rpms/openswan/devel openswan-600167.patch, NONE, 1.1 openswan-nm-584224-600174.patch, NONE, 1.1 .cvsignore, 1.30, 1.31 openswan-2.6-relpath.patch, 1.3, 1.4 openswan-ipsec-help-524146-509318.patch, 1.2, 1.3 openswan.spec, 1.90, 1.91 sources, 1.29, 1.30 openswan-2.6-selinux.patch, 1.5, NONE openswan-nm-and-584224.patch, 1.1, NONE openswan-rfc5114.patch, 1.2, NONE
avesh agarwal
avesh at fedoraproject.org
Fri Jul 2 20:46:43 UTC 2010
Author: avesh
Update of /cvs/pkgs/rpms/openswan/devel
In directory cvs01.phx2.fedoraproject.org:/tmp/cvs-serv4393
Modified Files:
.cvsignore openswan-2.6-relpath.patch
openswan-ipsec-help-524146-509318.patch openswan.spec sources
Added Files:
openswan-600167.patch openswan-nm-584224-600174.patch
Removed Files:
openswan-2.6-selinux.patch openswan-nm-and-584224.patch
openswan-rfc5114.patch
Log Message:
* Fri Jul 2 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.27-1
- NetworkManager-openswan plugin related changes
- Fixes for bz 600167
- Fixes for bz 600174
- Fixes for bz 584224
- Updated old patches
openswan-600167.patch:
auto/auto.in | 106 +++++++++++++++++++++++++++++++++++++++++++
pluto/connections.c | 5 +-
pluto/connections.h | 2
pluto/initiate.c | 126 ++++++++++++++++++++++++++++++++++++++++++++++++++--
4 files changed, 234 insertions(+), 5 deletions(-)
--- NEW FILE openswan-600167.patch ---
diff -urNp openswan-2.6.27-orig/programs/auto/auto.in openswan-2.6.27-cvs-patched/programs/auto/auto.in
--- openswan-2.6.27-orig/programs/auto/auto.in 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/auto/auto.in 2010-07-02 15:24:00.962354620 -0400
@@ -40,6 +40,112 @@ op=
argc=
utc=
+defaultinterface() {
+ local getphysdev getifaddr addr phys next multiaddr multidefault
+ addr=
+ phys=
+ next=
+ multiaddr=
+ multidefault=
+
+ getphysdev() {
+ local phys next addr
+ phys=
+ next=
+ addr=
+ while test $# -gt 0
+ do
+ case $1 in
+ dev)
+ phys=$2
+ shift; shift;
+ ;;
+ via)
+ next=$2
+ shift; shift;
+ ;;
+ src)
+ addr=$2
+ shift; shift
+ ;;
+ *)
+ shift
+ ;;
+ esac
+ done
+ echo "phys=$phys"
+ echo "next=$next"
+ echo "addr=$addr"
+ }
+
+ getifaddr() {
+ local addr peer
+ addr=
+ peer=
+ while test $# -gt 0
+ do
+ case $1 in
+ inet)
+ addr=$2
+ shift; shift
+ ;;
+ peer)
+ peer=$2
+ shift; shift
+ ;;
+ *)
+ shift
+ ;;
+ esac
+ done
+ if test -n "$peer"
+ then
+ echo "next=${peer%/*}"
+ fi
+ echo "addr=${addr%/*}"
+ }
+
+ iproutedefault=`ip route list 0.0.0.0/0`
+ if test -n "$iproutedefault"
+ then
+ if test `echo "$iproutedefault" | wc -l` -gt 1
+ then
+ multidefault=1
+ iproutedefault=`echo $iproutedefault | head -1`
+ fi
+ eval `getphysdev $iproutedefault`
+ if test -z "$next" -o -z "$addr" -a -n "$phys"
+ then
+ ipaddrlist=`ip -o -f inet addr list dev $phys`
+ if test `echo "$ipaddrlist" | wc -l` -gt 1
+ then
+ multiaddr=1
+ ipaddrlist=`echo "$ipaddrlist" | head -1`
+ fi
+ eval `getifaddr $ipaddrlist`
+ fi
+ if test -n "$multidefault"
+ then
+ echo "multiple default routes, using $next on $phys"
+ fi
+ if test -n "$multiaddr"
+ then
+ echo "multiple ip addresses, using $addr on $phys"
+ fi
+ else
+ echo "no default routes detected"
+ fi
+ # simulate old silly output
+ echo "defaultroutephys=$phys" > $info
+ echo "defaultroutevirt=none" >> $info
+ echo "defaultrouteaddr=$addr" >> $info
+ echo "defaultroutenexthop=$next" >> $info
+}
+
+
+# calling this routine here again to update default network information in /var/run/pluto/ipsec.info
+defaultinterface
+
for dummy
do
case "$1" in
diff -urNp openswan-2.6.27-orig/programs/pluto/connections.c openswan-2.6.27-cvs-patched/programs/pluto/connections.c
--- openswan-2.6.27-orig/programs/pluto/connections.c 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/connections.c 2010-07-02 15:26:16.746351708 -0400
@@ -457,7 +457,7 @@ check_orientations(void)
}
}
-static err_t
+err_t
default_end(struct end *e, ip_address *dflt_nexthop)
{
err_t ugh = NULL;
@@ -1056,7 +1056,8 @@ check_connection_end(const struct whack_
}
/* MAKE this more sane in the face of unresolved IP addresses */
- if (that->host_type != KH_IPHOSTNAME && isanyaddr(&that->host_addr))
+ /* that->host_type != KH_DEFAULTROUTE for cases when network is not up at the boot time*/
+ if (that->host_type != KH_IPHOSTNAME && that->host_type != KH_DEFAULTROUTE && isanyaddr(&that->host_addr))
{
/* other side is wildcard: we must check if other conditions met */
if (that->host_type != KH_IPHOSTNAME && isanyaddr(&this->host_addr))
diff -urNp openswan-2.6.27-orig/programs/pluto/connections.h openswan-2.6.27-cvs-patched/programs/pluto/connections.h
--- openswan-2.6.27-orig/programs/pluto/connections.h 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/connections.h 2010-07-02 15:28:20.438354071 -0400
@@ -289,6 +289,8 @@ extern size_t format_end(char *buf, size
, const struct end *this, const struct end *that
, bool is_left, lset_t policy);
+extern err_t default_end(struct end *e, ip_address *dflt_nexthop);
+
struct whack_message; /* forward declaration of tag whack_msg */
extern void add_connection(const struct whack_message *wm);
extern void initiate_connection(const char *name
diff -urNp openswan-2.6.27-orig/programs/pluto/initiate.c openswan-2.6.27-cvs-patched/programs/pluto/initiate.c
--- openswan-2.6.27-orig/programs/pluto/initiate.c 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/pluto/initiate.c 2010-07-02 15:35:02.219359079 -0400
@@ -151,6 +151,121 @@ struct initiate_stuff {
enum crypto_importance importance;
};
+
+static int
+resolve_and_reorient(struct connection *c) {
+
+ /* Connection is not oriented, and this may be because the connection was loaded when network was not up due to unresolved ip (atleast this or that) addresses */
+ /* Now connection is being initiated, and assuming network is up, we are trying once more to resolve ip addresses, */
+ /* and to add new network interfaces, and to orient the connections. */
+
+ if (!oriented(*c) && &c->spd != NULL && ( isanyaddr(&c->spd.this.host_addr) || isanyaddr(&c->spd.that.host_addr) ) ) {
+ char filedata[200]; /*size is set randonly*/
+ FILE *fp;
+ size_t bytes;
+ char value[20]; /*size is set randomly*/
+ char *tmp;
+
+ /* Reading the file /var/run/pluto/ipsec.info to obtain default route address ("defaultrouteaddr") after network is up*/
+ fp=fopen("/var/run/pluto/ipsec.info","r");
+
+ if(fp == NULL) {
+ DBG(DBG_CONTROLMORE, DBG_log("Error in opening /var/run/pluto/ipsec.info"));
+ return 0;
+ }
+
+ bytes=fread(filedata, 1, sizeof(filedata)-1, fp);
+ filedata[bytes]='\0';
+ value[0]='\0';
+ fclose(fp);
+
+ if(bytes==0){
+ DBG(DBG_CONTROLMORE, DBG_log("Error reading /var/run/pluto/ipsec.info or file empty"));
+ return 0;
+ }
+
+ unsigned int i = 0;
+ do
+ {
+ int start = i;
+ unsigned int slen;
+
+ while (filedata[i] != '\r' && filedata[i] != '\n' && i < bytes) i++;
+ filedata[i++] = '\0';
+
+ while ( (i<bytes) && (filedata[i] == '\r' || filedata[i] == '\n')) {
+ filedata[i++] = '\0';
+ }
+
+ tmp = &filedata[start];
+
+ if (strncmp(tmp, "defaultrouteaddr", strlen("defaultrouteaddr"))) continue;
+ slen = strlen(tmp);
+
+ if (slen < strlen("defaultrouteaddr")+1) continue;
+ if (tmp[strlen("defaultrouteaddr")] != '=') continue;
+ strcpy(value, &tmp[strlen("defaultrouteaddr")+1]);
+ break;
+
+ } while (i<bytes);
+
+ /*Trying to resolve "this" end*/
+ if(c->spd.this.host_type == KH_DEFAULTROUTE && isanyaddr(&c->spd.this.host_addr)) {
+ err_t e;
+
+ e = ttoaddr(value, 0, 0, &c->spd.this.host_addr);
+ if(e) {
+ DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve this defaultrouteaddr"));
+ return 0;
+ }
+ }
+ else if (c->spd.this.host_type == KH_IPHOSTNAME && isanyaddr(&c->spd.this.host_addr)) {
+ err_t e;
+ e = ttoaddr(c->spd.this.host_addr_name, 0, 0, &c->spd.this.host_addr);
+ if(e) {
+ DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve this ip address string"));
+ return 0;
+ }
+ }
+
+ /*Trying to resolve "that", and also another reason for doing this is that as the connection is not yet oriented, so it is not known which end is which*/
+ if(c->spd.that.host_type == KH_DEFAULTROUTE && isanyaddr(&c->spd.that.host_addr) ) {
+ err_t e;
+
+ e = ttoaddr(value, 0, 0, &c->spd.that.host_addr);
+ if(e) {
+ DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve that defaultrouteaddr"));
+ return 0;
+ }
+ }
+ else if (c->spd.that.host_type == KH_IPHOSTNAME && isanyaddr(&c->spd.that.host_addr)) {
+ err_t e;
+ e = ttoaddr(c->spd.that.host_addr_name, 0, 0, &c->spd.that.host_addr);
+ if(e) {
+ DBG(DBG_CONTROLMORE, DBG_log("we can not yet resolve that ip address string"));
+ return 0;
+ }
+ }
+
+ /* If both this and that are resolved, only then proceed*/
+ if ( !isanyaddr(&c->spd.this.host_addr) && !isanyaddr(&c->spd.that.host_addr)) {
+
+ /*Once ip addresses are resolved, setting boths end again*/
+ default_end(&c->spd.this, &c->spd.that.host_addr);
+ default_end(&c->spd.that, &c->spd.this.host_addr);
+
+ /*Now when ip addresses are resolved, adding new network interfaces after network is up*/
+ find_ifaces();
+
+ /*Due to the unresolved ip addresses this connection may have been set to CK_TEMPLATE, setting it to CK_PERMANENT as ip addresses are resolved now.*/
+ c->kind = CK_PERMANENT;
+ }
+ }
+
+
+return 1;
+}
+
static int
initiate_a_connection(struct connection *c
, void *arg)
@@ -165,9 +280,14 @@ initiate_a_connection(struct connection
/* turn on any extra debugging asked for */
c->extra_debugging |= moredebug;
-
- if (!oriented(*c))
- {
+
+ if (!oriented(*c)) {
+ /*Lets try to resolve and reorient the connection once more, assuming network connection is up now*/
+ resolve_and_reorient(c);
+ }
+
+ if (!oriented(*c)) {
+
loglog(RC_ORIENT, "We cannot identify ourselves with either end of this connection.");
}
else if (NEVER_NEGOTIATE(c->policy))
openswan-nm-584224-600174.patch:
_realsetup/_realsetup.in | 10 +++++----
_updown.netkey/_updown.netkey.in | 40 ++++++++++++++++++++++++++++++++-------
2 files changed, 39 insertions(+), 11 deletions(-)
--- NEW FILE openswan-nm-584224-600174.patch ---
diff -urNp openswan-2.6.27-orig/programs/_realsetup/_realsetup.in openswan-2.6.27-cvs-patched/programs/_realsetup/_realsetup.in
--- openswan-2.6.27-orig/programs/_realsetup/_realsetup.in 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/_realsetup/_realsetup.in 2010-07-02 15:36:58.223111824 -0400
@@ -472,6 +472,12 @@ case "$1" in
exit 3
fi
echo "but..."
+ if test "$plutokind" != "no"
+ then
+ echo "An ${plutokind} Pluto is active?"
+ exit 1
+ fi
+
if test "$hassublock"
then
echo "has subsystem lock ($subsyslock)!"
@@ -481,10 +487,6 @@ case "$1" in
then
echo "has $info file!"
fi
- if test "$plutokind" != "no"
- then
- echo "An ${plutokind} Pluto is active?"
- fi
if test "$eroutes" -gt 0
then
echo "some (${eroutes}) eroutes exist!"
diff -urNp openswan-2.6.27-orig/programs/_updown.netkey/_updown.netkey.in openswan-2.6.27-cvs-patched/programs/_updown.netkey/_updown.netkey.in
--- openswan-2.6.27-orig/programs/_updown.netkey/_updown.netkey.in 2010-06-21 11:43:35.000000000 -0400
+++ openswan-2.6.27-cvs-patched/programs/_updown.netkey/_updown.netkey.in 2010-07-02 15:40:48.005354964 -0400
@@ -179,19 +179,26 @@ downroute() {
}
updateresolvconf() {
- echo "updating resolvconf"
if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUTO_NM_CONFIGURED" = 0 ]; then
- if [ -e "$OPENSWAN_RESOLV_CONF" ]; then
- echo "Backup resolv.conf already exists, so doing nothing"
- return 1
- fi
+ echo "updating resolvconf"
if [ ! -e "$ORIG_RESOLV_CONF" ]; then
echo "resolv.conf does not exist, so doing nothing"
return 1
fi
+ if [ -e "$OPENSWAN_RESOLV_CONF" ]; then
+ if grep 'Openswan' $ORIG_RESOLV_CONF > /dev/null 2>&1
+ then
+ echo "Current resolv.conf is generated by Openswan, and backup resolv.conf already exists, so doing nothing"
+ return 1
+ else
+ echo "backup resolv.conf exists, but current resolv.conf is not generated by Openswan"
+ fi
+ fi
+
+ rm -f $OPENSWAN_RESOLV_CONF
cp -- $ORIG_RESOLV_CONF $OPENSWAN_RESOLV_CONF
RESOLVE_CONF="#Generated by Openswan (IPSec)"
@@ -211,11 +218,23 @@ if [ -z "$PLUTO_NM_CONFIGURED" -o "$PLUT
done
fi
+ ORIG_NAMESERVER=`grep -m 1 ^nameserver $ORIG_RESOLV_CONF`
+ RESOLVE_CONF="$RESOLVE_CONF\n$ORIG_NAMESERVER"
+
rm -f -- $ORIG_RESOLV_CONF
echo -e $RESOLVE_CONF > $ORIG_RESOLV_CONF
return $?
else
echo "Updating resolv.conf is controlled by Network Manager"
+ openswan_reason=connect
+ export openswan_reason
+ export PLUTO_CISCO_DOMAIN_INFO
+ export PLUTO_CISCO_DNS_INFO
+ export PLUTO_PEER_BANNER
+ export PLUTO_MY_SOURCEIP
+ export PLUTO_PEER
+
+ /usr/libexec/nm-openswan-service-helper
return 0
fi
}
@@ -249,8 +268,15 @@ fi
addsource() {
st=0
# check if given sourceip is local and add as alias if not
- if ! ip -o route get ${PLUTO_MY_SOURCEIP%/*} | grep -q ^local; then
- it="ip addr add ${PLUTO_MY_SOURCEIP%/*}/32 dev ${PLUTO_INTERFACE%:*}"
+ saddr=${PLUTO_MY_SOURCEIP%/*}/32
+ if test "${PLUTO_PEER_CLIENT##*/}" != 32
+ then
+ saddr=${PLUTO_MY_SOURCEIP%/*}/"${PLUTO_PEER_CLIENT##*/}"
+ fi
+
+ if ! ip addr show dev ${PLUTO_INTERFACE%:*} | grep -qs "inet ${saddr}"
+ then
+ it="ip addr add ${saddr} dev ${PLUTO_INTERFACE%:*}"
oops="`eval $it 2>&1`"
st=$?
if [ " $oops" = " " -a " $st" != " 0" ]; then
Index: .cvsignore
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/.cvsignore,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -p -r1.30 -r1.31
--- .cvsignore 29 Mar 2010 18:05:44 -0000 1.30
+++ .cvsignore 2 Jul 2010 20:46:42 -0000 1.31
@@ -14,3 +14,4 @@ openswan-2.6.22.tar.gz
openswan-2.6.23.tar.gz
openswan-2.6.24.tar.gz
openswan-2.6.25.tar.gz
+openswan-2.6.27.tar.gz
openswan-2.6-relpath.patch:
Makefile.inc | 2 ++
programs/setup/Makefile | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
Index: openswan-2.6-relpath.patch
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan-2.6-relpath.patch,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -p -r1.3 -r1.4
--- openswan-2.6-relpath.patch 29 Mar 2010 18:05:44 -0000 1.3
+++ openswan-2.6-relpath.patch 2 Jul 2010 20:46:42 -0000 1.4
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.25-orig/Makefile.inc openswan-2.6.25/Makefile.inc
---- openswan-2.6.25-orig/Makefile.inc 2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/Makefile.inc 2010-03-29 12:06:47.000000000 -0400
+diff -urNp openswan-2.6.27-orig/Makefile.inc openswan-2.6.27-cvs-patched/Makefile.inc
+--- openswan-2.6.27-orig/Makefile.inc 2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/Makefile.inc 2010-07-02 14:39:23.856116570 -0400
@@ -123,6 +123,8 @@ FINALRCDIR=$(shell for d in $(INC_RCDIRS
do if test -d $(DESTDIR)/$$d ; \
then echo $$d ; exit 0 ; \
@@ -10,9 +10,9 @@ diff -urNp openswan-2.6.25-orig/Makefile
RCDIR=$(DESTDIR)$(FINALRCDIR)
-diff -urNp openswan-2.6.25-orig/programs/setup/Makefile openswan-2.6.25/programs/setup/Makefile
---- openswan-2.6.25-orig/programs/setup/Makefile 2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/programs/setup/Makefile 2010-03-29 12:01:08.000000000 -0400
+diff -urNp openswan-2.6.27-orig/programs/setup/Makefile openswan-2.6.27-cvs-patched/programs/setup/Makefile
+--- openswan-2.6.27-orig/programs/setup/Makefile 2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/programs/setup/Makefile 2010-07-02 14:39:52.001360412 -0400
@@ -32,7 +32,7 @@ include ${srcdir}../Makefile.program
doinstall:: setup
@rm -f $(BINDIR)/setup
openswan-ipsec-help-524146-509318.patch:
ipsec.in | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Index: openswan-ipsec-help-524146-509318.patch
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan-ipsec-help-524146-509318.patch,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -p -r1.2 -r1.3
--- openswan-ipsec-help-524146-509318.patch 29 Mar 2010 18:05:46 -0000 1.2
+++ openswan-ipsec-help-524146-509318.patch 2 Jul 2010 20:46:43 -0000 1.3
@@ -1,6 +1,6 @@
-diff -urNp openswan-2.6.25-orig/programs/ipsec/ipsec.in openswan-2.6.25/programs/ipsec/ipsec.in
---- openswan-2.6.25-orig/programs/ipsec/ipsec.in 2010-03-21 13:39:35.000000000 -0400
-+++ openswan-2.6.25/programs/ipsec/ipsec.in 2010-03-29 11:46:52.000000000 -0400
+diff -urNp openswan-2.6.27-orig/programs/ipsec/ipsec.in openswan-2.6.27-cvs-patched/programs/ipsec/ipsec.in
+--- openswan-2.6.27-orig/programs/ipsec/ipsec.in 2010-06-21 11:43:35.000000000 -0400
++++ openswan-2.6.27-cvs-patched/programs/ipsec/ipsec.in 2010-07-02 14:45:45.573355284 -0400
@@ -79,9 +79,9 @@ case "$1" in
--help)
echo "Usage: ipsec command argument ..."
Index: openswan.spec
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/openswan.spec,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -p -r1.90 -r1.91
--- openswan.spec 26 May 2010 20:36:19 -0000 1.90
+++ openswan.spec 2 Jul 2010 20:46:43 -0000 1.91
@@ -8,9 +8,9 @@
Summary: IPSEC implementation with IKEv1 and IKEv2 keying protocols
Name: openswan
-Version: 2.6.25
+Version: 2.6.27
-Release: 2%{?dist}
+Release: 1%{?dist}
License: GPLv2+
Url: http://www.openswan.org/
Source: openswan-%{version}.tar.gz
@@ -18,10 +18,9 @@ Source: openswan-%{version}.tar.gz
Source2: ipsec.conf
Patch1: openswan-2.6-relpath.patch
-Patch2: openswan-2.6-selinux.patch
-Patch3: openswan-ipsec-help-524146-509318.patch
-Patch4: openswan-rfc5114.patch
-Patch5: openswan-nm-and-584224.patch
+Patch2: openswan-ipsec-help-524146-509318.patch
+Patch3: openswan-nm-584224-600174.patch
+Patch4: openswan-600167.patch
Group: System Environment/Daemons
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
@@ -76,10 +75,9 @@ find doc/examples -type f -print0 | xarg
find doc -name .gitignore -print0 | xargs -0 rm -v
%patch1 -p1 -b .relpath
-%patch2 -p1 -b .selinux
+%patch2 -p1
%patch3 -p1
%patch4 -p1
-%patch5 -p1
%build
@@ -232,6 +230,13 @@ fi
chkconfig --add ipsec || :
%changelog
+* Fri Jul 2 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.27-1
+- NetworkManager-openswan plugin related changes
+- Fixes for bz 600167
+- Fixes for bz 600174
+- Fixes for bz 584224
+- Updated old patches
+
* Wed May 29 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.25-2
- NetworkManager-openswan plugin related changes
- Fixes for bz 584224
Index: sources
===================================================================
RCS file: /cvs/pkgs/rpms/openswan/devel/sources,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -p -r1.29 -r1.30
--- sources 29 Mar 2010 18:05:46 -0000 1.29
+++ sources 2 Jul 2010 20:46:43 -0000 1.30
@@ -1 +1 @@
-c1223786c9eb58950a4be0ab2d0a84d1 openswan-2.6.25.tar.gz
+5177b7401bb89e84ca1c89029143441e openswan-2.6.27.tar.gz
--- openswan-2.6-selinux.patch DELETED ---
--- openswan-nm-and-584224.patch DELETED ---
--- openswan-rfc5114.patch DELETED ---
More information about the scm-commits
mailing list