Thanks, applied as 19ae7cd22c60445f50b74efa64396635181c59bf.

Michael

[sent from post-receive hook]

On Sat, 23 Mar 2024 09:59:38 +0100, Lars Pedersen <[email protected]> wrote:
> Enchancement and new features regarding OCSP and certificate use cases.
> Otherwise mainly minor bugfixes.
> 
> New configure options, which all is default disabled:
> 
>  --enable-openxpki (enable OCSP responder accessing OpenXPKI certificate 
> database)
>  --enable-cert-enroll (enable automatic certificate enrollment via EST or 
> SCEP)
>  --enable-cert-enroll-timer (enable installation of cert-enroll as a systemd)
> 
> Signed-off-by: Lars Pedersen <[email protected]>
> Message-Id: <[email protected]>
> Signed-off-by: Michael Olbrich <[email protected]>
> 
> diff --git a/rules/strongswan.make b/rules/strongswan.make
> index 5f4e840dc6d7..de657eaf7ae8 100644
> --- a/rules/strongswan.make
> +++ b/rules/strongswan.make
> @@ -15,8 +15,8 @@ PACKAGES-$(PTXCONF_STRONGSWAN) += strongswan
>  #
>  # Paths and names
>  #
> -STRONGSWAN_VERSION   := 5.9.8
> -STRONGSWAN_MD5               := f46b0d3e7aed88824650d0721c887443
> +STRONGSWAN_VERSION   := 5.9.14
> +STRONGSWAN_MD5               := 21ca3fc7c18456405d03b77266ba630a
>  STRONGSWAN           := strongswan-$(STRONGSWAN_VERSION)
>  STRONGSWAN_SUFFIX    := tar.bz2
>  STRONGSWAN_URL               := 
> https://download.strongswan.org/$(STRONGSWAN).$(STRONGSWAN_SUFFIX)

Reply via email to