Found a sparc64... it works there too.

On 2/9/06, Chris Kuethe <[EMAIL PROTECTED]> wrote:
> It may be too late, but this works for me on i386. Don't have any
> sparc64 boxen handy right now.
>
> (because everything else i use seems to be working right ... so far)
>
> On 2/9/06, Okan Demirmen <[EMAIL PROTECTED]> wrote:
> > ok, completely understand if this is too late, but 4.01 if interested.
> >
> > for ref: http://www.insecure.org/nmap/changelog.html
> >
> > Index: Makefile
> > ===================================================================
> > RCS file: /cvs/ports/net/nmap/Makefile,v
> > retrieving revision 1.60
> > diff -u -r1.60 Makefile
> > --- Makefile    16 Jan 2006 17:08:57 -0000      1.60
> > +++ Makefile    10 Feb 2006 04:27:17 -0000
> > @@ -2,8 +2,7 @@
> >
> >  COMMENT=       "scan ports and fingerprint stack of network hosts"
> >
> > -DISTNAME=      nmap-3.95
> > -PKGNAME=       ${DISTNAME}p0
> > +DISTNAME=      nmap-4.01
> >  CATEGORIES=    net security
> >  MASTER_SITES=  ${HOMEPAGE}dist/
> >  EXTRACT_SUFX=  .tgz
> > Index: distinfo
> > ===================================================================
> > RCS file: /cvs/ports/net/nmap/distinfo,v
> > retrieving revision 1.10
> > diff -u -r1.10 distinfo
> > --- distinfo    17 Dec 2005 15:47:12 -0000      1.10
> > +++ distinfo    10 Feb 2006 04:27:17 -0000
> > @@ -1,4 +1,4 @@
> > -MD5 (nmap-3.95.tgz) = 8aab9467378cb71ed767a863ecde58c4
> > -RMD160 (nmap-3.95.tgz) = 2ca183fdb4f9eeae34ae174e3de3fc2ae130a9a9
> > -SHA1 (nmap-3.95.tgz) = edc4995bff75fb9b0c208f2f73bda188429a9825
> > -SIZE (nmap-3.95.tgz) = 2428629
> > +MD5 (nmap-4.01.tgz) = 76e1a458e042d3f89de57a60936f4888
> > +RMD160 (nmap-4.01.tgz) = 68fa28f6e84c08850f48f53d56dd40d644750410
> > +SHA1 (nmap-4.01.tgz) = f66f5309f79ad0df8b2f92eadb94638ca8f7795c
> > +SIZE (nmap-4.01.tgz) = 2388948
> >
> >
>
>
> --
> GDB has a 'break' feature; why doesn't it have 'fix' too?
>


--
GDB has a 'break' feature; why doesn't it have 'fix' too?

Reply via email to