[openswan] New upstream release openswan-2.6.34 Fixes 716145: Openswan Failed To Build From Source against the
avesh agarwal
avesh at fedoraproject.org
Tue Jun 28 15:52:31 UTC 2011
commit 9ecd86ec74f9a32bca4cebeb597ae1524df9cfa4
Author: Avesh Agarwal <avagarwa at redhat.com>
Date: Tue Jun 28 11:52:20 2011 -0400
New upstream release openswan-2.6.34
Fixes 716145: Openswan Failed To Build From Source against
the rawhide tree
Fixes 712037: new upstream release
Fixes 709273: Local patch for #600174 adds bogus addresses and routes
.gitignore | 1 +
openswan-2.6-relpath.patch | 12 +-
openswan-600167.patch | 293 ------------------------------
openswan-600174.patch | 21 ---
openswan-cisco-704118.patch | 294 +++++++++++++++++++++++++++++++
openswan-ipsec-help-524146-509318.patch | 6 +-
openswan.spec | 37 +++-
sources | 3 +-
8 files changed, 332 insertions(+), 335 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 9d483e4..b3ae64c 100644
--- a/.gitignore
+++ b/.gitignore
@@ -20,3 +20,4 @@ openswan-2.6.28.tar.gz
/openswan-2.6.31.tar.gz
/openswan-2.6.32.tar.gz
/openswan-2.6.32.tar.gz.asc
+/openswan-2.6.34.tar.gz
diff --git a/openswan-2.6-relpath.patch b/openswan-2.6-relpath.patch
index 7d98edc..def018d 100644
--- a/openswan-2.6-relpath.patch
+++ b/openswan-2.6-relpath.patch
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.32-orig/Makefile.inc openswan-2.6.32-cvs-patched/Makefile.inc
---- openswan-2.6.32-orig/Makefile.inc 2010-12-20 12:44:19.113079987 -0500
-+++ openswan-2.6.32-cvs-patched/Makefile.inc 2010-12-20 12:51:03.383330043 -0500
+diff -urNp openswan-2.6.34-orig/Makefile.inc openswan-2.6.34-cvs-patched/Makefile.inc
+--- openswan-2.6.34-orig/Makefile.inc 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/Makefile.inc 2011-06-28 11:09:44.620359574 -0400
@@ -123,6 +123,8 @@ FINALRCDIR?=$(shell for d in $(INC_RCDIR
do if test -d $(DESTDIR)/$$d ; \
then echo $$d ; exit 0 ; \
@@ -10,9 +10,9 @@ diff -urNp openswan-2.6.32-orig/Makefile.inc openswan-2.6.32-cvs-patched/Makefil
RCDIR?=$(DESTDIR)$(FINALRCDIR)
-diff -urNp openswan-2.6.32-orig/programs/setup/Makefile openswan-2.6.32-cvs-patched/programs/setup/Makefile
---- openswan-2.6.32-orig/programs/setup/Makefile 2010-12-20 12:44:19.124080258 -0500
-+++ openswan-2.6.32-cvs-patched/programs/setup/Makefile 2010-12-20 12:51:46.128322171 -0500
+diff -urNp openswan-2.6.34-orig/programs/setup/Makefile openswan-2.6.34-cvs-patched/programs/setup/Makefile
+--- openswan-2.6.34-orig/programs/setup/Makefile 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/setup/Makefile 2011-06-28 11:10:02.954193631 -0400
@@ -37,7 +37,7 @@ doinstall:: $(PROGRAM) $(CONFFILES) $(EX
@mkdir -p $(RCDIR) $(BINDIR)
# install and link everything
diff --git a/openswan-cisco-704118.patch b/openswan-cisco-704118.patch
new file mode 100644
index 0000000..57d7337
--- /dev/null
+++ b/openswan-cisco-704118.patch
@@ -0,0 +1,294 @@
+diff -urNp openswan-2.6.34-orig/programs/pluto/connections.c openswan-2.6.34-cvs-patched/programs/pluto/connections.c
+--- openswan-2.6.34-orig/programs/pluto/connections.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/connections.c 2011-06-28 11:14:16.583893599 -0400
+@@ -222,7 +222,7 @@ delete_end(struct connection *c UNUSED,
+ pfreeany(e->host_addr_name);
+ }
+
+-static void
++void
+ delete_sr(struct connection *c, struct spd_route *sr)
+ {
+ delete_end(c, sr, &sr->this);
+diff -urNp openswan-2.6.34-orig/programs/pluto/connections.h openswan-2.6.34-cvs-patched/programs/pluto/connections.h
+--- openswan-2.6.34-orig/programs/pluto/connections.h 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/connections.h 2011-06-28 11:14:34.286732473 -0400
+@@ -304,6 +304,7 @@ extern void release_connection(struct co
+ extern void delete_connection(struct connection *c, bool relations);
+ extern void delete_connections_by_name(const char *name, bool strict);
+ extern void delete_every_connection(void);
++extern void delete_sr(struct connection *c, struct spd_route *sr);
+ extern char *add_group_instance(struct connection *group, const ip_subnet *target);
+ extern void remove_group_instance(const struct connection *group, const char *name);
+ extern void release_dead_interfaces(void);
+diff -urNp openswan-2.6.34-orig/programs/pluto/ikev1_aggr.c openswan-2.6.34-cvs-patched/programs/pluto/ikev1_aggr.c
+--- openswan-2.6.34-orig/programs/pluto/ikev1_aggr.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/ikev1_aggr.c 2011-06-28 11:15:28.105240612 -0400
+@@ -1183,7 +1183,7 @@ aggr_outI1_tail(struct pluto_crypto_req_
+ }
+ #endif
+
+- if (!nat_traversal_insert_vid(np, &md->rbody)) {
++ if (!nat_traversal_insert_vid(np, &md->rbody, st)) {
+ reset_cur_state();
+ return STF_INTERNAL_ERROR;
+ }
+diff -urNp openswan-2.6.34-orig/programs/pluto/ikev1_main.c openswan-2.6.34-cvs-patched/programs/pluto/ikev1_main.c
+--- openswan-2.6.34-orig/programs/pluto/ikev1_main.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/ikev1_main.c 2011-06-28 11:15:43.311102352 -0400
+@@ -216,7 +216,7 @@ main_outI1(int whack_sock
+ int np = --numvidtosend > 0 ? ISAKMP_NEXT_VID : ISAKMP_NEXT_NONE;
+
+ /* Add supported NAT-Traversal VID */
+- if (!nat_traversal_insert_vid(np, &md.rbody)) {
++ if (!nat_traversal_insert_vid(np, &md.rbody, st)) {
+ reset_cur_state();
+ return STF_INTERNAL_ERROR;
+ }
+diff -urNp openswan-2.6.34-orig/programs/pluto/kernel.c openswan-2.6.34-cvs-patched/programs/pluto/kernel.c
+--- openswan-2.6.34-orig/programs/pluto/kernel.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/kernel.c 2011-06-28 11:16:54.142454550 -0400
+@@ -436,6 +436,7 @@ fmt_common_shell_out(char *buf, int blen
+ #endif
+ "%s " /* PLUTO_MY_SRCIP - if any */
+ #ifdef XAUTH
++ "PLUTO_IS_PEER_CISCO='%u' "
+ "PLUTO_CISCO_DNS_INFO='%s' "
+ "PLUTO_CISCO_DOMAIN_INFO='%s' "
+ "PLUTO_PEER_BANNER='%s' "
+@@ -472,6 +473,7 @@ fmt_common_shell_out(char *buf, int blen
+ #endif
+ , srcip_str
+ #ifdef XAUTH
++ , c->remotepeertype
+ , c->cisco_dns_info ? c->cisco_dns_info : ""
+ , c->cisco_domain_info ? c->cisco_domain_info : ""
+ , c->cisco_banner ? c->cisco_banner : ""
+diff -urNp openswan-2.6.34-orig/programs/pluto/nat_traversal.c openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.c
+--- openswan-2.6.34-orig/programs/pluto/nat_traversal.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.c 2011-06-28 11:17:13.280280126 -0400
+@@ -198,7 +198,7 @@ static void _natd_hash(const struct hash
+ *
+ * Used when we're Initiator
+ */
+-bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs)
++bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs, struct state *st)
+ {
+ bool r = TRUE;
+ DBG(DBG_NATT
+@@ -207,6 +207,9 @@ bool nat_traversal_insert_vid(u_int8_t n
+ , nat_traversal_support_non_ike));
+
+ if (nat_traversal_support_port_floating) {
++ if (st->st_connection->remotepeertype == CISCO) {
++ if (r) r = out_vid(np, outs, VID_NATT_RFC);
++ } else {
+ if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_RFC);
+ if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_IETF_05);
+ if (r) r = out_vid(ISAKMP_NEXT_VID, outs, VID_NATT_IETF_03);
+@@ -214,8 +217,9 @@ bool nat_traversal_insert_vid(u_int8_t n
+ if (r)
+ r = out_vid(nat_traversal_support_non_ike ? ISAKMP_NEXT_VID : np,
+ outs, VID_NATT_IETF_02);
++ }
+ }
+- if (nat_traversal_support_non_ike) {
++ if (nat_traversal_support_non_ike && st->st_connection->remotepeertype != CISCO) {
+ if (r) r = out_vid(np, outs, VID_NATT_IETF_00);
+ }
+ return r;
+diff -urNp openswan-2.6.34-orig/programs/pluto/nat_traversal.h openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.h
+--- openswan-2.6.34-orig/programs/pluto/nat_traversal.h 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/nat_traversal.h 2011-06-28 11:17:24.523176911 -0400
+@@ -129,7 +129,7 @@ extern int nat_traversal_espinudp_socket
+ */
+ #ifndef PB_STREAM_UNDEFINED
+ bool nat_traversal_add_vid(u_int8_t np, pb_stream *outs);
+-bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs);
++bool nat_traversal_insert_vid(u_int8_t np, pb_stream *outs, struct state *st);
+ #endif
+ u_int32_t nat_traversal_vid_to_method(unsigned short nat_t_vid);
+
+diff -urNp openswan-2.6.34-orig/programs/pluto/spdb_v1_struct.c openswan-2.6.34-cvs-patched/programs/pluto/spdb_v1_struct.c
+--- openswan-2.6.34-orig/programs/pluto/spdb_v1_struct.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/spdb_v1_struct.c 2011-06-28 11:18:07.821779560 -0400
+@@ -1527,7 +1527,7 @@ parse_ipsec_transform(struct isakmp_tran
+ case SA_LIFE_TYPE_SECONDS:
+ /* silently limit duration to our maximum */
+ attrs->life_seconds = val <= SA_LIFE_DURATION_MAXIMUM
+- ? val : SA_LIFE_DURATION_MAXIMUM;
++ ? (val < st->st_connection->sa_ipsec_life_seconds ? val : st->st_connection->sa_ipsec_life_seconds) : SA_LIFE_DURATION_MAXIMUM;
+ break;
+ case SA_LIFE_TYPE_KBYTES:
+ attrs->life_kilobytes = val;
+@@ -1593,7 +1593,13 @@ parse_ipsec_transform(struct isakmp_tran
+ loglog(RC_LOG_SERIOUS,
+ "%s must only be used with old IETF drafts",
+ enum_name(&enc_mode_names, val));
++ if(st->st_connection->remotepeertype == CISCO) {
++ DBG_log( "Allowing, as this may be due to rekey");
++ attrs->encapsulation = val - ENCAPSULATION_MODE_UDP_TUNNEL_DRAFTS + ENCAPSULATION_MODE_TUNNEL;
++ }
++ else {
+ return FALSE;
++ }
+ }
+ else if (st->hidden_variables.st_nat_traversal & NAT_T_DETECTED) {
+ attrs->encapsulation = val - ENCAPSULATION_MODE_UDP_TUNNEL_DRAFTS + ENCAPSULATION_MODE_TUNNEL;
+diff -urNp openswan-2.6.34-orig/programs/pluto/xauth.c openswan-2.6.34-cvs-patched/programs/pluto/xauth.c
+--- openswan-2.6.34-orig/programs/pluto/xauth.c 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/pluto/xauth.c 2011-06-28 11:20:21.221553632 -0400
+@@ -1783,7 +1783,9 @@ modecfg_inR1(struct msg_digest *md)
+ , caddr);
+
+ if(addrbytesptr(&c->spd.this.host_srcip, NULL) == 0
+- || isanyaddr(&c->spd.this.host_srcip)) {
++ || isanyaddr(&c->spd.this.host_srcip)
++ || c->remotepeertype == CISCO ) {
++ /*with remotepeertype == CISCO, overwrite the previous address with the new received address*/
+ openswan_log("setting ip source address to %s"
+ , caddr);
+ c->spd.this.host_srcip = a;
+@@ -1833,7 +1835,11 @@ modecfg_inR1(struct msg_digest *md)
+ {
+ /* concatenate new IP address string on end of
+ * existing string, separated by ' '.
++ * concatenate only if the received DNS is not
++ * already present in the current string.
+ */
++
++ if( !strstr(c->cisco_dns_info, caddr) ) {
+ size_t sz_old = strlen(old);
+ size_t sz_added = strlen(caddr) + 1;
+ char *new = alloc_bytes(sz_old + 1 + sz_added, "cisco_dns_info+");
+@@ -1843,6 +1849,7 @@ modecfg_inR1(struct msg_digest *md)
+ memcpy(new + sz_old + 1, caddr, sz_added);
+ c->cisco_dns_info = new;
+ pfree(old);
++ }
+ }
+ }
+
+@@ -1858,18 +1865,22 @@ modecfg_inR1(struct msg_digest *md)
+ break;
+
+ case CISCO_BANNER:
++ /*if received again, free the previous and create the new one*/
++ pfreeany(st->st_connection->cisco_banner);
+ st->st_connection->cisco_banner = cisco_stringify(&strattr,"Cisco Banner");
+ resp |= LELEM(attr.isaat_af_type);
+ break;
+
+ case CISCO_DEF_DOMAIN:
++ /*if received again, free the previous one and create the new one*/
++ pfreeany(st->st_connection->cisco_domain_info);
+ st->st_connection->cisco_domain_info = cisco_stringify(&strattr,"Cisco Domain");
+ resp |= LELEM(attr.isaat_af_type);
+ break;
+
+ case CISCO_SPLIT_INC:
+ {
+- struct spd_route *tmp_spd;
++ struct spd_route *tmp_spd, *tmp_spd1;
+ ip_address a;
+ char caddr[SUBNETTOT_BUF];
+ size_t len = pbs_left(&strattr);
+@@ -1882,6 +1893,18 @@ modecfg_inR1(struct msg_digest *md)
+ tmp_spd2->that.has_client_wildcard = FALSE;
+ }
+
++ /* receiving remote subnets information again
++ * free the previous ones before proceeding.
++ */
++ tmp_spd = tmp_spd2->next;
++ tmp_spd2->next = NULL;
++ while(tmp_spd ) {
++ delete_sr(c, tmp_spd);
++ tmp_spd1 = tmp_spd->next;
++ pfree(tmp_spd);
++ tmp_spd = tmp_spd1;
++ }
++
+ while (len > 0) {
+ u_int32_t *ap;
+ tmp_spd = clone_thing(c->spd, "remote subnets policies");
+diff -urNp openswan-2.6.34-orig/programs/_updown.netkey/_updown.netkey.in openswan-2.6.34-cvs-patched/programs/_updown.netkey/_updown.netkey.in
+--- openswan-2.6.34-orig/programs/_updown.netkey/_updown.netkey.in 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/_updown.netkey/_updown.netkey.in 2011-06-28 11:21:19.484019282 -0400
+@@ -188,6 +188,14 @@ downroute() {
+ ip route flush cache
+ }
+
++downrule() {
++ if [ -n "$PLUTO_MY_SOURCEIP" ]
++ then
++ doroute del
++ ip route flush cache
++ fi
++}
++
+ updateresolvconf() {
+
+ if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUTO_NM_CONFIGURED" = 0 ]; then
+@@ -320,6 +328,32 @@ addsource() {
+ return $st
+ }
+
++delsource() {
++ st=0
++ # check if given sourceip is local and add as alias if not
++ if ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local; then
++ it="ip addr del ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
++
++ oops="`eval $it 2>&1`"
++ st=$?
++ if [ " $oops" = " " -a " $st" != " 0" ]; then
++ oops="silent error, exit status $st"
++ fi
++ case "$oops" in
++ 'RTNETLINK answers: File exists'*)
++ # should not happen, but ... ignore if the
++ # address was already assigned on interface
++ oops=""
++ st=0
++ ;;
++ esac
++ if [ " $oops" != " " -o " $st" != " 0" ]; then
++ echo "$0: delsource \`$it' failed ($oops)" >&2
++ fi
++ fi
++ return $st
++}
++
+
+ doroute() {
+ if [ -z "$PLUTO_MY_SOURCEIP" ] && [ -n "$DEFAULTSOURCE" ]
+@@ -359,6 +393,12 @@ doroute() {
+ parms2="$parms2 src ${PLUTO_MY_SOURCEIP%/*}"
+ fi
+
++ if [ -z "$PLUTO_IS_PEER_CISCO" -o "$PLUTO_IS_PEER_CISCO" = 1 ]; then
++ if [ "$1" = "del" -a -n "$PLUTO_MY_SOURCEIP" ]; then
++ delsource
++ fi
++ fi
++
+ case "$PLUTO_PEER_CLIENT" in
+ "0.0.0.0/0")
+ # opportunistic encryption work around
+@@ -402,6 +442,7 @@ case "$PLUTO_VERB" in
+ ;;
+ down-host)
+ # connection to me going down
++ downrule
+ # If you are doing a custom version, firewall commands go here.
+ ;;
+ up-client)
+@@ -410,6 +451,7 @@ case "$PLUTO_VERB" in
+ ;;
+ down-client)
+ # connection to my client subnet going down
++ downrule
+ # If you are doing a custom version, firewall commands go here.
+ ;;
+ updateresolvconf-host|updateresolvconf-client)
diff --git a/openswan-ipsec-help-524146-509318.patch b/openswan-ipsec-help-524146-509318.patch
index 812d0ea..e26e1af 100644
--- a/openswan-ipsec-help-524146-509318.patch
+++ b/openswan-ipsec-help-524146-509318.patch
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.32-orig/programs/ipsec/ipsec.in openswan-2.6.32-cvs-patched/programs/ipsec/ipsec.in
---- openswan-2.6.32-orig/programs/ipsec/ipsec.in 2010-12-20 12:44:19.150080076 -0500
-+++ openswan-2.6.32-cvs-patched/programs/ipsec/ipsec.in 2010-12-20 12:55:34.269071757 -0500
+diff -urNp openswan-2.6.34-orig/programs/ipsec/ipsec.in openswan-2.6.34-cvs-patched/programs/ipsec/ipsec.in
+--- openswan-2.6.34-orig/programs/ipsec/ipsec.in 2011-06-08 14:02:31.000000000 -0400
++++ openswan-2.6.34-cvs-patched/programs/ipsec/ipsec.in 2011-06-28 11:10:40.705854149 -0400
@@ -80,9 +80,9 @@ case "$1" in
--help)
echo "Usage: ipsec command argument ..."
diff --git a/openswan.spec b/openswan.spec
index 924e603..b28f591 100644
--- a/openswan.spec
+++ b/openswan.spec
@@ -7,9 +7,9 @@
Summary: IPSEC implementation with IKEv1 and IKEv2 keying protocols
Name: openswan
-Version: 2.6.32
+Version: 2.6.34
-Release: 2%{?dist}
+Release: 1%{?dist}
License: GPLv2+
Url: http://www.openswan.org/
Source: openswan-%{version}.tar.gz
@@ -18,14 +18,14 @@ Source2: ipsec.conf
Patch1: openswan-2.6-relpath.patch
Patch2: openswan-ipsec-help-524146-509318.patch
-Patch3: openswan-600174.patch
-Patch4: openswan-600167.patch
+Patch3: openswan-cisco-704118.patch
Group: System Environment/Daemons
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
BuildRequires: gmp-devel bison flex xmlto bind-devel
%if %{USE_LIBNSS}
BuildRequires: nss-devel >= %{nss_version}
+Requires: nss-tools
%endif
Requires(post): coreutils bash
Requires(preun): initscripts chkconfig
@@ -71,13 +71,12 @@ system.
%prep
%setup -q -n openswan-%{version}
-find doc/examples -type f -print0 | xargs -0 chmod a-x
-find doc -name .gitignore -print0 | xargs -0 rm -v
+#find doc/examples -type f -print0 | xargs -0 chmod a-x
+#find doc -name .gitignore -print0 | xargs -0 rm -v
%patch1 -p1 -b .relpath
%patch2 -p1
%patch3 -p1
-%patch4 -p1
%build
@@ -161,8 +160,8 @@ rm -rf $RPM_BUILD_ROOT
%files doc
%defattr(-,root,root)
-%doc doc/README.* doc/CHANGES.* doc/CREDITS.* doc/2.6.known-issues
-%doc doc/examples doc/std doc/quickstarts doc/*.html
+%doc docs/README.* docs/CREDITS.* docs/*.txt
+%doc docs/quickstarts docs/html-old-need-merge-with-wiki
%files
%defattr(-,root,root)
@@ -179,7 +178,8 @@ rm -rf $RPM_BUILD_ROOT
%endif
%{_libexecdir}/ipsec
%{_mandir}/*/*.gz
-%{_localstatedir}/run/pluto
+%ghost %{_localstatedir}/run/pluto
+
%preun
if [ $1 = 0 ]; then
@@ -196,6 +196,23 @@ fi
chkconfig --add ipsec || :
%changelog
+* Tue Jun 28 2011 Avesh Agarwal <avagarwa at redhat.com> - 2.6.34-1
+- New upstream release openswan-2.6.34
+- Fixes 716145: Openswan Failed To Build From Source against
+the rawhide tree
+- Fixes 712037: new upstream release
+- Fixes 709273: Local patch for #600174 adds bogus addresses and routes
+
+* Wed May 25 2011 Avesh Agarwal <avagarwa at redhat.com> - 2.6.33-1
+- New upstream release openswan-2.6.33
+- Updated local patches
+- Fixes for bz 704118: openswan-cisco interop issues
+- Fixes for bz 687870: openswan-cisco interop issues
+- Fixes for bz 700826: nss-tools requires issue
+- Fixes for bz 656649: %ghost issue for /var/run/pluto
+- Fixes for bz 679379: new upstream release
+- Fixes for gcc erros, picked it from upstream commit-da9a995
+
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 2.6.32-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
diff --git a/sources b/sources
index 2874bf0..57f3d7f 100644
--- a/sources
+++ b/sources
@@ -1,2 +1 @@
-02f5e13f03399b62aad9be4030cfd42b openswan-2.6.32.tar.gz
-53473eea0ab5d6f6fe396d8e70cbaf78 openswan-2.6.32.tar.gz.asc
+9861503498efd74867277f46bdc0a98a openswan-2.6.34.tar.gz
More information about the scm-commits
mailing list