From patchwork Sun Jun 2 14:02:21 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7835 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4Vsdpg5vlFz3wxX for ; Sun, 2 Jun 2024 14:02:35 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4Vsdpb0Jnhz222; Sun, 2 Jun 2024 14:02:31 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4VsdpZ5pxmz335x; Sun, 2 Jun 2024 14:02:30 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature ECDSA (secp384r1) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4VsdpW51Ypz2xb1 for ; Sun, 2 Jun 2024 14:02:27 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4VsdpV5yfWzlR; Sun, 2 Jun 2024 14:02:26 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1717336946; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZTKQeMbTDZhJliAoAZgllvOaNJLNEYAYtZOphRqusXY=; b=q5cyOeo/mbNw5SXLLtDAvvy1flqg9Z1PO6AU/RD1Y5c03o495qrH5LZRftWOknu1Nmds69 mCbt/M2LJDkvd2CA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1717336946; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZTKQeMbTDZhJliAoAZgllvOaNJLNEYAYtZOphRqusXY=; b=iUUoq1OuSHl2oRUy83cWdDk6x1VdeHxxvSY9Jr0Z6NDGDifieovhhrOItMlwa/I5ciuCyE dsGVvISEI1hcs0QEnc6fL5bTuw10UpnKKfbgIeUPWMhzoXBEULFzw0Wa8p2wdAt5iOmBut C8XCAQOeWcFQ0qGFoLKPwT0wFE71j36EUNs1j4AtQQX4AIWyKoHifwJ3OpYmBgQqkk8JFu IFCnv/DkL/Wu8oUXfaSZFFtgMY02e8n5hMqkg43KmrzXLQ5RzDBXDwe1Jq/0GeTRCECvCP +eyU24NRJ6koEsXZtxOTW7e+ROiuQiqrfkjioa44tr6ovZeYmGXPBkyaZckAOA== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] oath-toolkit: Update to version 2.6.11 Date: Sun, 2 Jun 2024 16:02:21 +0200 Message-ID: <20240602140221.3404758-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: ETZW7G2NZMEHB6QF3KLUCEJERRJFLQSF X-Message-ID-Hash: ETZW7G2NZMEHB6QF3KLUCEJERRJFLQSF X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version 2.6.9 to 2.6.11 - Update of rootfile not required - Changelog 2.6.11 ** liboath: Handle invalid base32 encoded secrets. Fixes: #41. The gnulib update in version 2.6.10 made the base32 encoding functions reject invalid encodings, but it appears as if these are wildly used. We now accept invalid encodings again. Thanks to Dorancé Martínez and Seres Bendegúz for reports. 2.6.10 ** Building from git uses a ./bootstrap script instead of 'make bootstrap'. ** Build fixes for Windows. In particular, don't use filenames "aux.h" and "aux.c" which interact badly with the AUX special filename. ** Build fixes for Arch Linux. ** Various build fixes including updated gnulib files. One remaining gnulib self-test disabled. Signed-off-by: Adolf Belka --- lfs/oath-toolkit | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/oath-toolkit b/lfs/oath-toolkit index 783d6e930..c71399985 100644 --- a/lfs/oath-toolkit +++ b/lfs/oath-toolkit @@ -1,7 +1,7 @@ ############################################################################### # # # IPFire.org - A linux based firewall # -# Copyright (C) 2022-2023 IPFire Team # +# Copyright (C) 2022-2024 IPFire Team # # # # This program is free software: you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # @@ -24,7 +24,7 @@ include Config -VER = 2.6.9 +VER = 2.6.11 THISAPP = oath-toolkit-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 572512311bbfa18d325c7b9b8d88ff85c05241c9a22942bc67edf531ed621e68b031dc4562bd8473ec1b1bfe264c8a4084c1c304ba0d24914acc5b21325b8601 +$(DL_FILE)_BLAKE2 = f3fa3ab1818f4f9bbf7c8c88432cd3432fbfb30dfcc660ab85f07e2d3d7e1616fc24579900bc55bbf72fb81b2eac4a6591553968872f07d8b3955ce4e6495afd install : $(TARGET)