diff options
author | Omar Vega Ramos <ovruni@gnu.org.pe> | 2015-09-16 19:15:33 -0500 |
---|---|---|
committer | André Fabian Silva Delgado <emulatorman@parabola.nu> | 2015-09-22 16:15:05 -0300 |
commit | 68866988f5756f3bb65e17566d706815f133d5c6 (patch) | |
tree | 292dfb203d0ad6148960119ec7b1db48c1e4ad85 | |
parent | 01d296ba1283313eac3c79f6a83414de6429a354 (diff) | |
download | abslibre-68866988f5756f3bb65e17566d706815f133d5c6.tar.gz abslibre-68866988f5756f3bb65e17566d706815f133d5c6.tar.bz2 abslibre-68866988f5756f3bb65e17566d706815f133d5c6.zip |
strongswan-5.3.3-2: updating version
-rw-r--r-- | pcr/strongswan/PKGBUILD | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/pcr/strongswan/PKGBUILD b/pcr/strongswan/PKGBUILD index c112eca97..4dde9a334 100644 --- a/pcr/strongswan/PKGBUILD +++ b/pcr/strongswan/PKGBUILD @@ -10,7 +10,7 @@ # Maintainer: Omar Vega Ramos <ovruni@gnu.org.pe> pkgname=strongswan -pkgver=5.3.2 +pkgver=5.3.3 pkgrel=2 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' @@ -30,14 +30,14 @@ eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-a fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,nonce.conf,openssl.conf,\ pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,\ revocation.conf,sha1.conf,sha2.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,\ -vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf} +vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,chapoly.conf} ) source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2") # md5 is broken. We use sha256 now. Alternatively, we could check the signature of the file, but that # doesn't yield any more security and just increases the work users initially have to invest. -sha256sums=('a4a9bc8c4e42bdc4366a87a05a02bf9f425169a7ab0c6f4482d347e44acbf225') +sha256sums=('39d2e8f572a57a77dda8dd8bdaf2ee47ad3cefeb86bbb840d594aa75f00f33e2') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -62,7 +62,7 @@ build() { --enable-ha --enable-vici --enable-swanctl --enable-systemd --enable-ext-auth \ --disable-mysql --disable-ldap -enable-cmd --enable-forecast --enable-connmark \ --enable-aesni --enable-eap-ttls --enable-radattr --enable-xauth-pam --enable-xauth-noauth \ - --enable-eap-dynamic --enable-eap-peap --enable-eap-tls + --enable-eap-dynamic --enable-eap-peap --enable-eap-tls --enable-chapoly # --enable-ruby-gems --enable-python-eggs make } |