##
## nmap.spec -- OpenPKG RPM Specification
## Copyright (c) 2000-2002 Cable & Wireless Deutschland GmbH
## Copyright (c) 2000-2002 The OpenPKG Project
## Copyright (c) 2000-2002 Ralf S. Engelschall
##
## Permission to use, copy, modify, and distribute this software for
## any purpose with or without fee is hereby granted, provided that
## the above copyright notice and this permission notice appear in all
## copies.
##
## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
## SUCH DAMAGE.
##
%define V_real 2.54BETA30
%define V_ours 2.54b30
# package information
Name: nmap
Summary: Network Mapping Tool
URL: http://www.insecure.org/nmap/
Vendor: Fyodor
Packager: The OpenPKG Project
Distribution: OpenPKG [REL]
Group: Net
License: GPL
Version: %{V_ours}
Release: 20020206
# list of sources
Source0: http://www.insecure.org/nmap/dist/nmap-%{V_real}.tgz
# build information
Prefix: %{l_prefix}
BuildRoot: %{l_buildroot}
BuildPreReq: OpenPKG, openpkg >= 20020206
PreReq: OpenPKG, openpkg >= 20020206
AutoReq: no
AutoReqProv: no
%description
nmap is a utility for port scanning large networks, although it
works fine for single hosts. The guiding philosophy for the creation
of nmap was TMTOWTDI (There's More Than One Way To Do It). This is
the Perl slogan, but it is equally applicable to scanners. Sometimes
you need speed, other times you may need stealth. In some cases,
bypassing firewalls may be required. Not to mention the fact that
you may want to scan different protocols (UDP, TCP, ICMP, etc.). You
just can't do all this with one scanning mode. And you don't want to
have 10 different scanners around, all with different interfaces and
capabilities. Thus I incorporated virtually every scanning technique
I know into nmap.
%prep
%setup -q -n nmap-%{V_real}
%build
%{l_shtool} subst -e "s;nmapfe;;g" configure
%{l_shtool} subst -e "s;nmapfe/nmapfe;;g" Makefile.in
CC="%{l_cc}" \
CFLAGS="%{l_cflags -O}" \
./configure \
--prefix=%{l_prefix}
%{l_make} %{l_mflags -O}
%install
rm -rf $RPM_BUILD_ROOT
%{l_make} %{l_mflags} install prefix=$RPM_BUILD_ROOT%{l_prefix}
rm -rf $RPM_BUILD_ROOT%{l_prefix}/share/gnome
strip $RPM_BUILD_ROOT%{l_prefix}/bin/* >/dev/null 2>&1 || true
%{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
%files -f files
%clean
rm -rf $RPM_BUILD_ROOT