raccess-0.7.original/exploits/wu2.5.0b.c 2009-07-08 17:55:35.000000000 +0000
150 -+++ raccess-0.7/exploits/wu2.5.0b.c 2009-07-08 18:12:44.000000000 +0000
151 -@@ -104,11 +104,11 @@
152 - int xconnect (int sockfd, struct sockaddr *serv_addr, int addrlen);
153 - void sighandler (int signal);
154 - struct hostent *xgethostbyname (const char *name);
155 - struct hostent *xgethostbyaddr (const char *addr, int len, int type);
156 - void putserv (const char *fmt, ...);
157 --char *getline (void);
158 -+char *get_line (void);
159 - char *getmsg (const char *msg);
160 - int wuftpd_250_sploitit (void);
161 - dirptr newdir (char *name);
162 - char *getdir (char *stat);
163 - char *int2char (int addr);
164 -@@ -759,16 +759,16 @@
165 - }
166 -
167 - #define LINEBUFLEN 8192
168 - char linebuf[LINEBUFLEN]; /* saves us free()ing trouble. */
169 -
170 --/* getline
171 -+/* get_line
172 - *
173 - * get next line from server or local buffer
174 - */
175 - char *
176 --getline (void)
177 -+get_line (void)
178 - {
179 - char y[2];
180 - int i = 0;
181 -
182 - memset (linebuf, '\0', sizeof (linebuf));
183 -@@ -776,11 +776,11 @@
184 -
185 - while (strncmp (y, "\n", 1) != 0)
186 - {
187 - if (i > (sizeof (linebuf) + 2))
188 - {
189 -- err (0, "getline() buffer full");
190 -+ err (0, "get_line() buffer full");
191 - }
192 - i += xread (fd, y, 1);
193 - strcat (linebuf, y);
194 - }
195 -
196 -@@ -835,11 +835,11 @@
197 - char *line;
198 - int i = strlen (msg);
199 -
200 - do
201 - {
202 -- line = getline ();
203 -+ line = get_line ();
204 - }
205 - while (strncmp (line, msg, i) != 0 && strncmp (line, "5", 1) != 0);
206 -
207 - return (line);
208 - }
209 -@@ -919,11 +919,11 @@
210 - nostat = 0;
211 - putserv ("STAT .\n");
212 -
213 - while (strncmp (line, "213 ", 4) != 0)
214 - {
215 -- line = getline ();
216 -+ line = get_line ();
217 - tmp = getdir (line);
218 -
219 - if (tmp == NULL)
220 - continue;
221 - if (dirroot == NULL)
222 -@@ -1279,14 +1279,14 @@
223 - break;
224 - }
225 -
226 - string[tesopt.dirlen] = 0;
227 - putserv ("MKD %s\n", string);
228 -- getline ();
229 -+ get_line ();
230 -
231 - putserv ("CWD %s\n", string);
232 -- getline ();
233 -+ get_line ();
234 - }
235 -
236 - getpwd ();
237 - disp = 1;
238 -
239 -@@ -1318,11 +1318,11 @@
240 -
241 - if (strlen (string) < 20)
242 - err (0, "cwd string too short.. check for 0x0's.\n");
243 -
244 - putserv ("CWD %s\n", string);
245 -- getline ();
246 -+ get_line ();
247 -
248 - /************ jmpbuf ***********/
249 -
250 - if (debug > 0)
251 - printf ("Sending jmpbuf\n");
252 -@@ -1334,11 +1334,11 @@
253 - if (strlen (string) != 32)
254 - err (0, "jmpbuf string too short.. check for 0x0's.\n");
255 -
256 - putserv ("%s\n", string);
257 -
258 -- getline ();
259 -+ get_line ();
260 -
261 - return (1);
262 - }
263 -
264 - /* shell
265 -diff -NrU5 raccess-0.7.original/exploits/wu2.5.0c.c raccess-0.7/exploits/wu2.5.0c.c
266 ---- raccess-0.7.original/exploits/wu2.5.0c.c 2009-07-08 17:55:35.000000000 +0000
267 -+++ raccess-0.7/exploits/wu2.5.0c.c 2009-07-08 18:14:14.000000000 +0000
268 -@@ -104,11 +104,11 @@
269 - int xconnect (int sockfd, struct sockaddr *serv_addr, int addrlen);
270 - void sighandler (int signal);
271 - struct hostent *xgethostbyname (const char *name);
272 - struct hostent *xgethostbyaddr (const char *addr, int len, int type);
273 - void putserv (const char *fmt, ...);
274 --char *getline (void);
275 -+char *get_line (void);
276 - char *getmsg (const char *msg);
277 - int wuftpd_250_sploitit (void);
278 - dirptr newdir (char *name);
279 - char *getdir (char *stat);
280 - char *int2char (int addr);
281 -@@ -759,16 +759,16 @@
282 - }
283 -
284 - #define LINEBUFLEN 8192
285 - char linebuf[LINEBUFLEN]; /* saves us free()ing trouble. */
286 -
287 --/* getline
288 -+/* get_line
289 - *
290 - * get next line from server or local buffer
291 - */
292 - char *
293 --getline (void)
294 -+get_line (void)
295 - {
296 - char y[2];
297 - int i = 0;
298 -
299 - memset (linebuf, '\0', sizeof (linebuf));
300 -@@ -776,11 +776,11 @@
301 -
302 - while (strncmp (y, "\n", 1) != 0)
303 - {
304 - if (i > (sizeof (linebuf) + 2))
305 - {
306 -- err (0, "getline() buffer full");
307 -+ err (0, "get_line() buffer full");
308 - }
309 - i += xread (fd, y, 1);
310 - strcat (linebuf, y);
311 - }
312 -
313 -@@ -835,11 +835,11 @@
314 - char *line;
315 - int i = strlen (msg);
316 -
317 - do
318 - {
319 -- line = getline ();
320 -+ line = get_line ();
321 - }
322 - while (strncmp (line, msg, i) != 0 && strncmp (line, "5", 1) != 0);
323 -
324 - return (line);
325 - }
326 -@@ -919,11 +919,11 @@
327 - nostat = 0;
328 - putserv ("STAT .\n");
329 -
330 - while (strncmp (line, "213 ", 4) != 0)
331 - {
332 -- line = getline ();
333 -+ line = get_line ();
334 - tmp = getdir (line);
335 -
336 - if (tmp == NULL)
337 - continue;
338 - if (dirroot == NULL)
339 -@@ -1279,14 +1279,14 @@
340 - break;
341 - }
342 -
343 - string[tesopt.dirlen] = 0;
344 - putserv ("MKD %s\n", string);
345 -- getline ();
346 -+ get_line ();
347 -
348 - putserv ("CWD %s\n", string);
349 -- getline ();
350 -+ get_line ();
351 - }
352 -
353 - getpwd ();
354 - disp = 1;
355 -
356 -@@ -1318,11 +1318,11 @@
357 -
358 - if (strlen (string) < 20)
359 - err (0, "cwd string too short.. check for 0x0's.\n");
360 -
361 - putserv ("CWD %s\n", string);
362 -- getline ();
363 -+ get_line ();
364 -
365 - /************ jmpbuf ***********/
366 -
367 - if (debug > 0)
368 - printf ("Sending jmpbuf\n");
369 -@@ -1334,11 +1334,11 @@
370 - if (strlen (string) != 32)
371 - err (0, "jmpbuf string too short.. check for 0x0's.\n");
372 -
373 - putserv ("%s\n", string);
374 -
375 -- getline ();
376 -+ get_line ();
377 -
378 - return (1);
379 - }
380 -
381 - /* shell
382 -diff -NrU5 raccess-0.7.original/exploits/wu2.5.0d.c raccess-0.7/exploits/wu2.5.0d.c
383 ---- raccess-0.7.original/exploits/wu2.5.0d.c 2009-07-08 17:55:35.000000000 +0000
384 -+++ raccess-0.7/exploits/wu2.5.0d.c 2009-07-08 18:06:24.000000000 +0000
385 -@@ -104,11 +104,11 @@
386 - int xconnect (int sockfd, struct sockaddr *serv_addr, int addrlen);
387 - void sighandler (int signal);
388 - struct hostent *xgethostbyname (const char *name);
389 - struct hostent *xgethostbyaddr (const char *addr, int len, int type);
390 - void putserv (const char *fmt, ...);
391 --char *getline (void);
392 -+char *get_line (void);
393 - char *getmsg (const char *msg);
394 - int wuftpd_250_sploitit (void);
395 - dirptr newdir (char *name);
396 - char *getdir (char *stat);
397 - char *int2char (int addr);
398 -@@ -759,16 +759,16 @@
399 - }
400 -
401 - #define LINEBUFLEN 8192
402 - char linebuf[LINEBUFLEN]; /* saves us free()ing trouble. */
403 -
404 --/* getline
405 -+/* get_line
406 - *
407 - * get next line from server or local buffer
408 - */
409 - char *
410 --getline (void)
411 -+get_line (void)
412 - {
413 - char y[2];
414 - int i = 0;
415 -
416 - memset (linebuf, '\0', sizeof (linebuf));
417 -@@ -776,11 +776,11 @@
418 -
419 - while (strncmp (y, "\n", 1) != 0)
420 - {
421 - if (i > (sizeof (linebuf) + 2))
422 - {
423 -- err (0, "getline() buffer full");
424 -+ err (0, "get_line() buffer full");
425 - }
426 - i += xread (fd, y, 1);
427 - strcat (linebuf, y);
428 - }
429 -
430 -@@ -835,11 +835,11 @@
431 - char *line;
432 - int i = strlen (msg);
433 -
434 - do
435 - {
436 -- line = getline ();
437 -+ line = get_line ();
438 - }
439 - while (strncmp (line, msg, i) != 0 && strncmp (line, "5", 1) != 0);
440 -
441 - return (line);
442 - }
443 -@@ -919,11 +919,11 @@
444 - nostat = 0;
445 - putserv ("STAT .\n");
446 -
447 - while (strncmp (line, "213 ", 4) != 0)
448 - {
449 -- line = getline ();
450 -+ line = get_line ();
451 - tmp = getdir (line);
452 -
453 - if (tmp == NULL)
454 - continue;
455 - if (dirroot == NULL)
456 -@@ -1279,14 +1279,14 @@
457 - break;
458 - }
459 -
460 - string[tesopt.dirlen] = 0;
461 - putserv ("MKD %s\n", string);
462 -- getline ();
463 -+ get_line ();
464 -
465 - putserv ("CWD %s\n", string);
466 -- getline ();
467 -+ get_line ();
468 - }
469 -
470 - getpwd ();
471 - disp = 1;
472 -
473 -@@ -1318,11 +1318,11 @@
474 -
475 - if (strlen (string) < 20)
476 - err (0, "cwd string too short.. check for 0x0's.\n");
477 -
478 - putserv ("CWD %s\n", string);
479 -- getline ();
480 -+ get_line ();
481 -
482 - /************ jmpbuf ***********/
483 -
484 - if (debug > 0)
485 - printf ("Sending jmpbuf\n");
486 -@@ -1334,11 +1334,11 @@
487 - if (strlen (string) != 32)
488 - err (0, "jmpbuf string too short.. check for 0x0's.\n");
489 -
490 - putserv ("%s\n", string);
491 -
492 -- getline ();
493 -+ get_line ();
494 -
495 - return (1);
496 - }
497 -
498 - /* shell
499 -diff -NrU5 raccess-0.7.original/exploits/wu2.5.0e.c raccess-0.7/exploits/wu2.5.0e.c
500 ---- raccess-0.7.original/exploits/wu2.5.0e.c 2009-07-08 17:55:35.000000000 +0000
501 -+++ raccess-0.7/exploits/wu2.5.0e.c 2009-07-08 18:07:19.000000000 +0000
502 -@@ -104,11 +104,11 @@
503 - int xconnect (int sockfd, struct sockaddr *serv_addr, int addrlen);
504 - void sighandler (int signal);
505 - struct hostent *xgethostbyname (const char *name);
506 - struct hostent *xgethostbyaddr (const char *addr, int len, int type);
507 - void putserv (const char *fmt, ...);
508 --char *getline (void);
509 -+char *get_line (void);
510 - char *getmsg (const char *msg);
511 - int wuftpd_250_sploitit (void);
512 - dirptr newdir (char *name);
513 - char *getdir (char *stat);
514 - char *int2char (int addr);
515 -@@ -759,16 +759,16 @@
516 - }
517 -
518 - #define LINEBUFLEN 8192
519 - char linebuf[LINEBUFLEN]; /* saves us free()ing trouble. */
520 -
521 --/* getline
522 -+/* get_line
523 - *
524 - * get next line from server or local buffer
525 - */
526 - char *
527 --getline (void)
528 -+get_line (void)
529 - {
530 - char y[2];
531 - int i = 0;
532 -
533 - memset (linebuf, '\0', sizeof (linebuf));
534 -@@ -776,11 +776,11 @@
535 -
536 - while (strncmp (y, "\n", 1) != 0)
537 - {
538 - if (i > (sizeof (linebuf) + 2))
539 - {
540 -- err (0, "getline() buffer full");
541 -+ err (0, "get_line() buffer full");
542 - }
543 - i += xread (fd, y, 1);
544 - strcat (linebuf, y);
545 - }
546 -
547 -@@ -835,11 +835,11 @@
548 - char *line;
549 - int i = strlen (msg);
550 -
551 - do
552 - {
553 -- line = getline ();
554 -+ line = get_line ();
555 - }
556 - while (strncmp (line, msg, i) != 0 && strncmp (line, "5", 1) != 0);
557 -
558 - return (line);
559 - }
560 -@@ -919,11 +919,11 @@
561 - nostat = 0;
562 - putserv ("STAT .\n");
563 -
564 - while (strncmp (line, "213 ", 4) != 0)
565 - {
566 -- line = getline ();
567 -+ line = get_line ();
568 - tmp = getdir (line);
569 -
570 - if (tmp == NULL)
571 - continue;
572 - if (dirroot == NULL)
573 -@@ -1279,14 +1279,14 @@
574 - break;
575 - }
576 -
577 - string[tesopt.dirlen] = 0;
578 - putserv ("MKD %s\n", string);
579 -- getline ();
580 -+ get_line ();
581 -
582 - putserv ("CWD %s\n", string);
583 -- getline ();
584 -+ get_line ();
585 - }
586 -
587 - getpwd ();
588 - disp = 1;
589 -
590 -@@ -1318,11 +1318,11 @@
591 -
592 - if (strlen (string) < 20)
593 - err (0, "cwd string too short.. check for 0x0's.\n");
594 -
595 - putserv ("CWD %s\n", string);
596 -- getline ();
597 -+ get_line ();
598 -
599 - /************ jmpbuf ***********/
600 -
601 - if (debug > 0)
602 - printf ("Sending jmpbuf\n");
603 -@@ -1334,11 +1334,11 @@
604 - if (strlen (string) != 32)
605 - err (0, "jmpbuf string too short.. check for 0x0's.\n");
606 -
607 - putserv ("%s\n", string);
608 -
609 -- getline ();
610 -+ get_line ();
611 -
612 - return (1);
613 - }
614 -
615 - /* shell
616
617 diff --git a/net-misc/raccess/files/raccess-0.7-r1-asneeded.patch b/net-misc/raccess/files/raccess-0.7-r1-asneeded.patch
618 deleted file mode 100644
619 index 47ed0e1aa3..0000000000
620 --- a/net-misc/raccess/files/raccess-0.7-r1-asneeded.patch
621 +++ /dev/null
622 @@ -1,11 +0,0 @@
623 ---- src/Makefile.in.orig 2009-01-05 19:23:26.671861574 +0100
624 -+++ src/Makefile.in 2009-01-05 19:23:37.603959062 +0100
625 -@@ -83,7 +83,7 @@
626 - detectos.o remote_attack_module.o lookfor.o
627 - raccess_LDADD = $(LDADD)
628 - raccess_DEPENDENCIES =
629 --raccess_LDFLAGS = -lm
630 -+raccess_LDADD = -lm
631 - BINFILES = -DLOCATION_BIN_FILES=\"@bindir@\"
632 - CFGFILES = -DLOCATION_CONFIG_FILES=\"@sysconfdir@\"
633 - COMPILE = $(CC) $(DEFS) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) $(BINFILES) $(CFGFILES)
634
635 diff --git a/net-misc/raccess/metadata.xml b/net-misc/raccess/metadata.xml
636 deleted file mode 100644
637 index 6f49eba8f4..0000000000
638 --- a/net-misc/raccess/metadata.xml
639 +++ /dev/null
640 @@ -1,5 +0,0 @@
641 -<?xml version="1.0" encoding="UTF-8"?>
642 -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
643 -<pkgmetadata>
644 -<!-- maintainer-needed -->
645 -</pkgmetadata>
646
647 diff --git a/net-misc/raccess/raccess-0.7.ebuild b/net-misc/raccess/raccess-0.7.ebuild
648 deleted file mode 100644
649 index 82f90fad20..0000000000
650 --- a/net-misc/raccess/raccess-0.7.ebuild
651 +++ /dev/null
652 @@ -1,36 +0,0 @@
653 -# Copyright 1999-2012 Gentoo Foundation
654 -# Distributed under the terms of the GNU General Public License v2
655 -# $Id$
656 -
657 -inherit eutils toolchain-funcs multilib
658 -
659 -DESCRIPTION="Remote Access Session is an systems security analyzer"
660 -HOMEPAGE="http://salix.org/raccess/"
661 -SRC_URI="http://salix.org/raccess/${P}.tar.gz"
662 -
663 -LICENSE="GPL-2"
664 -SLOT="0"
665 -KEYWORDS="x86 sparc ~ppc ~amd64"
666 -IUSE=""
667 -
668 -DEPEND="net-libs/libpcap"
669 -RDEPEND=""
670 -
671 -src_unpack() {
672 - unpack ${A}
673 - cd "${S}"
674 - epatch "${FILESDIR}"/${P}-r1-asneeded.patch
675 - epatch "${FILESDIR}"/${P}-glibc210.patch
676 - sed -i '/^BINFILES/s:@bindir@:/usr/$(get_libdir)/raccess:' src/Makefile.in
677 - sed -i '/^bindir/s:@bindir@/exploits:/usr/$(get_libdir)/raccess:' exploits/Makefile.in
678 -}
679 -
680 -src_compile() {
681 - econf --sysconfdir=/etc/raccess
682 - emake CC="$(tc-getCC)" || die "emake failed"
683 -}
684 -
685 -src_install() {
686 - emake install DESTDIR="${D}" || die "emake install failed"
687 - dodoc AUTHORS ChangeLog NEWS PROJECT_PLANNING README
688 -}