Date: Tue, 13 Dec 2005 10:11:13 +0100 From: VANHULLEBUS Yvan <vanhu@netasq.com> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/90326: [patch] port security/ipsec-tools: Upgrade to 0.6.4 Message-ID: <20051213091113.GA48618@yvan.netasq.int> Resent-Message-ID: <200512130920.jBD9K3qv060832@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 90326 >Category: ports >Synopsis: [patch] port security/ipsec-tools: Upgrade to 0.6.4 >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Tue Dec 13 09:20:02 GMT 2005 >Closed-Date: >Last-Modified: >Originator: VANHULLEBUS Yvan >Release: FreeBSD 4.11-RELEASE-p11 i386 >Organization: NETASQ >Environment: System: FreeBSD vanhu.netasq.com 4.11-RELEASE-p11 FreeBSD 4.11-RELEASE-p11 #3: Wed Sep 14 13:57:07 CEST 2005 root@vanhu.netasq.com:/usr/src/sys/compile/vanhu i386 >Description: Version 0.6.4 of ipsec-tools is out. The main update is the backport of a workaround for systems which does not support %zu printf format, which is the case for FreeBSD 4. So this update should solve pr 89599. The patch for session.c is a workaround because there has been a regression in 0.6.4 for some specific configurations (will be fixed for 0.6.5). >How-To-Repeat: >Fix: diff -burpN /usr/ports/security/ipsec-tools/Makefile ipsec-tools/Makefile --- /usr/ports/security/ipsec-tools/Makefile Mon Dec 5 16:54:00 2005 +++ ipsec-tools/Makefile Sun Dec 11 12:15:05 2005 @@ -11,7 +11,7 @@ # - $LOCALBASE/sbin/setkey Vs /usr/sbin/setkey PORTNAME= ipsec-tools -PORTVERSION= 0.6.3 +PORTVERSION= 0.6.4 CATEGORIES= security net MASTER_SITES= ${MASTER_SITE_SOURCEFORGE} MASTER_SITE_SUBDIR= ipsec-tools diff -burpN /usr/ports/security/ipsec-tools/distinfo ipsec-tools/distinfo --- /usr/ports/security/ipsec-tools/distinfo Wed Nov 23 12:00:57 2005 +++ ipsec-tools/distinfo Sun Dec 11 12:15:06 2005 @@ -1,3 +1,3 @@ -SHA256 (ipsec-tools-0.6.3.tar.bz2) = b5755278226d7ca7fecddc50ecd78ec98b0551d11977c8739466709fea3584da -MD5 (ipsec-tools-0.6.3.tar.bz2) = 8070f90402919d8d313c32c2ee465b2f -SIZE (ipsec-tools-0.6.3.tar.bz2) = 664796 +SHA256 (ipsec-tools-0.6.4.tar.bz2) = 8c49044caaef39302968c9288760a58c39139814ba12510b66724f0ce6d17127 +MD5 (ipsec-tools-0.6.4.tar.bz2) = d0242a943c82c0cbf28005966ff35e21 +SIZE (ipsec-tools-0.6.4.tar.bz2) = 661573 diff -burpN /usr/ports/security/ipsec-tools/files/patch-racoon-session.c ipsec-tools/files/patch-racoon-session.c --- /usr/ports/security/ipsec-tools/files/patch-racoon-session.c Thu Jan 1 01:00:00 1970 +++ ipsec-tools/files/patch-racoon-session.c Tue Dec 13 09:54:00 2005 @@ -0,0 +1,11 @@ +--- src/racoon/session.c.orig Tue Dec 13 09:53:34 2005 ++++ src/racoon/session.c Tue Dec 13 09:53:38 2005 +@@ -320,7 +320,7 @@ signal_handler(sig) + int sig; + { + switch (sig) { +-#if 0 ++#if 1 + /* + * Is this code section actually usefull? On some systems, the + * wait() called during a signal handler may lead to race >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051213091113.GA48618>