Gentoo Archives: gentoo-commits

From: Sam James <sam@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/musl:master commit in: net-vpn/ipsec-tools/files/, net-vpn/ipsec-tools/
Date: Tue, 07 Dec 2021 07:28:46
Message-Id: 1638861805.2e87c63750bc66c1dc9e270f3f76f6490efec090.sam@gentoo
1 commit: 2e87c63750bc66c1dc9e270f3f76f6490efec090
2 Author: Sam James <sam <AT> gentoo <DOT> org>
3 AuthorDate: Tue Dec 7 07:23:23 2021 +0000
4 Commit: Sam James <sam <AT> gentoo <DOT> org>
5 CommitDate: Tue Dec 7 07:23:25 2021 +0000
6 URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=2e87c637
7
8 net-vpn/ipsec-tools: treeclean (dropped from ::gentoo)
9
10 Signed-off-by: Sam James <sam <AT> gentoo.org>
11
12 net-vpn/ipsec-tools/Manifest | 1 -
13 .../files/ipsec-tools-0.8.0-sysctl.patch | 22 --
14 .../files/ipsec-tools-CVE-2015-4047.patch | 16 --
15 .../ipsec-tools/files/ipsec-tools-def-psk.patch | 25 --
16 .../files/ipsec-tools-include-vendoridh.patch | 11 -
17 .../files/ipsec-tools-remove_GLOB_TILDE.patch | 24 --
18 .../ipsec-tools/files/ipsec-tools-remove__P.patch | 137 ----------
19 .../files/ipsec-tools-replace-strtouq.patch | 16 --
20 net-vpn/ipsec-tools/files/ipsec-tools.conf | 26 --
21 net-vpn/ipsec-tools/files/ipsec-tools.service | 12 -
22 net-vpn/ipsec-tools/files/psk.txt | 10 -
23 net-vpn/ipsec-tools/files/racoon.conf | 33 ---
24 net-vpn/ipsec-tools/files/racoon.conf.d-r2 | 29 ---
25 net-vpn/ipsec-tools/files/racoon.init.d-r3 | 57 ----
26 net-vpn/ipsec-tools/files/racoon.pam.d | 4 -
27 net-vpn/ipsec-tools/files/racoon.service | 11 -
28 net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild | 286 ---------------------
29 net-vpn/ipsec-tools/metadata.xml | 17 --
30 18 files changed, 737 deletions(-)
31
32 diff --git a/net-vpn/ipsec-tools/Manifest b/net-vpn/ipsec-tools/Manifest
33 deleted file mode 100644
34 index e78840e7..00000000
35 --- a/net-vpn/ipsec-tools/Manifest
36 +++ /dev/null
37 @@ -1 +0,0 @@
38 -DIST ipsec-tools-0.8.2.tar.bz2 866465 BLAKE2B cf8c9175d96326fc5c74e6b1921bc66911256e289e6fe9cef77f26c197546902be3ebd5696af39c749a2abaac3f42010c9e2a281fd208122cd59222044b9dd4c SHA512 2b7d0efa908d3a699be7ef8b2b126a3809956cb7add50e8efb1cfdfc2d9b70c39ef517379cb9a4fad9e5f0c25937e98535b06c32bd3e729f5129da4ab133e30f
39
40 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch b/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch
41 deleted file mode 100644
42 index 5c69bbb2..00000000
43 --- a/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch
44 +++ /dev/null
45 @@ -1,22 +0,0 @@
46 -https://bugs.gentoo.org/425770
47 -
48 ---- a/src/racoon/pfkey.c
49 -+++ b/src/racoon/pfkey.c
50 -@@ -59,7 +59,6 @@
51 - #include <sys/param.h>
52 - #include <sys/socket.h>
53 - #include <sys/queue.h>
54 --#include <sys/sysctl.h>
55 -
56 - #include <net/route.h>
57 - #include <net/pfkeyv2.h>
58 ---- a/src/setkey/setkey.c
59 -+++ b/src/setkey/setkey.c
60 -@@ -40,7 +40,6 @@
61 - #include <sys/socket.h>
62 - #include <sys/time.h>
63 - #include <sys/stat.h>
64 --#include <sys/sysctl.h>
65 - #include <err.h>
66 - #include <netinet/in.h>
67 - #include <net/pfkeyv2.h>
68
69 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch b/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch
70 deleted file mode 100644
71 index 58f72e10..00000000
72 --- a/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch
73 +++ /dev/null
74 @@ -1,16 +0,0 @@
75 -See: https://bugs.gentoo.org/show_bug.cgi?id=550118
76 -
77 ---- ./src/racoon/gssapi.c 9 Sep 2006 16:22:09 -0000 1.4
78 -+++ ./src/racoon/gssapi.c 19 May 2015 15:16:00 -0000 1.6
79 -@@ -192,6 +192,11 @@
80 - gss_name_t princ, canon_princ;
81 - OM_uint32 maj_stat, min_stat;
82 -
83 -+ if (iph1->rmconf == NULL) {
84 -+ plog(LLV_ERROR, LOCATION, NULL, "no remote config\n");
85 -+ return -1;
86 -+ }
87 -+
88 - gps = racoon_calloc(1, sizeof (struct gssapi_ph1_state));
89 - if (gps == NULL) {
90 - plog(LLV_ERROR, LOCATION, NULL, "racoon_calloc failed\n");
91
92 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch b/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch
93 deleted file mode 100644
94 index f351860a..00000000
95 --- a/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch
96 +++ /dev/null
97 @@ -1,25 +0,0 @@
98 -diff -brau ipsec-tools-0.7.3.o/src/racoon/oakley.c ipsec-tools-0.7.3/src/racoon/oakley.c
99 ---- ipsec-tools-0.7.3.o/src/racoon/oakley.c 2009-08-13 11:18:45.000000000 +0200
100 -+++ ipsec-tools-0.7.3/src/racoon/oakley.c 2011-06-06 09:36:11.000000000 +0200
101 -@@ -2498,8 +2498,21 @@
102 - plog(LLV_ERROR, LOCATION, iph1->remote,
103 - "couldn't find the pskey for %s.\n",
104 - saddrwop2str(iph1->remote));
105 -+ }
106 -+ }
107 -+ if (iph1->authstr == NULL) {
108 -+ /*
109 -+ * If we could not locate a psk above try and locate
110 -+ * the default psk, ie, "*".
111 -+ */
112 -+ iph1->authstr = privsep_getpsk("*", 1);
113 -+ if (iph1->authstr == NULL) {
114 -+ plog(LLV_ERROR, LOCATION, iph1->remote,
115 -+ "couldn't find the the default pskey either.\n");
116 - goto end;
117 - }
118 -+ plog(LLV_NOTIFY, LOCATION, iph1->remote,
119 -+ "Using default PSK.\n");
120 - }
121 - plog(LLV_DEBUG, LOCATION, NULL, "the psk found.\n");
122 - /* should be secret PSK */
123
124 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch b/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch
125 deleted file mode 100644
126 index 2e22c82d..00000000
127 --- a/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch
128 +++ /dev/null
129 @@ -1,11 +0,0 @@
130 -diff -Naur ipsec-tools-0.8.0.orig//src/racoon/ipsec_doi.c ipsec-tools-0.8.0/src/racoon/ipsec_doi.c
131 ---- ipsec-tools-0.8.0.orig//src/racoon/ipsec_doi.c 2012-02-28 13:42:24.000000000 -0500
132 -+++ ipsec-tools-0.8.0/src/racoon/ipsec_doi.c 2012-02-28 13:41:22.000000000 -0500
133 -@@ -87,6 +87,7 @@
134 - #ifdef HAVE_GSSAPI
135 - #include <iconv.h>
136 - #include "gssapi.h"
137 -+#include "vendorid.h"
138 - #ifdef HAVE_ICONV_2ND_CONST
139 - #define __iconv_const const
140 - #else
141
142 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch b/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch
143 deleted file mode 100644
144 index 25984f48..00000000
145 --- a/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch
146 +++ /dev/null
147 @@ -1,24 +0,0 @@
148 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/cftoken.c ipsec-tools-0.8.2/src/racoon/cftoken.c
149 ---- ipsec-tools-0.8.2.orig/src/racoon/cftoken.c 2012-08-29 11:24:51.000000000 +0000
150 -+++ ipsec-tools-0.8.2/src/racoon/cftoken.c 2018-08-11 08:01:12.177136634 +0000
151 -@@ -4753,7 +4753,7 @@
152 - return -1;
153 - }
154 -
155 -- if (glob(path, GLOB_TILDE, NULL, &incstack[incstackp].matches) != 0 ||
156 -+ if (glob(path, 0, NULL, &incstack[incstackp].matches) != 0 ||
157 - incstack[incstackp].matches.gl_pathc == 0) {
158 - plog(LLV_ERROR, LOCATION, NULL,
159 - "glob found no matches for path \"%s\"\n", path);
160 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/cftoken.l ipsec-tools-0.8.2/src/racoon/cftoken.l
161 ---- ipsec-tools-0.8.2.orig/src/racoon/cftoken.l 2012-08-29 08:42:24.000000000 +0000
162 -+++ ipsec-tools-0.8.2/src/racoon/cftoken.l 2018-08-11 08:01:21.512854300 +0000
163 -@@ -725,7 +725,7 @@
164 - return -1;
165 - }
166 -
167 -- if (glob(path, GLOB_TILDE, NULL, &incstack[incstackp].matches) != 0 ||
168 -+ if (glob(path, 0, NULL, &incstack[incstackp].matches) != 0 ||
169 - incstack[incstackp].matches.gl_pathc == 0) {
170 - plog(LLV_ERROR, LOCATION, NULL,
171 - "glob found no matches for path \"%s\"\n", path);
172
173 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch b/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch
174 deleted file mode 100644
175 index a0a44f50..00000000
176 --- a/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch
177 +++ /dev/null
178 @@ -1,137 +0,0 @@
179 -diff -Naur ipsec-tools-0.8.2.orig/src/libipsec/ipsec_strerror.h ipsec-tools-0.8.2/src/libipsec/ipsec_strerror.h
180 ---- ipsec-tools-0.8.2.orig/src/libipsec/ipsec_strerror.h 2006-09-09 16:22:09.000000000 +0000
181 -+++ ipsec-tools-0.8.2/src/libipsec/ipsec_strerror.h 2018-08-11 06:56:43.378265279 +0000
182 -@@ -34,6 +34,8 @@
183 - #ifndef _IPSEC_STRERROR_H
184 - #define _IPSEC_STRERROR_H
185 -
186 -+#define __P(protos) protos
187 -+
188 - extern int __ipsec_errcode;
189 - extern void __ipsec_set_strerror __P((const char *));
190 -
191 -diff -Naur ipsec-tools-0.8.2.orig/src/libipsec/libpfkey.h ipsec-tools-0.8.2/src/libipsec/libpfkey.h
192 ---- ipsec-tools-0.8.2.orig/src/libipsec/libpfkey.h 2012-08-23 11:10:45.000000000 +0000
193 -+++ ipsec-tools-0.8.2/src/libipsec/libpfkey.h 2018-08-11 06:58:44.102604340 +0000
194 -@@ -44,6 +44,8 @@
195 - #define PRIORITY_OFFSET_POSITIVE_MAX 0x3fffffff
196 - #define PRIORITY_OFFSET_NEGATIVE_MAX 0x40000000
197 -
198 -+#define __P(protos) protos
199 -+
200 - struct sadb_msg;
201 - extern void pfkey_sadump __P((struct sadb_msg *));
202 - extern void pfkey_sadump_withports __P((struct sadb_msg *));
203 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/gnuc.h ipsec-tools-0.8.2/src/racoon/gnuc.h
204 ---- ipsec-tools-0.8.2.orig/src/racoon/gnuc.h 2006-09-09 16:22:09.000000000 +0000
205 -+++ ipsec-tools-0.8.2/src/racoon/gnuc.h 2018-08-11 06:54:00.543203861 +0000
206 -@@ -3,14 +3,7 @@
207 - /* Id: gnuc.h,v 1.4 2004/11/18 15:14:44 ludvigm Exp */
208 -
209 - /* Define __P() macro, if necessary */
210 --#undef __P
211 --#ifndef __P
212 --#if __STDC__
213 - #define __P(protos) protos
214 --#else
215 --#define __P(protos) ()
216 --#endif
217 --#endif
218 -
219 - /* inline foo */
220 - #ifdef __GNUC__
221 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/logger.h ipsec-tools-0.8.2/src/racoon/logger.h
222 ---- ipsec-tools-0.8.2.orig/src/racoon/logger.h 2006-09-09 16:22:09.000000000 +0000
223 -+++ ipsec-tools-0.8.2/src/racoon/logger.h 2018-08-11 07:04:12.320653159 +0000
224 -@@ -42,6 +42,8 @@
225 - char *fname;
226 - };
227 -
228 -+#define __P(protos) protos
229 -+
230 - extern struct log *log_open __P((size_t, char *));
231 - extern void log_add __P((struct log *, char *));
232 - extern int log_print __P((struct log *, char *));
233 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/misc.h ipsec-tools-0.8.2/src/racoon/misc.h
234 ---- ipsec-tools-0.8.2.orig/src/racoon/misc.h 2008-07-15 00:47:09.000000000 +0000
235 -+++ ipsec-tools-0.8.2/src/racoon/misc.h 2018-08-11 07:01:29.029603601 +0000
236 -@@ -42,6 +42,8 @@
237 - #define LOCATION debug_location(__FILE__, __LINE__, NULL)
238 - #endif
239 -
240 -+#define __P(protos) protos
241 -+
242 - extern int racoon_hexdump __P((void *, size_t));
243 - extern char *bit2str __P((int, int));
244 - extern void *get_newbuf __P((void *, size_t));
245 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/missing/crypto/sha2/sha2.h ipsec-tools-0.8.2/src/racoon/missing/crypto/sha2/sha2.h
246 ---- ipsec-tools-0.8.2.orig/src/racoon/missing/crypto/sha2/sha2.h 2006-09-09 16:22:36.000000000 +0000
247 -+++ ipsec-tools-0.8.2/src/racoon/missing/crypto/sha2/sha2.h 2018-08-11 07:04:57.967269426 +0000
248 -@@ -119,6 +119,8 @@
249 -
250 - /*** SHA-256/384/512 Function Prototypes ******************************/
251 -
252 -+#define __P(protos) protos
253 -+
254 - #ifndef HAVE_SHA2_IN_SHA_H
255 - void SHA256_Init __P((SHA256_CTX *));
256 - void SHA256_Update __P((SHA256_CTX*, const u_int8_t*, size_t));
257 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/netdb_dnssec.h ipsec-tools-0.8.2/src/racoon/netdb_dnssec.h
258 ---- ipsec-tools-0.8.2.orig/src/racoon/netdb_dnssec.h 2006-09-09 16:22:09.000000000 +0000
259 -+++ ipsec-tools-0.8.2/src/racoon/netdb_dnssec.h 2018-08-11 07:06:07.145172460 +0000
260 -@@ -68,6 +68,8 @@
261 - struct certinfo *ci_next; /* next structure */
262 - };
263 -
264 -+#define __P(protos) protos
265 -+
266 - extern void freecertinfo __P((struct certinfo *));
267 - extern int getcertsbyname __P((char *, struct certinfo **));
268 -
269 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/plog.h ipsec-tools-0.8.2/src/racoon/plog.h
270 ---- ipsec-tools-0.8.2.orig/src/racoon/plog.h 2007-10-02 09:47:40.000000000 +0000
271 -+++ ipsec-tools-0.8.2/src/racoon/plog.h 2018-08-11 07:06:55.163716961 +0000
272 -@@ -63,6 +63,8 @@
273 - extern int f_foreground;
274 - extern int print_location;
275 -
276 -+#define __P(protos) protos
277 -+
278 - struct sockaddr;
279 - #define plog(pri, ...) \
280 - do { \
281 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/str2val.h ipsec-tools-0.8.2/src/racoon/str2val.h
282 ---- ipsec-tools-0.8.2.orig/src/racoon/str2val.h 2006-09-09 16:22:10.000000000 +0000
283 -+++ ipsec-tools-0.8.2/src/racoon/str2val.h 2018-08-11 07:05:31.530252028 +0000
284 -@@ -34,6 +34,8 @@
285 - #ifndef _STR2VAL_H
286 - #define _STR2VAL_H
287 -
288 -+#define __P(protos) protos
289 -+
290 - extern caddr_t val2str __P((const char *, size_t));
291 - extern char *str2val __P((const char *, int, size_t *));
292 -
293 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/vmbuf.h ipsec-tools-0.8.2/src/racoon/vmbuf.h
294 ---- ipsec-tools-0.8.2.orig/src/racoon/vmbuf.h 2006-09-09 16:22:10.000000000 +0000
295 -+++ ipsec-tools-0.8.2/src/racoon/vmbuf.h 2018-08-11 07:03:41.489587802 +0000
296 -@@ -65,6 +65,8 @@
297 - #define vfree vmbuf_free
298 - #endif
299 -
300 -+#define __P(protos) protos
301 -+
302 - extern vchar_t *vmalloc __P((size_t));
303 - extern vchar_t *vrealloc __P((vchar_t *, size_t));
304 - extern void vfree __P((vchar_t *));
305 -diff -Naur ipsec-tools-0.8.2.orig/src/setkey/extern.h ipsec-tools-0.8.2/src/setkey/extern.h
306 ---- ipsec-tools-0.8.2.orig/src/setkey/extern.h 2009-03-06 11:45:03.000000000 +0000
307 -+++ ipsec-tools-0.8.2/src/setkey/extern.h 2018-08-11 06:59:26.933305604 +0000
308 -@@ -1,6 +1,6 @@
309 - /* $NetBSD: extern.h,v 1.5 2009/03/06 11:45:03 tteras Exp $ */
310 -
311 --
312 -+#define __P(protos) protos
313 -
314 - void parse_init __P((void));
315 - int parse __P((FILE **));
316
317 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch b/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch
318 deleted file mode 100644
319 index 73baf36e..00000000
320 --- a/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch
321 +++ /dev/null
322 @@ -1,16 +0,0 @@
323 -diff -Naur ipsec-tools-0.8.2.orig/src/racoon/backupsa.c ipsec-tools-0.8.2/src/racoon/backupsa.c
324 ---- ipsec-tools-0.8.2.orig/src/racoon/backupsa.c 2010-04-02 15:15:00.000000000 +0000
325 -+++ ipsec-tools-0.8.2/src/racoon/backupsa.c 2018-08-11 14:22:15.868343597 +0000
326 -@@ -276,9 +276,9 @@
327 - GETNEXTNUM(sa_args.a_keylen, strtoul);
328 - GETNEXTNUM(sa_args.flags, strtoul);
329 - GETNEXTNUM(sa_args.l_alloc, strtoul);
330 -- GETNEXTNUM(sa_args.l_bytes, strtouq);
331 -- GETNEXTNUM(sa_args.l_addtime, strtouq);
332 -- GETNEXTNUM(sa_args.l_usetime, strtouq);
333 -+ GETNEXTNUM(sa_args.l_bytes, strtoull);
334 -+ GETNEXTNUM(sa_args.l_addtime, strtoull);
335 -+ GETNEXTNUM(sa_args.l_usetime, strtoull);
336 - GETNEXTNUM(sa_args.seq, strtoul);
337 -
338 - #undef GETNEXTNUM
339
340 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools.conf b/net-vpn/ipsec-tools/files/ipsec-tools.conf
341 deleted file mode 100644
342 index bfff04af..00000000
343 --- a/net-vpn/ipsec-tools/files/ipsec-tools.conf
344 +++ /dev/null
345 @@ -1,26 +0,0 @@
346 -#!/usr/sbin/setkey -f
347 -#
348 -# THIS IS A SAMPLE FILE!
349 -#
350 -# This is a sample file to test Gentoo's ipsec-tools out of the box.
351 -# Do not use it in production. See: http://www.ipsec-howto.org/
352 -#
353 -flush;
354 -spdflush;
355 -
356 -#
357 -# Uncomment the following if you want to do manual keying, ie, you want to run IPsec without racoon.
358 -# Do not switch 192.168.3.21 <-> 192.168.3.25 on the peer
359 -#
360 -#add 192.168.3.25 192.168.3.21 ah 0x200 -A hmac-md5 0xc0291ff014dccdd03874d9e8e4cdf3e6;
361 -#add 192.168.3.21 192.168.3.25 ah 0x300 -A hmac-md5 0x96358c90783bbfa3d7b196ceabe0536b;
362 -#add 192.168.3.25 192.168.3.21 esp 0x201 -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831;
363 -#add 192.168.3.21 192.168.3.25 esp 0x301 -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df;
364 -
365 -#
366 -# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer
367 -#
368 -#spdadd 192.168.3.21 192.168.3.25 any -P out ipsec esp/transport//require ah/transport//require;
369 -#spdadd 192.168.3.25 192.168.3.21 any -P in ipsec esp/transport//require ah/transport//require;
370 -spdadd 192.168.3.25 192.168.3.21 any -P out ipsec esp/transport//require ah/transport//require;
371 -spdadd 192.168.3.21 192.168.3.25 any -P in ipsec esp/transport//require ah/transport//require;
372
373 diff --git a/net-vpn/ipsec-tools/files/ipsec-tools.service b/net-vpn/ipsec-tools/files/ipsec-tools.service
374 deleted file mode 100644
375 index 0341aa7e..00000000
376 --- a/net-vpn/ipsec-tools/files/ipsec-tools.service
377 +++ /dev/null
378 @@ -1,12 +0,0 @@
379 -[Unit]
380 -Description=Load IPSec Security Policy Database
381 -After=syslog.target network.target
382 -
383 -[Service]
384 -Type=oneshot
385 -RemainAfterExit=true
386 -ExecStart=/usr/sbin/setkey -k -f /etc/ipsec-tools.conf
387 -ExecStop=/usr/sbin/setkey -F -P ; /usr/sbin/setkey -F
388 -
389 -[Install]
390 -WantedBy=multi-user.target
391
392 diff --git a/net-vpn/ipsec-tools/files/psk.txt b/net-vpn/ipsec-tools/files/psk.txt
393 deleted file mode 100644
394 index 97f5180f..00000000
395 --- a/net-vpn/ipsec-tools/files/psk.txt
396 +++ /dev/null
397 @@ -1,10 +0,0 @@
398 -# THIS IS A SAMPLE FILE!
399 -#
400 -# This is a sample file to test Gentoo's ipsec-tools out of the box.
401 -# Do not use it in production. See: http://www.ipsec-howto.org/
402 -#
403 -# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer
404 -#
405 -# Peer IP/FQDN Secret
406 -# 192.168.3.25 sample
407 -192.168.3.21 sample
408
409 diff --git a/net-vpn/ipsec-tools/files/racoon.conf b/net-vpn/ipsec-tools/files/racoon.conf
410 deleted file mode 100644
411 index 2e9206db..00000000
412 --- a/net-vpn/ipsec-tools/files/racoon.conf
413 +++ /dev/null
414 @@ -1,33 +0,0 @@
415 -# THIS IS A SAMPLE FILE!
416 -#
417 -# This is a sample file to test Gentoo's ipsec-tools out of the box.
418 -# Do not use it in production. See: http://www.ipsec-howto.org/
419 -#
420 -path pre_shared_key "/etc/racoon/psk.txt";
421 -
422 -#
423 -# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer
424 -#
425 -#remote 192.168.3.25
426 -remote 192.168.3.21
427 -{
428 - exchange_mode main;
429 - proposal {
430 - encryption_algorithm 3des;
431 - hash_algorithm md5;
432 - authentication_method pre_shared_key;
433 - dh_group modp1024;
434 - }
435 -}
436 -
437 -#
438 -# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer
439 -#
440 -#sainfo address 192.168.3.21 any address 192.168.3.25 any
441 -sainfo address 192.168.3.25 any address 192.168.3.21 any
442 -{
443 - pfs_group modp768;
444 - encryption_algorithm 3des;
445 - authentication_algorithm hmac_md5;
446 - compression_algorithm deflate;
447 -}
448
449 diff --git a/net-vpn/ipsec-tools/files/racoon.conf.d-r2 b/net-vpn/ipsec-tools/files/racoon.conf.d-r2
450 deleted file mode 100644
451 index cbb04807..00000000
452 --- a/net-vpn/ipsec-tools/files/racoon.conf.d-r2
453 +++ /dev/null
454 @@ -1,29 +0,0 @@
455 -# Copyright 1999-2018 Gentoo Foundation
456 -# Distributed under the terms of the GNU General Public License v2
457 -
458 -# Config file for /etc/init.d/racoon
459 -
460 -# See the man page or run `racoon --help` for valid command-line options
461 -# RACOON_OPTS="-d"
462 -
463 -RACOON_CONF="/etc/racoon/racoon.conf"
464 -RACOON_PSK_FILE="/etc/racoon/psk.txt"
465 -
466 -# The amount of time in ms for start-stop-daemon to wait before a timeout
467 -# Racoon can sometimes be slow. We'll wait 1 sec. Bug #435398.
468 -
469 -RACOON_WAIT="1000"
470 -
471 -# The setkey config file. Don't name it ipsec.conf as this clashes
472 -# with strongswan. We'll follow debian's naming. Bug #436144.
473 -
474 -SETKEY_CONF="/etc/ipsec-tools.conf"
475 -
476 -# Comment or remove the following if you don't want the policy tables
477 -# to be flushed when racoon is stopped.
478 -
479 -RACOON_RESET_TABLES="true"
480 -
481 -# If you need to set custom options to the setkey command when loading rules, use this
482 -# more info in the setkey mangage (example below sets kernel mode instead of RFC mode):
483 -#SETKEY_OPTS="-k"
484
485 diff --git a/net-vpn/ipsec-tools/files/racoon.init.d-r3 b/net-vpn/ipsec-tools/files/racoon.init.d-r3
486 deleted file mode 100644
487 index 61a37697..00000000
488 --- a/net-vpn/ipsec-tools/files/racoon.init.d-r3
489 +++ /dev/null
490 @@ -1,57 +0,0 @@
491 -#!/sbin/openrc-run
492 -# Copyright 1999-2018 Gentoo Foundation
493 -# Distributed under the terms of the GNU General Public License v2
494 -
495 -depend() {
496 - before netmount
497 - use net
498 -}
499 -
500 -checkconfig() {
501 - if [ ! -e ${SETKEY_CONF} ] ; then
502 - eerror "You need to configure setkey before starting racoon."
503 - return 1
504 - fi
505 - if [ ! -e ${RACOON_CONF} ] ; then
506 - eerror "You need a configuration file to start racoon."
507 - return 1
508 - fi
509 - if [ ! -z ${RACOON_PSK_FILE} ] ; then
510 - if [ ! -f ${RACOON_PSK_FILE} ] ; then
511 - eerror "PSK file not found as specified."
512 - eerror "Set RACOON_PSK_FILE in /etc/conf.d/racoon."
513 - return 1
514 - fi
515 - case "`ls -Lldn ${RACOON_PSK_FILE}`" in
516 - -r--------*)
517 - ;;
518 - *)
519 - eerror "Your defined PSK file should be mode 400 for security!"
520 - return 1
521 - ;;
522 - esac
523 - fi
524 -}
525 -
526 -command=/usr/sbin/racoon
527 -command_args="-f ${RACOON_CONF} ${RACOON_OPTS}"
528 -pidfile=/var/run/racoon.pid
529 -start_stop_daemon_args="--wait ${RACOON_WAIT}"
530 -
531 -start_pre() {
532 - checkconfig || return 1
533 - einfo "Loading ipsec policies from ${SETKEY_CONF}."
534 - /usr/sbin/setkey ${SETKEY_OPTS} -f ${SETKEY_CONF}
535 - if [ $? -eq 1 ] ; then
536 - eerror "Error while loading ipsec policies"
537 - fi
538 -}
539 -
540 -stop_post() {
541 - if [ -n "${RACOON_RESET_TABLES}" ]; then
542 - ebegin "Flushing policy entries"
543 - /usr/sbin/setkey -F
544 - /usr/sbin/setkey -FP
545 - eend $?
546 - fi
547 -}
548
549 diff --git a/net-vpn/ipsec-tools/files/racoon.pam.d b/net-vpn/ipsec-tools/files/racoon.pam.d
550 deleted file mode 100644
551 index b801aaaf..00000000
552 --- a/net-vpn/ipsec-tools/files/racoon.pam.d
553 +++ /dev/null
554 @@ -1,4 +0,0 @@
555 -auth include system-remote-login
556 -account include system-remote-login
557 -password include system-remote-login
558 -session include system-remote-login
559
560 diff --git a/net-vpn/ipsec-tools/files/racoon.service b/net-vpn/ipsec-tools/files/racoon.service
561 deleted file mode 100644
562 index df7f1bb8..00000000
563 --- a/net-vpn/ipsec-tools/files/racoon.service
564 +++ /dev/null
565 @@ -1,11 +0,0 @@
566 -[Unit]
567 -Description=Racoon IKEv1 key management daemon for IPSEC
568 -After=syslog.target network.target
569 -Requires=ipsec-tools.service
570 -
571 -[Service]
572 -Type=forking
573 -ExecStart=/usr/sbin/racoon -f /etc/racoon/racoon.conf
574 -
575 -[Install]
576 -WantedBy=multi-user.target
577
578 diff --git a/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild b/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild
579 deleted file mode 100644
580 index 578041ca..00000000
581 --- a/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild
582 +++ /dev/null
583 @@ -1,286 +0,0 @@
584 -# Copyright 1999-2021 Gentoo Authors
585 -# Distributed under the terms of the GNU General Public License v2
586 -
587 -EAPI="6"
588 -
589 -inherit flag-o-matic autotools linux-info pam systemd
590 -
591 -DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation"
592 -HOMEPAGE="http://ipsec-tools.sourceforge.net/"
593 -SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2"
594 -
595 -LICENSE="BSD GPL-2"
596 -SLOT="0"
597 -KEYWORDS="amd64 arm ~mips ppc ppc64 x86"
598 -IUSE="hybrid idea ipv6 kerberos ldap nat pam rc5 readline selinux stats"
599 -
600 -CDEPEND="
601 - dev-libs/openssl:0
602 - kerberos? ( virtual/krb5 )
603 - ldap? ( net-nds/openldap )
604 - pam? ( sys-libs/pam )
605 - readline? ( sys-libs/readline:0= )
606 - selinux? ( sys-libs/libselinux )"
607 -
608 -DEPEND="${CDEPEND}
609 - >=sys-kernel/linux-headers-2.6.30"
610 -
611 -RDEPEND="${CDEPEND}
612 - selinux? ( sec-policy/selinux-ipsec )
613 -"
614 -
615 -pkg_preinst() {
616 - if has_version "<${CATEGORY}/${PN}-0.8.0-r5" ; then
617 - ewarn
618 - ewarn "\033[1;33m**************************************************\033[00m"
619 - ewarn
620 - if ! has_version "net-vpn/strongswan" &&
621 - ! has_version "net-misc/openswan" &&
622 - ! has_version "net-vpn/libreswan"; then
623 - ewarn "We found an earlier version of ${PN} installed."
624 - ewarn "As of ${PN}-0.8.0-r5, the old configuration file,"
625 - ewarn "ipsec.conf, has been changed to ipsec-tools.conf to avoid"
626 - ewarn "a conflict with net-vpn/strongswan; bug #436144. We will"
627 - ewarn "rename this file for you with this upgrade. However, if"
628 - ewarn "you later downgrade, you'll have to rename the file to"
629 - ewarn "its orignal manually or change /etc/conf.d/racoon to point"
630 - ewarn "to the new file."
631 -
632 - if [[ -f /etc/ipsec.conf && ! -f /etc/ipsec-tools.conf ]] ; then
633 - mv /etc/ipsec.conf /etc/ipsec-tools.conf
634 - else
635 - ewarn
636 - ewarn "Oops! I can't move ipsec.conf to ipsec-tools.conf!"
637 - ewarn "Either the former doesn't exist or the later does and"
638 - ewarn "I won't clobber it. Please fix this situation manually."
639 - fi
640 - else
641 - ewarn "You had both an earlier version of ${PN} and"
642 - ewarn "net-vpn/strongswan installed. I can't tell whether"
643 - ewarn "the configuration file, ipsec.conf, belongs to one"
644 - ewarn "package or the other due to a file conflict; bug #436144."
645 - ewarn "The current version of ${PN} uses ipsec-tools.conf"
646 - ewarn "as its configuration file, as will future versions."
647 - ewarn "Please fix this situation manually."
648 - fi
649 - ewarn
650 - ewarn "\033[1;33m**************************************************\033[00m"
651 - ewarn
652 - fi
653 -}
654 -
655 -pkg_setup() {
656 - linux-info_pkg_setup
657 -
658 - get_version
659 -
660 - if linux_config_exists && kernel_is -ge 2 6 19; then
661 - ewarn
662 - ewarn "\033[1;33m**************************************************\033[00m"
663 - ewarn
664 - ewarn "Checking kernel configuration in /usr/src/linux or"
665 - ewarn "or /proc/config.gz for compatibility with ${PN}."
666 - ewarn "Here are the potential problems:"
667 - ewarn
668 -
669 - local nothing="1"
670 -
671 - # Check options for all flavors of IPSec
672 - local msg=""
673 - for i in XFRM_USER NET_KEY; do
674 - if ! linux_chkconfig_present ${i}; then
675 - msg="${msg} ${i}"
676 - fi
677 - done
678 - if [[ ! -z "$msg" ]]; then
679 - nothing="0"
680 - ewarn
681 - ewarn "ALL IPSec may fail. CHECK:"
682 - ewarn "${msg}"
683 - fi
684 -
685 - # Check unencrypted IPSec
686 - if ! linux_chkconfig_present CRYPTO_NULL; then
687 - nothing="0"
688 - ewarn
689 - ewarn "Unencrypted IPSec may fail. CHECK:"
690 - ewarn " CRYPTO_NULL"
691 - fi
692 -
693 - # Check IPv4 IPSec
694 - msg=""
695 - for i in \
696 - INET_IPCOMP INET_AH INET_ESP \
697 - INET_XFRM_MODE_TRANSPORT \
698 - INET_XFRM_MODE_TUNNEL \
699 - INET_XFRM_MODE_BEET
700 - do
701 - if ! linux_chkconfig_present ${i}; then
702 - msg="${msg} ${i}"
703 - fi
704 - done
705 - if [[ ! -z "$msg" ]]; then
706 - nothing="0"
707 - ewarn
708 - ewarn "IPv4 IPSec may fail. CHECK:"
709 - ewarn "${msg}"
710 - fi
711 -
712 - # Check IPv6 IPSec
713 - if use ipv6; then
714 - msg=""
715 - for i in INET6_IPCOMP INET6_AH INET6_ESP \
716 - INET6_XFRM_MODE_TRANSPORT \
717 - INET6_XFRM_MODE_TUNNEL \
718 - INET6_XFRM_MODE_BEET
719 - do
720 - if ! linux_chkconfig_present ${i}; then
721 - msg="${msg} ${i}"
722 - fi
723 - done
724 - if [[ ! -z "$msg" ]]; then
725 - nothing="0"
726 - ewarn
727 - ewarn "IPv6 IPSec may fail. CHECK:"
728 - ewarn "${msg}"
729 - fi
730 - fi
731 -
732 - # Check IPSec behind NAT
733 - if use nat; then
734 - if ! linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; then
735 - nothing="0"
736 - ewarn
737 - ewarn "IPSec behind NAT may fail. CHECK:"
738 - ewarn " NETFILTER_XT_MATCH_POLICY"
739 - fi
740 - fi
741 -
742 - if [[ $nothing == "1" ]]; then
743 - ewarn "NO PROBLEMS FOUND"
744 - fi
745 -
746 - ewarn
747 - ewarn "WARNING: If your *configured* and *running* kernel"
748 - ewarn "differ either now or in the future, then these checks"
749 - ewarn "may lead to misleading results."
750 - ewarn
751 - ewarn "\033[1;33m**************************************************\033[00m"
752 - ewarn
753 - else
754 - eerror
755 - eerror "\033[1;31m**************************************************\033[00m"
756 - eerror "Make sure that your *running* kernel is/will be >=2.6.19."
757 - eerror "Building ${PN} now, assuming that you know what you're doing."
758 - eerror "\033[1;31m**************************************************\033[00m"
759 - eerror
760 - fi
761 -}
762 -
763 -src_prepare() {
764 - # fix for bug #124813
765 - sed -i 's:-Werror::g' "${S}"/configure.ac || die
766 - # fix for building with gcc-4.6
767 - sed -i 's: -R: -Wl,-R:' "${S}"/configure.ac || die
768 -
769 - eapply "${FILESDIR}/${PN}-def-psk.patch"
770 - eapply "${FILESDIR}/${PN}-include-vendoridh.patch"
771 - eapply "${FILESDIR}"/${PN}-0.8.0-sysctl.patch #425770
772 - eapply "${FILESDIR}"/${PN}-CVE-2015-4047.patch
773 -
774 - # musl fixes
775 - eapply "${FILESDIR}"/${PN}-remove__P.patch
776 - eapply "${FILESDIR}"/${PN}-remove_GLOB_TILDE.patch
777 - eapply "${FILESDIR}"/${PN}-replace-strtouq.patch
778 -
779 - AT_M4DIR="${S}" eautoreconf
780 -
781 - eapply_user
782 -}
783 -
784 -src_configure() {
785 - #--with-{libiconv,libradius} lead to "Broken getaddrinfo()"
786 - #--enable-samode-unspec is not supported in linux
787 - local myconf
788 - myconf="--with-kernel-headers=/usr/include \
789 - --enable-adminport \
790 - --enable-dependency-tracking \
791 - --enable-dpd \
792 - --enable-frag \
793 - --without-libiconv \
794 - --without-libradius \
795 - --disable-samode-unspec \
796 - $(use_enable idea) \
797 - $(use_enable ipv6) \
798 - $(use_enable kerberos gssapi) \
799 - $(use_with ldap libldap) \
800 - $(use_enable nat natt) \
801 - $(use_with pam libpam) \
802 - $(use_enable rc5) \
803 - $(use_with readline) \
804 - $(use_enable selinux security-context) \
805 - $(use_enable stats)"
806 -
807 - use nat && myconf="${myconf} --enable-natt-versions=yes"
808 -
809 - # enable mode-cfg and xauth support
810 - if use pam; then
811 - myconf="${myconf} --enable-hybrid"
812 - else
813 - myconf="${myconf} $(use_enable hybrid)"
814 - fi
815 -
816 - econf ${myconf}
817 -}
818 -
819 -src_install() {
820 - emake DESTDIR="${D}" install
821 - keepdir /var/lib/racoon
822 - newconfd "${FILESDIR}"/racoon.conf.d-r2 racoon
823 - newinitd "${FILESDIR}"/racoon.init.d-r3 racoon
824 - systemd_dounit "${FILESDIR}/ipsec-tools.service"
825 - systemd_dounit "${FILESDIR}/racoon.service"
826 - use pam && newpamd "${FILESDIR}"/racoon.pam.d racoon
827 -
828 - insinto /etc
829 - doins "${FILESDIR}"/ipsec-tools.conf
830 - insinto /etc/racoon
831 - doins "${FILESDIR}"/racoon.conf
832 - doins "${FILESDIR}"/psk.txt
833 - chmod 400 "${D}"/etc/racoon/psk.txt
834 -
835 - dodoc ChangeLog README NEWS
836 - dodoc -r src/racoon/samples
837 - dodoc -r src/racoon/doc
838 - docinto samples
839 - newdoc src/setkey/sample.cf ipsec-tools.conf
840 -}
841 -
842 -pkg_postinst() {
843 - if use nat; then
844 - elog
845 - elog "You have enabled the nat traversal functionnality."
846 - elog "Nat versions wich are enabled by default are 00,02,rfc"
847 - elog "you can find those drafts in the CVS repository:"
848 - elog "cvs -d anoncvs@××××××××××××××.org:/cvsroot co ipsec-tools"
849 - elog
850 - elog "If you feel brave enough and you know what you are"
851 - elog "doing, you can consider emerging this ebuild with"
852 - elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\""
853 - elog
854 - fi
855 -
856 - if use ldap; then
857 - elog
858 - elog "You have enabled ldap support with {$PN}."
859 - elog "The man page does NOT contain any information on it yet."
860 - elog "Consider using a more recent version or CVS."
861 - elog
862 - fi
863 -
864 - elog
865 - elog "Please have a look in /usr/share/doc/${P} and visit"
866 - elog "http://www.netbsd.org/Documentation/network/ipsec/"
867 - elog "to find more information on how to configure this tool."
868 - elog
869 -}
870
871 diff --git a/net-vpn/ipsec-tools/metadata.xml b/net-vpn/ipsec-tools/metadata.xml
872 deleted file mode 100644
873 index b9c2c832..00000000
874 --- a/net-vpn/ipsec-tools/metadata.xml
875 +++ /dev/null
876 @@ -1,17 +0,0 @@
877 -<?xml version="1.0" encoding="UTF-8"?>
878 -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
879 -<pkgmetadata>
880 - <maintainer type="person">
881 - <email>blueness@g.o</email>
882 - </maintainer>
883 - <use>
884 - <flag name="hybrid">Makes available both mode-cfg and xauth support</flag>
885 - <flag name="idea">Enable support for the IDEA algorithm</flag>
886 - <flag name="nat">Enable NAT-Traversal</flag>
887 - <flag name="rc5">Enable support for the patented RC5 algorithm</flag>
888 - <flag name="stats">Enable statistics reporting</flag>
889 - </use>
890 - <upstream>
891 - <remote-id type="sourceforge">ipsec-tools</remote-id>
892 - </upstream>
893 -</pkgmetadata>