openbsd-ports/net/socat/patches/patch-doc_socat_1

44 lines
1.8 KiB
Plaintext

$OpenBSD: patch-doc_socat_1,v 1.6 2014/04/24 15:17:08 sthen Exp $
--- doc/socat.1.orig Sun Mar 9 20:23:08 2014
+++ doc/socat.1 Sat Apr 19 17:49:36 2014
@@ -2884,10 +2884,6 @@ in this file\&.
Specifies the directory with the trusted (root) certificates\&. The directory
must contain certificates in PEM format and their hashes (see OpenSSL
documentation)
-.IP "\fB\f(CWegd=<filename>\fP\fP"
-On some systems, openssl requires an explicit source of random data\&. Specify
-the socket name where an entropy gathering daemon like egd provides random
-data, e\&.g\&. /dev/egd\-pool\&.
.IP "\fB\f(CWpseudo\fP\fP"
On systems where openssl cannot find an entropy source and where no entropy
gathering daemon can be utilized, this option activates a mechanism for
@@ -3365,11 +3361,11 @@ connection, invokes a shell\&. This shell has its stdi
connected to the TCP socket (nofork)\&. The shell starts filan and lets it print the socket addresses to
stderr (your terminal window)\&.
.IP
-.IP "\fB\f(CWecho \-e \(dq\&\e0\e14\e0\e0\ec\(dq\& |socat \-u \- file:/usr/bin/squid\&.exe,seek=0x00074420\fP\fP"
+.IP "\fB\f(CWecho \-e \(dq\&\e0\e14\e0\e0\ec\(dq\& |socat \-u \- file:${LOCALBASE}/bin/squid\&.exe,seek=0x00074420\fP\fP"
.IP
functions as primitive binary editor: it writes the 4 bytes 000 014 000 000 to
-the executable /usr/bin/squid at offset 0x00074420 (this is a real world patch
+the executable ${LOCALBASE}/bin/squid at offset 0x00074420 (this is a real world patch
to make the squid executable from Cygwin run under Windows, actual per May 2004)\&.
.IP
.IP "\fB\f(CWsocat \- tcp:www\&.blackhat\&.org:31337,readbytes=1000\fP\fP"
@@ -3492,11 +3488,11 @@ error\&.
.SH "FILES"
.PP
-/usr/bin/socat
+${LOCALBASE}/bin/socat
.br
-/usr/bin/filan
+${LOCALBASE}/bin/filan
.br
-/usr/bin/procan
+${LOCALBASE}/bin/procan
.PP
.SH "ENVIRONMENT VARIABLES"