ports/90326: [patch] port security/ipsec-tools: Upgrade to 0.6.4

VANHULLEBUS Yvan vanhu at netasq.com
Tue Dec 13 09:20:22 UTC 2005


>Number:         90326
>Category:       ports
>Synopsis:       [patch] port security/ipsec-tools: Upgrade to 0.6.4
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Tue Dec 13 09:20:02 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator:     VANHULLEBUS Yvan
>Release:        FreeBSD 4.11-RELEASE-p11 i386
>Organization:
NETASQ
>Environment:
System: FreeBSD vanhu.netasq.com 4.11-RELEASE-p11 FreeBSD 4.11-RELEASE-p11 #3: Wed Sep 14 13:57:07 CEST 2005 root at vanhu.netasq.com:/usr/src/sys/compile/vanhu i386


	
>Description:
Version 0.6.4 of ipsec-tools is out.
The main update is the backport of a workaround for systems which does
not support %zu printf format, which is the case for FreeBSD 4.

So this update should solve pr 89599.

The patch for session.c is a workaround because there has been a
regression in 0.6.4 for some specific configurations (will be fixed
for 0.6.5).


>How-To-Repeat:
	
>Fix:
diff -burpN /usr/ports/security/ipsec-tools/Makefile ipsec-tools/Makefile
--- /usr/ports/security/ipsec-tools/Makefile	Mon Dec  5 16:54:00 2005
+++ ipsec-tools/Makefile	Sun Dec 11 12:15:05 2005
@@ -11,7 +11,7 @@
 #       - $LOCALBASE/sbin/setkey Vs /usr/sbin/setkey
 
 PORTNAME=	ipsec-tools
-PORTVERSION=	0.6.3
+PORTVERSION=	0.6.4
 CATEGORIES=	security net
 MASTER_SITES=	${MASTER_SITE_SOURCEFORGE}
 MASTER_SITE_SUBDIR=	ipsec-tools
diff -burpN /usr/ports/security/ipsec-tools/distinfo ipsec-tools/distinfo
--- /usr/ports/security/ipsec-tools/distinfo	Wed Nov 23 12:00:57 2005
+++ ipsec-tools/distinfo	Sun Dec 11 12:15:06 2005
@@ -1,3 +1,3 @@
-SHA256 (ipsec-tools-0.6.3.tar.bz2) = b5755278226d7ca7fecddc50ecd78ec98b0551d11977c8739466709fea3584da
-MD5 (ipsec-tools-0.6.3.tar.bz2) = 8070f90402919d8d313c32c2ee465b2f
-SIZE (ipsec-tools-0.6.3.tar.bz2) = 664796
+SHA256 (ipsec-tools-0.6.4.tar.bz2) = 8c49044caaef39302968c9288760a58c39139814ba12510b66724f0ce6d17127
+MD5 (ipsec-tools-0.6.4.tar.bz2) = d0242a943c82c0cbf28005966ff35e21
+SIZE (ipsec-tools-0.6.4.tar.bz2) = 661573
diff -burpN /usr/ports/security/ipsec-tools/files/patch-racoon-session.c ipsec-tools/files/patch-racoon-session.c
--- /usr/ports/security/ipsec-tools/files/patch-racoon-session.c	Thu Jan  1 01:00:00 1970
+++ ipsec-tools/files/patch-racoon-session.c	Tue Dec 13 09:54:00 2005
@@ -0,0 +1,11 @@
+--- src/racoon/session.c.orig	Tue Dec 13 09:53:34 2005
++++ src/racoon/session.c	Tue Dec 13 09:53:38 2005
+@@ -320,7 +320,7 @@ signal_handler(sig)
+ 	int sig;
+ {
+ 	switch (sig) {
+-#if 0
++#if 1
+ 	/*
+ 	 * Is this code section actually usefull? On some systems, the
+ 	 * wait() called during a signal handler may lead to race 
>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list