diff options
author | Munechika SUMIKAWA <sumikawa@FreeBSD.org> | 2005-02-01 18:59:09 +0000 |
---|---|---|
committer | Munechika SUMIKAWA <sumikawa@FreeBSD.org> | 2005-02-01 18:59:09 +0000 |
commit | 62d7d46cf624821cf87cde9b9232a994f6e66d4f (patch) | |
tree | a69be1469697e76a603a0718060d42df5cfbacf6 /security/racoon2/files/patch-crypto_openssl.c | |
parent | Unbreak on 5.x and 6.0 based on [1]. (diff) |
"racoon2" is a system to exchange and to install security parameters
for the IPsec.
Currently the system supports the following specification:
Internet Key Exchange (IKEv2) Protocol
draft-ietf-ipsec-ikev2-17.txt
(The IKE daemon is not included in the current release due to IPR issue)
Kerberized Internet Negotiation of Keys (KINK)
draft-ietf-kink-kink-06.txt
PF_KEY Key Management API, Version 2
RFC2367
The following protocols will be supported soon.
The Internet Key Exchange (IKE)
RFC2409
WWW: http://www.kame.net/
This port was repocopied from secutiry/racoon.
PR: ports/76814
Notes
Notes:
svn path=/head/; revision=127868
Diffstat (limited to 'security/racoon2/files/patch-crypto_openssl.c')
-rw-r--r-- | security/racoon2/files/patch-crypto_openssl.c | 42 |
1 files changed, 0 insertions, 42 deletions
diff --git a/security/racoon2/files/patch-crypto_openssl.c b/security/racoon2/files/patch-crypto_openssl.c deleted file mode 100644 index 3f243d19c8e2..000000000000 --- a/security/racoon2/files/patch-crypto_openssl.c +++ /dev/null @@ -1,42 +0,0 @@ ---- crypto_openssl.old.c 2004-04-09 22:25:56.000000000 +0530 -+++ crypto_openssl.c 2004-08-02 20:30:03.000000000 +0530 -@@ -1654,6 +1654,7 @@ - - HMAC_Final((HMAC_CTX *)c, res->v, &l); - res->l = l; -+ HMAC_cleanup((HMAC_CTX *)c); - (void)racoon_free(c); - - if (SHA512_DIGEST_LENGTH != res->l) { -@@ -1710,6 +1711,7 @@ - - HMAC_Final((HMAC_CTX *)c, res->v, &l); - res->l = l; -+ HMAC_cleanup((HMAC_CTX *)c); - (void)racoon_free(c); - - if (SHA384_DIGEST_LENGTH != res->l) { -@@ -1766,6 +1768,7 @@ - - HMAC_Final((HMAC_CTX *)c, res->v, &l); - res->l = l; -+ HMAC_cleanup((HMAC_CTX *)c); - (void)racoon_free(c); - - if (SHA256_DIGEST_LENGTH != res->l) { -@@ -1823,6 +1826,7 @@ - - HMAC_Final((HMAC_CTX *)c, res->v, &l); - res->l = l; -+ HMAC_cleanup((HMAC_CTX *)c); - (void)racoon_free(c); - - if (SHA_DIGEST_LENGTH != res->l) { -@@ -1879,6 +1883,7 @@ - - HMAC_Final((HMAC_CTX *)c, res->v, &l); - res->l = l; -+ HMAC_cleanup((HMAC_CTX *)c); - (void)racoon_free(c); - - if (MD5_DIGEST_LENGTH != res->l) { |