OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /v/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-src                      Date:   22-May-2005 10:59:59
  Branch: HEAD                             Handle: 2005052209595900

  Modified files:
    openpkg-src/openvpn     openvpn.patch openvpn.spec

  Log:
    apply patch from FreeBSD port to fix file descriptor leak

  Summary:
    Revision    Changes     Path
    1.2         +52 -1      openpkg-src/openvpn/openvpn.patch
    1.45        +1  -1      openpkg-src/openvpn/openvpn.spec
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-src/openvpn/openvpn.patch
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 openvpn.patch
  --- openpkg-src/openvpn/openvpn.patch 8 May 2005 18:15:16 -0000       1.1
  +++ openpkg-src/openvpn/openvpn.patch 22 May 2005 08:59:59 -0000      1.2
  @@ -1,6 +1,57 @@
  +Index: route.c
  +--- route.c.orig     2005-04-11 05:43:56 +0200
  ++++ route.c  2005-05-22 10:58:23 +0200
  +@@ -1380,6 +1380,7 @@
  +     {
  +       warn("writing to routing socket");
  +       gc_free (&gc);
  ++      close(s);
  +       return false;
  +     }
  + 
  +@@ -1387,6 +1388,7 @@
  +     l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
  +   } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
  +                         
  ++  close(s);
  + 
  +   rtm_aux = &rtm;
  + 
  +@@ -1535,6 +1537,7 @@
  +     {
  +       msg (M_WARN, "ROUTE: problem writing to routing socket");
  +       gc_free (&gc);
  ++      close(s);
  +       return false;
  +     }
  + 
  +@@ -1542,6 +1545,7 @@
  +     l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
  +   } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
  +                         
  ++  close(s);
  + 
  +   rtm_aux = &rtm;
  + 
  +@@ -1690,6 +1694,7 @@
  +     {
  +       warn("writing to routing socket");
  +       gc_free (&gc);
  ++      close(s);
  +       return false;
  +     }
  + 
  +@@ -1697,6 +1702,7 @@
  +     l = read(s, (char *)&m_rtmsg, sizeof(m_rtmsg));
  +   } while (l > 0 && (rtm.rtm_seq != seq || rtm.rtm_pid != pid));
  +                         
  ++  close(s);
  + 
  +   rtm_aux = &rtm;
  + 
   Index: sample-scripts/verify-cn
   --- sample-scripts/verify-cn.orig    2005-02-07 03:08:16 +0100
  -+++ sample-scripts/verify-cn 2005-05-08 19:23:11 +0200
  ++++ sample-scripts/verify-cn 2005-05-22 10:58:23 +0200
   @@ -36,7 +36,8 @@
        if ($x509 =~ /\/CN=([^\/]+)/) {
        # Accept the connection if the X509 common name
  @@ .
  patch -p0 <<'@@ .'
  Index: openpkg-src/openvpn/openvpn.spec
  ============================================================================
  $ cvs diff -u -r1.44 -r1.45 openvpn.spec
  --- openpkg-src/openvpn/openvpn.spec  9 May 2005 11:17:14 -0000       1.44
  +++ openpkg-src/openvpn/openvpn.spec  22 May 2005 08:59:59 -0000      1.45
  @@ -37,7 +37,7 @@
   Group:        Network
   License:      GPL
   Version:      %{V_opkg}
  -Release:      20050509
  +Release:      20050522
   
   #   package options
   %option       with_fsl  yes
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [email protected]

Reply via email to