[openswan] New upstream release openswan-2.6.34 Fixes 716145: Openswan Failed To Build From Source against the

avesh agarwal avesh at fedoraproject.org
Tue Jun 28 15:52:31 UTC 2011


commit 9ecd86ec74f9a32bca4cebeb597ae1524df9cfa4
Author: Avesh Agarwal <avagarwa at redhat.com>
Date:   Tue Jun 28 11:52:20 2011 -0400

    New upstream release openswan-2.6.34
    Fixes 716145: Openswan Failed To Build From Source against
    the rawhide tree
    Fixes 712037: new upstream release
    Fixes 709273: Local patch for #600174 adds bogus addresses and routes

 .gitignore                              |    1 +
 openswan-2.6-relpath.patch              |   12 +-
 openswan-600167.patch                   |  293 ------------------------------
 openswan-600174.patch                   |   21 ---
 openswan-cisco-704118.patch             |  294 +++++++++++++++++++++++++++++++
 openswan-ipsec-help-524146-509318.patch |    6 +-
 openswan.spec                           |   37 +++-
 sources                                 |    3 +-
 8 files changed, 332 insertions(+), 335 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 9d483e4..b3ae64c 100644
--- a/.gitignore
+++ b/.gitignore
@@ -20,3 +20,4 @@ openswan-2.6.28.tar.gz
 /openswan-2.6.31.tar.gz
 /openswan-2.6.32.tar.gz
 /openswan-2.6.32.tar.gz.asc
+/openswan-2.6.34.tar.gz
diff --git a/openswan-2.6-relpath.patch b/openswan-2.6-relpath.patch
index 7d98edc..def018d 100644
--- a/openswan-2.6-relpath.patch
+++ b/openswan-2.6-relpath.patch
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.32-orig/Makefile.inc openswan-2.6.32-cvs-patched/Makefile.inc
---- openswan-2.6.32-orig/Makefile.inc	2010-12-20 12:44:19.113079987 -0500
-+++ openswan-2.6.32-cvs-patched/Makefile.inc	2010-12-20 12:51:03.383330043 -0500
+diff -urNp openswan-2.6.34-orig/Makefile.inc openswan-2.6.34-cvs-patched/Makefile.inc
+--- openswan-2.6.34-orig/Makefile.inc	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/Makefile.inc	2011-06-28 11:09:44.620359574 -0400
 @@ -123,6 +123,8 @@ FINALRCDIR?=$(shell for d in $(INC_RCDIR
  		do if test -d $(DESTDIR)/$$d ; \
  		then echo $$d ; exit 0 ; \
@@ -10,9 +10,9 @@ diff -urNp openswan-2.6.32-orig/Makefile.inc openswan-2.6.32-cvs-patched/Makefil
  RCDIR?=$(DESTDIR)$(FINALRCDIR)
  
  
-diff -urNp openswan-2.6.32-orig/programs/setup/Makefile openswan-2.6.32-cvs-patched/programs/setup/Makefile
---- openswan-2.6.32-orig/programs/setup/Makefile	2010-12-20 12:44:19.124080258 -0500
-+++ openswan-2.6.32-cvs-patched/programs/setup/Makefile	2010-12-20 12:51:46.128322171 -0500
+diff -urNp openswan-2.6.34-orig/programs/setup/Makefile openswan-2.6.34-cvs-patched/programs/setup/Makefile
+--- openswan-2.6.34-orig/programs/setup/Makefile	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/setup/Makefile	2011-06-28 11:10:02.954193631 -0400
 @@ -37,7 +37,7 @@ doinstall:: $(PROGRAM) $(CONFFILES) $(EX
  	@mkdir -p $(RCDIR) $(BINDIR)
  	# install and link everything
diff --git a/openswan-cisco-704118.patch b/openswan-cisco-704118.patch
new file mode 100644
index 0000000..57d7337
--- /dev/null
+++ b/openswan-cisco-704118.patch
@@ -0,0 +1,294 @@
+diff -urNp openswan-2.6.34-orig/programs/pluto/connections.c openswan-2.6.34-cvs-patched/programs/pluto/connections.c
+--- openswan-2.6.34-orig/programs/pluto/connections.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/connections.c	2011-06-28 11:14:16.583893599 -0400
+@@ -222,7 +222,7 @@ delete_end(struct connection *c UNUSED, 
+     pfreeany(e->host_addr_name);
+ }
+ 
+-static void
++void
+ delete_sr(struct connection *c, struct spd_route *sr)
+ {
+     delete_end(c, sr, &sr->this);
+diff -urNp openswan-2.6.34-orig/programs/pluto/connections.h openswan-2.6.34-cvs-patched/programs/pluto/connections.h
+--- openswan-2.6.34-orig/programs/pluto/connections.h	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/connections.h	2011-06-28 11:14:34.286732473 -0400
+@@ -304,6 +304,7 @@ extern void release_connection(struct co
+ extern void delete_connection(struct connection *c, bool relations);
+ extern void delete_connections_by_name(const char *name, bool strict);
+ extern void delete_every_connection(void);
++extern void delete_sr(struct connection *c, struct spd_route *sr);
+ extern char *add_group_instance(struct connection *group, const ip_subnet *target);
+ extern void remove_group_instance(const struct connection *group, const char *name);
+ extern void release_dead_interfaces(void);
+diff -urNp openswan-2.6.34-orig/programs/pluto/ikev1_aggr.c openswan-2.6.34-cvs-patched/programs/pluto/ikev1_aggr.c
+--- openswan-2.6.34-orig/programs/pluto/ikev1_aggr.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/ikev1_aggr.c	2011-06-28 11:15:28.105240612 -0400
+@@ -1183,7 +1183,7 @@ aggr_outI1_tail(struct pluto_crypto_req_
+ 	}
+ #endif
+ 	
+-	if (!nat_traversal_insert_vid(np, &md->rbody)) {
++	if (!nat_traversal_insert_vid(np, &md->rbody, st)) {
+ 	    reset_cur_state();
+ 	    return STF_INTERNAL_ERROR;
+ 	}
+diff -urNp openswan-2.6.34-orig/programs/pluto/ikev1_main.c openswan-2.6.34-cvs-patched/programs/pluto/ikev1_main.c
+--- openswan-2.6.34-orig/programs/pluto/ikev1_main.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/ikev1_main.c	2011-06-28 11:15:43.311102352 -0400
+@@ -216,7 +216,7 @@ main_outI1(int whack_sock
+ 	int np = --numvidtosend > 0 ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE;
+ 	
+ 	/* Add supported NAT-Traversal VID */
+-	if (!nat_traversal_insert_vid(np, &md.rbody)) {
++	if (!nat_traversal_insert_vid(np, &md.rbody, st)) {
+ 	    reset_cur_state();
+ 	    return STF_INTERNAL_ERROR;
+ 	}
+diff -urNp openswan-2.6.34-orig/programs/pluto/kernel.c openswan-2.6.34-cvs-patched/programs/pluto/kernel.c
+--- openswan-2.6.34-orig/programs/pluto/kernel.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/kernel.c	2011-06-28 11:16:54.142454550 -0400
+@@ -436,6 +436,7 @@ fmt_common_shell_out(char *buf, int blen
+ #endif
+ 		    "%s "           /* PLUTO_MY_SRCIP - if any */
+ #ifdef XAUTH
++		    "PLUTO_IS_PEER_CISCO='%u' "
+ 		    "PLUTO_CISCO_DNS_INFO='%s' "
+ 		    "PLUTO_CISCO_DOMAIN_INFO='%s' "
+ 		    "PLUTO_PEER_BANNER='%s' "
+@@ -472,6 +473,7 @@ fmt_common_shell_out(char *buf, int blen
+ #endif
+ 		    , srcip_str
+ #ifdef XAUTH
++		    , c->remotepeertype
+ 		    , c->cisco_dns_info ? c->cisco_dns_info : ""
+ 		    , c->cisco_domain_info ? c->cisco_domain_info : ""
+ 		    , c->cisco_banner ? c->cisco_banner : ""
+diff -urNp openswan-2.6.34-orig/programs/pluto/nat_traversal.c openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.c
+--- openswan-2.6.34-orig/programs/pluto/nat_traversal.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.c	2011-06-28 11:17:13.280280126 -0400
+@@ -198,7 +198,7 @@ static void _natd_hash(const struct hash
+  *
+  * Used when we're Initiator
+  */
+-bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs)
++bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs, struct state *st)
+ {
+ 	bool r = TRUE;
+ 	DBG(DBG_NATT
+@@ -207,6 +207,9 @@ bool nat_traversal_insert_vid(u_int8_t n
+ 		      , nat_traversal_support_non_ike));
+ 		      
+ 	if (nat_traversal_support_port_floating) {
++	    if (st->st_connection->remotepeertype == CISCO) {
++	    if (r) r = out_vid(np, outs, VID_NATT_RFC);
++	    } else {
+ 	    if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_RFC);
+ 	    if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_IETF_05);
+ 	    if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_IETF_03);
+@@ -214,8 +217,9 @@ bool nat_traversal_insert_vid(u_int8_t n
+ 	    if (r)
+ 		r = out_vid(nat_traversal_support_non_ike ? ISAKMP_NEXT_VID : np,
+ 			outs, VID_NATT_IETF_02);
++	    }
+ 	}
+-	if (nat_traversal_support_non_ike) {
++	if (nat_traversal_support_non_ike && st->st_connection->remotepeertype != CISCO) {
+ 	    if (r) r = out_vid(np, outs, VID_NATT_IETF_00);
+ 	}
+ 	return r;
+diff -urNp openswan-2.6.34-orig/programs/pluto/nat_traversal.h openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.h
+--- openswan-2.6.34-orig/programs/pluto/nat_traversal.h	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.h	2011-06-28 11:17:24.523176911 -0400
+@@ -129,7 +129,7 @@ extern int nat_traversal_espinudp_socket
+  */
+ #ifndef PB_STREAM_UNDEFINED
+ bool nat_traversal_add_vid(u_int8_t np, pb_stream *outs);
+-bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs);
++bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs, struct state *st);
+ #endif
+ u_int32_t nat_traversal_vid_to_method(unsigned short nat_t_vid);
+ 
+diff -urNp openswan-2.6.34-orig/programs/pluto/spdb_v1_struct.c openswan-2.6.34-cvs-patched/programs/pluto/spdb_v1_struct.c
+--- openswan-2.6.34-orig/programs/pluto/spdb_v1_struct.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/spdb_v1_struct.c	2011-06-28 11:18:07.821779560 -0400
+@@ -1527,7 +1527,7 @@ parse_ipsec_transform(struct isakmp_tran
+ 		    case SA_LIFE_TYPE_SECONDS:
+ 			/* silently limit duration to our maximum */
+ 			attrs->life_seconds = val <= SA_LIFE_DURATION_MAXIMUM
+-			    ? val : SA_LIFE_DURATION_MAXIMUM;
++			    ? (val < st->st_connection->sa_ipsec_life_seconds ? val : st->st_connection->sa_ipsec_life_seconds) : SA_LIFE_DURATION_MAXIMUM;
+ 			break;
+ 		    case SA_LIFE_TYPE_KBYTES:
+ 			attrs->life_kilobytes = val;
+@@ -1593,7 +1593,13 @@ parse_ipsec_transform(struct isakmp_tran
+ 					loglog(RC_LOG_SERIOUS,
+ 						"%s must only be used with old IETF drafts",
+ 						enum_name(&enc_mode_names, val));
++					if(st->st_connection->remotepeertype == CISCO) {
++					DBG_log( "Allowing, as this may be due to rekey");
++					attrs->encapsulation = val - ENCAPSULATION_MODE_UDP_TUNNEL_DRAFTS + ENCAPSULATION_MODE_TUNNEL;
++					}
++					else {
+ 					return FALSE;
++					}
+ 				}
+ 				else if (st->hidden_variables.st_nat_traversal & NAT_T_DETECTED) {
+ 					attrs->encapsulation = val - ENCAPSULATION_MODE_UDP_TUNNEL_DRAFTS + ENCAPSULATION_MODE_TUNNEL;
+diff -urNp openswan-2.6.34-orig/programs/pluto/xauth.c openswan-2.6.34-cvs-patched/programs/pluto/xauth.c
+--- openswan-2.6.34-orig/programs/pluto/xauth.c	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/xauth.c	2011-06-28 11:20:21.221553632 -0400
+@@ -1783,7 +1783,9 @@ modecfg_inR1(struct msg_digest *md)
+ 				 , caddr);
+ 		    
+ 		    if(addrbytesptr(&c->spd.this.host_srcip, NULL) == 0
+-		       || isanyaddr(&c->spd.this.host_srcip)) {
++		       || isanyaddr(&c->spd.this.host_srcip)
++			|| c->remotepeertype == CISCO ) { 
++			/*with remotepeertype == CISCO, overwrite the previous address with the new received address*/
+ 			openswan_log("setting ip source address to %s"
+ 				     , caddr);
+ 			c->spd.this.host_srcip = a;
+@@ -1833,7 +1835,11 @@ modecfg_inR1(struct msg_digest *md)
+ 			{
+ 			    /* concatenate new IP address string on end of
+ 			     * existing string, separated by ' '.
++			     * concatenate only if the received DNS is not
++			     * already present in the current string.
+ 			     */
++ 
++			    if( !strstr(c->cisco_dns_info, caddr) ) {
+ 			    size_t sz_old = strlen(old);
+ 			    size_t sz_added = strlen(caddr) + 1;
+ 			    char *new = alloc_bytes(sz_old + 1 + sz_added, "cisco_dns_info+");
+@@ -1843,6 +1849,7 @@ modecfg_inR1(struct msg_digest *md)
+ 			    memcpy(new + sz_old + 1, caddr, sz_added);
+ 			    c->cisco_dns_info = new;
+ 			    pfree(old);
++			   }
+ 			}
+ 		    }
+ 
+@@ -1858,18 +1865,22 @@ modecfg_inR1(struct msg_digest *md)
+ 		    break;
+ 
+ 		case CISCO_BANNER:
++		    /*if received again, free the previous and create the new one*/
++		    pfreeany(st->st_connection->cisco_banner);
+ 		    st->st_connection->cisco_banner = cisco_stringify(&strattr,"Cisco Banner");
+                     resp |= LELEM(attr.isaat_af_type);
+                     break;
+ 
+ 		case CISCO_DEF_DOMAIN:
++		    /*if received again, free the previous one and create the new one*/
++		    pfreeany(st->st_connection->cisco_domain_info);
+ 		    st->st_connection->cisco_domain_info = cisco_stringify(&strattr,"Cisco Domain");
+                     resp |= LELEM(attr.isaat_af_type);
+                     break;
+ 
+ 		case CISCO_SPLIT_INC:
+                 {
+-                    struct spd_route *tmp_spd;
++                    struct spd_route *tmp_spd, *tmp_spd1;
+                     ip_address a;
+                     char caddr[SUBNETTOT_BUF];
+                     size_t len = pbs_left(&strattr);
+@@ -1882,6 +1893,18 @@ modecfg_inR1(struct msg_digest *md)
+                     tmp_spd2->that.has_client_wildcard = FALSE;
+                     }
+ 
++					/* receiving remote subnets information again
++					* free the previous ones before proceeding. 
++					*/
++					tmp_spd = tmp_spd2->next;
++					tmp_spd2->next = NULL;
++					while(tmp_spd ) {
++					delete_sr(c, tmp_spd);
++					tmp_spd1 = tmp_spd->next;
++					pfree(tmp_spd);
++					tmp_spd = tmp_spd1;	    	
++					}
++
+                     while (len > 0) {
+                     u_int32_t *ap;
+                     tmp_spd = clone_thing(c->spd, "remote subnets policies");
+diff -urNp openswan-2.6.34-orig/programs/_updown.netkey/_updown.netkey.in openswan-2.6.34-cvs-patched/programs/_updown.netkey/_updown.netkey.in
+--- openswan-2.6.34-orig/programs/_updown.netkey/_updown.netkey.in	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/_updown.netkey/_updown.netkey.in	2011-06-28 11:21:19.484019282 -0400
+@@ -188,6 +188,14 @@ downroute() {
+     ip route flush cache
+ }
+ 
++downrule() {
++        if [ -n "$PLUTO_MY_SOURCEIP" ]
++        then
++            doroute del
++            ip route flush cache
++        fi
++}
++
+ updateresolvconf() {
+ 
+ if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUTO_NM_CONFIGURED" = 0 ]; then
+@@ -320,6 +328,32 @@ addsource() {
+     return $st
+ }
+ 
++delsource() {
++    st=0
++    # check if given sourceip is local and add as alias if not
++    if  ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local; then 
++        it="ip addr del ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
++
++        oops="`eval $it 2>&1`"
++        st=$?
++        if [ " $oops" = " " -a " $st" != " 0" ]; then
++            oops="silent error, exit status $st"
++        fi
++        case "$oops" in
++            'RTNETLINK answers: File exists'*)
++                # should not happen, but ... ignore if the
++                # address was already assigned on interface
++                oops=""
++                st=0
++                ;;
++        esac
++        if [ " $oops" != " " -o " $st" != " 0" ]; then
++            echo "$0: delsource \`$it' failed ($oops)" >&2
++        fi
++    fi
++    return $st
++}
++
+ 
+ doroute() {
+     if [ -z "$PLUTO_MY_SOURCEIP" ] && [ -n "$DEFAULTSOURCE" ]
+@@ -359,6 +393,12 @@ doroute() {
+ 	parms2="$parms2 src ${PLUTO_MY_SOURCEIP%/*}"
+     fi
+ 
++    if [ -z "$PLUTO_IS_PEER_CISCO" -o "$PLUTO_IS_PEER_CISCO" = 1 ]; then 
++    if [ "$1" = "del" -a -n "$PLUTO_MY_SOURCEIP" ]; then
++        delsource
++    fi
++    fi
++
+     case "$PLUTO_PEER_CLIENT" in
+ 	"0.0.0.0/0")
+ 	    # opportunistic encryption work around
+@@ -402,6 +442,7 @@ case "$PLUTO_VERB" in
+ 	;;
+     down-host)
+ 	# connection to me going down
++	downrule
+ 	# If you are doing a custom version, firewall commands go here.
+ 	;;
+     up-client)
+@@ -410,6 +451,7 @@ case "$PLUTO_VERB" in
+ 	;;
+     down-client)
+ 	# connection to my client subnet going down
++	downrule
+ 	# If you are doing a custom version, firewall commands go here.
+ 	;;
+     updateresolvconf-host|updateresolvconf-client)
diff --git a/openswan-ipsec-help-524146-509318.patch b/openswan-ipsec-help-524146-509318.patch
index 812d0ea..e26e1af 100644
--- a/openswan-ipsec-help-524146-509318.patch
+++ b/openswan-ipsec-help-524146-509318.patch
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.32-orig/programs/ipsec/ipsec.in openswan-2.6.32-cvs-patched/programs/ipsec/ipsec.in
---- openswan-2.6.32-orig/programs/ipsec/ipsec.in	2010-12-20 12:44:19.150080076 -0500
-+++ openswan-2.6.32-cvs-patched/programs/ipsec/ipsec.in	2010-12-20 12:55:34.269071757 -0500
+diff -urNp openswan-2.6.34-orig/programs/ipsec/ipsec.in openswan-2.6.34-cvs-patched/programs/ipsec/ipsec.in
+--- openswan-2.6.34-orig/programs/ipsec/ipsec.in	2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/ipsec/ipsec.in	2011-06-28 11:10:40.705854149 -0400
 @@ -80,9 +80,9 @@ case "$1" in
  --help)
  	echo "Usage: ipsec command argument ..."
diff --git a/openswan.spec b/openswan.spec
index 924e603..b28f591 100644
--- a/openswan.spec
+++ b/openswan.spec
@@ -7,9 +7,9 @@
 
 Summary: IPSEC implementation with IKEv1 and IKEv2 keying protocols
 Name: openswan
-Version: 2.6.32
+Version: 2.6.34
 
-Release: 2%{?dist}
+Release: 1%{?dist}
 License: GPLv2+
 Url: http://www.openswan.org/
 Source: openswan-%{version}.tar.gz
@@ -18,14 +18,14 @@ Source2: ipsec.conf
 
 Patch1: openswan-2.6-relpath.patch
 Patch2: openswan-ipsec-help-524146-509318.patch
-Patch3: openswan-600174.patch
-Patch4: openswan-600167.patch
+Patch3: openswan-cisco-704118.patch
 
 Group: System Environment/Daemons
 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 BuildRequires: gmp-devel bison flex xmlto bind-devel
 %if %{USE_LIBNSS}
 BuildRequires: nss-devel >= %{nss_version}
+Requires: nss-tools
 %endif
 Requires(post): coreutils bash
 Requires(preun): initscripts chkconfig
@@ -71,13 +71,12 @@ system.
 
 %prep
 %setup -q -n openswan-%{version}
-find doc/examples -type f -print0 | xargs -0 chmod a-x
-find doc -name .gitignore -print0 | xargs -0 rm -v
+#find doc/examples -type f -print0 | xargs -0 chmod a-x
+#find doc -name .gitignore -print0 | xargs -0 rm -v
 
 %patch1 -p1 -b .relpath
 %patch2 -p1
 %patch3 -p1
-%patch4 -p1
 
 %build
 
@@ -161,8 +160,8 @@ rm -rf $RPM_BUILD_ROOT
 
 %files doc
 %defattr(-,root,root)
-%doc doc/README.* doc/CHANGES.* doc/CREDITS.* doc/2.6.known-issues
-%doc doc/examples doc/std doc/quickstarts doc/*.html
+%doc docs/README.* docs/CREDITS.* docs/*.txt
+%doc docs/quickstarts docs/html-old-need-merge-with-wiki
 
 %files 
 %defattr(-,root,root)
@@ -179,7 +178,8 @@ rm -rf $RPM_BUILD_ROOT
 %endif
 %{_libexecdir}/ipsec
 %{_mandir}/*/*.gz
-%{_localstatedir}/run/pluto
+%ghost %{_localstatedir}/run/pluto
+
 
 %preun
 if [ $1 = 0 ]; then
@@ -196,6 +196,23 @@ fi
 chkconfig --add ipsec || :
 
 %changelog
+* Tue Jun 28 2011 Avesh Agarwal <avagarwa at redhat.com> - 2.6.34-1
+- New upstream release openswan-2.6.34
+- Fixes 716145: Openswan Failed To Build From Source against 
+the rawhide tree
+- Fixes 712037: new upstream release
+- Fixes 709273: Local patch for #600174 adds bogus addresses and routes
+
+* Wed May 25 2011 Avesh Agarwal <avagarwa at redhat.com> - 2.6.33-1
+- New upstream release openswan-2.6.33
+- Updated local patches
+- Fixes for bz 704118: openswan-cisco interop issues
+- Fixes for bz 687870: openswan-cisco interop issues
+- Fixes for bz 700826: nss-tools requires issue
+- Fixes for bz 656649: %ghost issue for /var/run/pluto
+- Fixes for bz 679379: new upstream release
+- Fixes for gcc erros, picked it from upstream commit-da9a995
+
 * Tue Feb 08 2011 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2.6.32-2
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
 
diff --git a/sources b/sources
index 2874bf0..57f3d7f 100644
--- a/sources
+++ b/sources
@@ -1,2 +1 @@
-02f5e13f03399b62aad9be4030cfd42b  openswan-2.6.32.tar.gz
-53473eea0ab5d6f6fe396d8e70cbaf78  openswan-2.6.32.tar.gz.asc
+9861503498efd74867277f46bdc0a98a  openswan-2.6.34.tar.gz


More information about the scm-commits mailing list