From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Dec 13 09:20:22 2005 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B222D16A420 for ; Tue, 13 Dec 2005 09:20:22 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 68FA243D80 for ; Tue, 13 Dec 2005 09:20:04 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id jBD9K3uQ060836 for ; Tue, 13 Dec 2005 09:20:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id jBD9K3qv060832; Tue, 13 Dec 2005 09:20:03 GMT (envelope-from gnats) Resent-Date: Tue, 13 Dec 2005 09:20:03 GMT Resent-Message-Id: <200512130920.jBD9K3qv060832@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, VANHULLEBUS Yvan Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 6372E16A420 for ; Tue, 13 Dec 2005 09:11:16 +0000 (GMT) (envelope-from yvan.vanhullebus@netasq.com) Received: from smtp.netasq.com (netasq.netasq.com [213.30.137.178]) by mx1.FreeBSD.org (Postfix) with ESMTP id C64EB43D64 for ; Tue, 13 Dec 2005 09:11:15 +0000 (GMT) (envelope-from yvan.vanhullebus@netasq.com) Received: from [10.2.0.4] (f1000c001440400601.netasq.com [10.0.0.126]) by smtp.netasq.com (Postfix) with ESMTP id 08540C9184 for ; Tue, 13 Dec 2005 10:08:41 +0100 (CET) Received: by yvan.netasq.int (Postfix, from userid 1000) id 3ECE754BD; Tue, 13 Dec 2005 10:11:13 +0100 (CET) Message-Id: <20051213091113.GA48618@yvan.netasq.int> Date: Tue, 13 Dec 2005 10:11:13 +0100 From: VANHULLEBUS Yvan To: FreeBSD-gnats-submit@FreeBSD.org Cc: Subject: ports/90326: [patch] port security/ipsec-tools: Upgrade to 0.6.4 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: VANHULLEBUS Yvan List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Dec 2005 09:20:22 -0000 >Number: 90326 >Category: ports >Synopsis: [patch] port security/ipsec-tools: Upgrade to 0.6.4 >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Tue Dec 13 09:20:02 GMT 2005 >Closed-Date: >Last-Modified: >Originator: VANHULLEBUS Yvan >Release: FreeBSD 4.11-RELEASE-p11 i386 >Organization: NETASQ >Environment: System: FreeBSD vanhu.netasq.com 4.11-RELEASE-p11 FreeBSD 4.11-RELEASE-p11 #3: Wed Sep 14 13:57:07 CEST 2005 root@vanhu.netasq.com:/usr/src/sys/compile/vanhu i386 >Description: Version 0.6.4 of ipsec-tools is out. The main update is the backport of a workaround for systems which does not support %zu printf format, which is the case for FreeBSD 4. So this update should solve pr 89599. The patch for session.c is a workaround because there has been a regression in 0.6.4 for some specific configurations (will be fixed for 0.6.5). >How-To-Repeat: >Fix: diff -burpN /usr/ports/security/ipsec-tools/Makefile ipsec-tools/Makefile --- /usr/ports/security/ipsec-tools/Makefile Mon Dec 5 16:54:00 2005 +++ ipsec-tools/Makefile Sun Dec 11 12:15:05 2005 @@ -11,7 +11,7 @@ # - $LOCALBASE/sbin/setkey Vs /usr/sbin/setkey PORTNAME= ipsec-tools -PORTVERSION= 0.6.3 +PORTVERSION= 0.6.4 CATEGORIES= security net MASTER_SITES= ${MASTER_SITE_SOURCEFORGE} MASTER_SITE_SUBDIR= ipsec-tools diff -burpN /usr/ports/security/ipsec-tools/distinfo ipsec-tools/distinfo --- /usr/ports/security/ipsec-tools/distinfo Wed Nov 23 12:00:57 2005 +++ ipsec-tools/distinfo Sun Dec 11 12:15:06 2005 @@ -1,3 +1,3 @@ -SHA256 (ipsec-tools-0.6.3.tar.bz2) = b5755278226d7ca7fecddc50ecd78ec98b0551d11977c8739466709fea3584da -MD5 (ipsec-tools-0.6.3.tar.bz2) = 8070f90402919d8d313c32c2ee465b2f -SIZE (ipsec-tools-0.6.3.tar.bz2) = 664796 +SHA256 (ipsec-tools-0.6.4.tar.bz2) = 8c49044caaef39302968c9288760a58c39139814ba12510b66724f0ce6d17127 +MD5 (ipsec-tools-0.6.4.tar.bz2) = d0242a943c82c0cbf28005966ff35e21 +SIZE (ipsec-tools-0.6.4.tar.bz2) = 661573 diff -burpN /usr/ports/security/ipsec-tools/files/patch-racoon-session.c ipsec-tools/files/patch-racoon-session.c --- /usr/ports/security/ipsec-tools/files/patch-racoon-session.c Thu Jan 1 01:00:00 1970 +++ ipsec-tools/files/patch-racoon-session.c Tue Dec 13 09:54:00 2005 @@ -0,0 +1,11 @@ +--- src/racoon/session.c.orig Tue Dec 13 09:53:34 2005 ++++ src/racoon/session.c Tue Dec 13 09:53:38 2005 +@@ -320,7 +320,7 @@ signal_handler(sig) + int sig; + { + switch (sig) { +-#if 0 ++#if 1 + /* + * Is this code section actually usefull? On some systems, the + * wait() called during a signal handler may lead to race >Release-Note: >Audit-Trail: >Unformatted: