⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 makefile

📁 基于TCP-WRAP原理的系统监控的c语言实现代码
💻
📖 第 1 页 / 共 3 页
字号:
##################################################### Optional: dealing with host name/address conflicts## By default, the software tries to protect against hosts that claim to# have someone elses host name. This is relevant for network services# whose authentication depends on host names, such as rsh and rlogin.## With paranoid mode on, connections will be rejected when the host name# does not match the host address. Connections will also be rejected when# the host name is available but cannot be verified.## Comment out the following definition if you want more control over such# requests. When paranoid mode is off and a host name double check fails,# the client can be matched with the PARANOID access control pattern.## Paranoid mode implies hostname lookup. In order to disable hostname# lookups altogether, see the next section.PARANOID= -DPARANOID######################################### Optional: turning off hostname lookups## By default, the software always attempts to look up the client# hostname.  With selective hostname lookups, the client hostname# lookup is postponed until the name is required by an access control# rule or by a %letter expansion.# # In order to perform selective hostname lookups, disable paranoid# mode (see previous section) and comment out the following definition.HOSTNAME= -DALWAYS_HOSTNAME############################################## Optional: Turning on host ADDRESS checking## Optionally, the software tries to protect against hosts that pretend to# have someone elses host address. This is relevant for network services# whose authentication depends on host names, such as rsh and rlogin,# because the network address is used to look up the remote host name.# # The protection is to refuse TCP connections with IP source routing# options.## This feature cannot be used with SunOS 4.x because of a kernel bug in# the implementation of the getsockopt() system call. Kernel panics have# been observed for SunOS 4.1.[1-3]. Symptoms are "BAD TRAP" and "Data# fault" while executing the tcp_ctloutput() kernel function.## Reportedly, Sun patch 100804-03 or 101790 fixes this for SunOS 4.1.x.## Uncomment the following macro definition if your getsockopt() is OK.## -DKILL_IP_OPTIONS is not needed on modern UNIX systems that can stop# source-routed traffic in the kernel. Examples: 4.4BSD derivatives,# Solaris 2.x, and Linux. See your system documentation for details.## KILL_OPT= -DKILL_IP_OPTIONS## End configuration options############################# Protection against weird shells or weird make programs.SHELL	= /bin/sh.c.o:;	$(CC) $(CFLAGS) -c $*.cCFLAGS	= -O -DFACILITY=$(FACILITY) $(ACCESS) $(PARANOID) $(NETGROUP) \	$(BUGS) $(SYSTYPE) $(AUTH) $(UMASK) \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" $(STYLE) $(KILL_OPT) \	-DSEVERITY=$(SEVERITY) -DRFC931_TIMEOUT=$(RFC931_TIMEOUT) \	$(UCHAR) $(TABLES) $(STRINGS) $(TLI) $(EXTRA_CFLAGS) $(DOT) \	$(VSYSLOG) $(HOSTNAME)LIB_OBJ= hosts_access.o options.o shell_cmd.o rfc931.o eval.o \	hosts_ctl.o refuse.o percent_x.o clean_exit.o $(AUX_OBJ) \	$(FROM_OBJ) fix_options.o socket.o tli.o workarounds.o \	update.o misc.o diag.o percent_m.o myvsyslog.oFROM_OBJ= fromhost.oKIT	= README miscd.c tcpd.c fromhost.c hosts_access.c shell_cmd.c \	tcpd.h tcpdmatch.c Makefile hosts_access.5 strcasecmp.c BLURB rfc931.c \	tcpd.8 eval.c hosts_access.3 hosts_ctl.c percent_x.c options.c \	clean_exit.c environ.c patchlevel.h fix_options.c workarounds.c \	socket.c tli.c DISCLAIMER fakelog.c safe_finger.c hosts_options.5 \	CHANGES try-from.c update.c ptx.c vfprintf.c tli-sequent.c \	tli-sequent.h misc.c diag.c ncr.c tcpdchk.c percent_m.c \	myvsyslog.c mystdarg.h printf.ck README.IRIX Banners.Makefile \	refuse.c tcpdchk.8 setenv.c inetcf.c inetcf.h scaffold.c \	scaffold.h tcpdmatch.8 README.NISLIB	= libwrap.aall other: config-check tcpd tcpdmatch try-from safe_finger tcpdchk# Invalidate all object files when the compiler options (CFLAGS) have changed.config-check:	@set +e; test -n "$(REAL_DAEMON_DIR)" || { make; exit 1; }	@set +e; echo $(CFLAGS) >/tmp/cflags.$$$$ ; \	if cmp cflags /tmp/cflags.$$$$ ; \	then rm /tmp/cflags.$$$$ ; \	else mv /tmp/cflags.$$$$ cflags ; \	fi >/dev/null 2>/dev/null$(LIB):	$(LIB_OBJ)	rm -f $(LIB)	$(AR) $(ARFLAGS) $(LIB) $(LIB_OBJ)	-$(RANLIB) $(LIB)tcpd:	tcpd.o $(LIB)	$(CC) $(CFLAGS) -o $@ tcpd.o $(LIB) $(LIBS)miscd:	miscd.o $(LIB)	$(CC) $(CFLAGS) -o $@ miscd.o $(LIB) $(LIBS)safe_finger: safe_finger.o $(LIB)	$(CC) $(CFLAGS) -o $@ safe_finger.o $(LIB) $(LIBS)TCPDMATCH_OBJ = tcpdmatch.o fakelog.o inetcf.o scaffold.otcpdmatch: $(TCPDMATCH_OBJ) $(LIB)	$(CC) $(CFLAGS) -o $@ $(TCPDMATCH_OBJ) $(LIB) $(LIBS)try-from: try-from.o fakelog.o $(LIB)	$(CC) $(CFLAGS) -o $@ try-from.o fakelog.o $(LIB) $(LIBS)TCPDCHK_OBJ = tcpdchk.o fakelog.o inetcf.o scaffold.otcpdchk: $(TCPDCHK_OBJ) $(LIB)	$(CC) $(CFLAGS) -o $@ $(TCPDCHK_OBJ) $(LIB) $(LIBS)shar:	$(KIT)	@shar $(KIT)kit:	$(KIT)	@makekit $(KIT)files:	@echo $(KIT)archive:	$(ARCHIVE) $(KIT)clean:	rm -f tcpd miscd safe_finger tcpdmatch tcpdchk try-from *.[oa] core \	cflagstidy:	clean	chmod -R a+r .	chmod 755 .# Enable all bells and whistles for linting.lint: tcpd_lint miscd_lint match_lint chk_linttcpd_lint:	lint -DFACILITY=LOG_MAIL -DHOSTS_ACCESS -DPARANOID -DNETGROUP \	-DGETPEERNAME_BUG -DDAEMON_UMASK=022 -DSEVERITY=$(SEVERITY) \	$(TABLES) -DKILL_IP_OPTIONS -DPROCESS_OPTIONS \	-DRFC931_TIMEOUT=$(RFC931_TIMEOUT) -DALWAYS_RFC931 \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" \	-Dvsyslog=myvsyslog \	tcpd.c fromhost.c socket.c tli.c hosts_access.c \	shell_cmd.c refuse.c rfc931.c eval.c percent_x.c clean_exit.c \	options.c setenv.c fix_options.c workarounds.c update.c misc.c \	diag.c myvsyslog.c percent_m.cmiscd_lint:	lint -DFACILITY=LOG_MAIL -DHOSTS_ACCESS -DPARANOID -DNETGROUP \	-DGETPEERNAME_BUG -DDAEMON_UMASK=022 -DSEVERITY=$(SEVERITY) \	$(TABLES) -DKILL_IP_OPTIONS -DPROCESS_OPTIONS \	-DRFC931_TIMEOUT=$(RFC931_TIMEOUT) -DALWAYS_RFC931 \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" \	-Dvsyslog=myvsyslog \	miscd.c fromhost.c socket.c tli.c hosts_access.c \	shell_cmd.c refuse.c rfc931.c eval.c percent_x.c clean_exit.c \	options.c setenv.c fix_options.c workarounds.c update.c misc.c \	diag.c myvsyslog.c percent_m.cmatch_lint:	lint -DFACILITY=LOG_MAIL -DSEVERITY=$(SEVERITY) -DHOSTS_ACCESS \	-DPARANOID $(TABLES) -DNETGROUP -DPROCESS_OPTIONS -DRFC931_TIMEOUT=10 \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" \	-Dvsyslog=myvsyslog \	tcpdmatch.c hosts_access.c eval.c percent_x.c options.c workarounds.c \	update.c socket.c misc.c diag.c myvsyslog.c percent_m.c setenv.c \	inetcf.c scaffold.cchk_lint:	lint -DFACILITY=LOG_MAIL -DSEVERITY=$(SEVERITY) -DHOSTS_ACCESS \	-DPARANOID $(TABLES) -DNETGROUP -DPROCESS_OPTIONS -DRFC931_TIMEOUT=10 \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" \	-Dvsyslog=myvsyslog \	tcpdchk.c eval.c percent_x.c options.c update.c workarounds.c \	setenv.c misc.c diag.c myvsyslog.c percent_m.c inetcf.c scaffold.cprintfck:	printfck -f printf.ck \	tcpd.c fromhost.c socket.c tli.c hosts_access.c \	shell_cmd.c refuse.c rfc931.c eval.c percent_x.c clean_exit.c \	options.c setenv.c fix_options.c workarounds.c update.c misc.c \	diag.c myvsyslog.c percent_m.c >aap.c	lint -DFACILITY=LOG_MAIL -DHOSTS_ACCESS -DPARANOID -DNETGROUP \	-DGETPEERNAME_BUG -DDAEMON_UMASK=022 -DSEVERITY=$(SEVERITY) \	$(TABLES) -DKILL_IP_OPTIONS -DPROCESS_OPTIONS \	-DRFC931_TIMEOUT=$(RFC931_TIMEOUT) -DALWAYS_RFC931 \	-DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\" -Dvsyslog=myvsyslog aap.c	printfck -f printf.ck \	tcpdchk.c eval.c percent_x.c options.c update.c workarounds.c \	setenv.c misc.c diag.c myvsyslog.c percent_m.c inetcf.c scaffold.c \	>aap.c	lint -DFACILITY=LOG_MAIL -DSEVERITY=$(SEVERITY) -DHOSTS_ACCESS \	-DPARANOID $(TABLES) -DNETGROUP -DPROCESS_OPTIONS -DRFC931_TIMEOUT=10 \	-Dvsyslog=myvsyslog -DREAL_DAEMON_DIR=\"$(REAL_DAEMON_DIR)\"# Internal compilation dependencies.clean_exit.o: cflagsclean_exit.o: tcpd.hdiag.o: cflagsdiag.o: mystdarg.hdiag.o: tcpd.henviron.o: cflagseval.o: cflagseval.o: tcpd.hfakelog.o: cflagsfakelog.o: mystdarg.hfix_options.o: cflagsfix_options.o: tcpd.hfromhost.o: cflagsfromhost.o: tcpd.hhosts_access.o: cflagshosts_access.o: tcpd.hhosts_ctl.o: cflagshosts_ctl.o: tcpd.hinetcf.o: cflagsinetcf.o: inetcf.hinetcf.o: tcpd.hmisc.o: cflagsmisc.o: tcpd.hmiscd.o: cflagsmiscd.o: patchlevel.hmiscd.o: tcpd.hmyvsyslog.o: cflagsmyvsyslog.o: mystdarg.hmyvsyslog.o: tcpd.hncr.o: cflagsncr.o: tcpd.hoptions.o: cflagsoptions.o: tcpd.hpercent_m.o: cflagspercent_m.o: mystdarg.hpercent_x.o: cflagspercent_x.o: tcpd.hptx.o: cflagsptx.o: tcpd.hrefuse.o: cflagsrefuse.o: tcpd.hrfc931.o: cflagsrfc931.o: tcpd.hsafe_finger.o: cflagsscaffold.o: cflagsscaffold.o: scaffold.hscaffold.o: tcpd.hsetenv.o: cflagsshell_cmd.o: cflagsshell_cmd.o: tcpd.hsocket.o: cflagssocket.o: tcpd.hstrcasecmp.o: cflagstcpd.o: cflagstcpd.o: patchlevel.htcpd.o: tcpd.htcpdchk.o: cflagstcpdchk.o: inetcf.htcpdchk.o: scaffold.htcpdchk.o: tcpd.htcpdmatch.o: cflagstcpdmatch.o: scaffold.htcpdmatch.o: tcpd.htli-sequent.o: cflagstli-sequent.o: tcpd.htli-sequent.o: tli-sequent.htli.o: cflagstli.o: tcpd.htry-from.o: cflagstry-from.o: tcpd.hupdate.o: cflagsupdate.o: mystdarg.hupdate.o: tcpd.hvfprintf.o: cflagsworkarounds.o: cflagsworkarounds.o: tcpd.h

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -