summaryrefslogtreecommitdiff
path: root/security/racoon2/files/patch-crypto_openssl.c
diff options
context:
space:
mode:
authorMunechika SUMIKAWA <sumikawa@FreeBSD.org>2005-02-01 18:59:09 +0000
committerMunechika SUMIKAWA <sumikawa@FreeBSD.org>2005-02-01 18:59:09 +0000
commit62d7d46cf624821cf87cde9b9232a994f6e66d4f (patch)
treea69be1469697e76a603a0718060d42df5cfbacf6 /security/racoon2/files/patch-crypto_openssl.c
parentUnbreak on 5.x and 6.0 based on [1]. (diff)
"racoon2" is a system to exchange and to install security parameters
for the IPsec. Currently the system supports the following specification: Internet Key Exchange (IKEv2) Protocol draft-ietf-ipsec-ikev2-17.txt (The IKE daemon is not included in the current release due to IPR issue) Kerberized Internet Negotiation of Keys (KINK) draft-ietf-kink-kink-06.txt PF_KEY Key Management API, Version 2 RFC2367 The following protocols will be supported soon. The Internet Key Exchange (IKE) RFC2409 WWW: http://www.kame.net/ This port was repocopied from secutiry/racoon. PR: ports/76814
Notes
Notes: svn path=/head/; revision=127868
Diffstat (limited to 'security/racoon2/files/patch-crypto_openssl.c')
-rw-r--r--security/racoon2/files/patch-crypto_openssl.c42
1 files changed, 0 insertions, 42 deletions
diff --git a/security/racoon2/files/patch-crypto_openssl.c b/security/racoon2/files/patch-crypto_openssl.c
deleted file mode 100644
index 3f243d19c8e2..000000000000
--- a/security/racoon2/files/patch-crypto_openssl.c
+++ /dev/null
@@ -1,42 +0,0 @@
---- crypto_openssl.old.c 2004-04-09 22:25:56.000000000 +0530
-+++ crypto_openssl.c 2004-08-02 20:30:03.000000000 +0530
-@@ -1654,6 +1654,7 @@
-
- HMAC_Final((HMAC_CTX *)c, res->v, &l);
- res->l = l;
-+ HMAC_cleanup((HMAC_CTX *)c);
- (void)racoon_free(c);
-
- if (SHA512_DIGEST_LENGTH != res->l) {
-@@ -1710,6 +1711,7 @@
-
- HMAC_Final((HMAC_CTX *)c, res->v, &l);
- res->l = l;
-+ HMAC_cleanup((HMAC_CTX *)c);
- (void)racoon_free(c);
-
- if (SHA384_DIGEST_LENGTH != res->l) {
-@@ -1766,6 +1768,7 @@
-
- HMAC_Final((HMAC_CTX *)c, res->v, &l);
- res->l = l;
-+ HMAC_cleanup((HMAC_CTX *)c);
- (void)racoon_free(c);
-
- if (SHA256_DIGEST_LENGTH != res->l) {
-@@ -1823,6 +1826,7 @@
-
- HMAC_Final((HMAC_CTX *)c, res->v, &l);
- res->l = l;
-+ HMAC_cleanup((HMAC_CTX *)c);
- (void)racoon_free(c);
-
- if (SHA_DIGEST_LENGTH != res->l) {
-@@ -1879,6 +1883,7 @@
-
- HMAC_Final((HMAC_CTX *)c, res->v, &l);
- res->l = l;
-+ HMAC_cleanup((HMAC_CTX *)c);
- (void)racoon_free(c);
-
- if (MD5_DIGEST_LENGTH != res->l) {