Thanks, applied as 19ae7cd22c60445f50b74efa64396635181c59bf. Michael
[sent from post-receive hook] On Sat, 23 Mar 2024 09:59:38 +0100, Lars Pedersen <[email protected]> wrote: > Enchancement and new features regarding OCSP and certificate use cases. > Otherwise mainly minor bugfixes. > > New configure options, which all is default disabled: > > --enable-openxpki (enable OCSP responder accessing OpenXPKI certificate > database) > --enable-cert-enroll (enable automatic certificate enrollment via EST or > SCEP) > --enable-cert-enroll-timer (enable installation of cert-enroll as a systemd) > > Signed-off-by: Lars Pedersen <[email protected]> > Message-Id: <[email protected]> > Signed-off-by: Michael Olbrich <[email protected]> > > diff --git a/rules/strongswan.make b/rules/strongswan.make > index 5f4e840dc6d7..de657eaf7ae8 100644 > --- a/rules/strongswan.make > +++ b/rules/strongswan.make > @@ -15,8 +15,8 @@ PACKAGES-$(PTXCONF_STRONGSWAN) += strongswan > # > # Paths and names > # > -STRONGSWAN_VERSION := 5.9.8 > -STRONGSWAN_MD5 := f46b0d3e7aed88824650d0721c887443 > +STRONGSWAN_VERSION := 5.9.14 > +STRONGSWAN_MD5 := 21ca3fc7c18456405d03b77266ba630a > STRONGSWAN := strongswan-$(STRONGSWAN_VERSION) > STRONGSWAN_SUFFIX := tar.bz2 > STRONGSWAN_URL := > https://download.strongswan.org/$(STRONGSWAN).$(STRONGSWAN_SUFFIX)
