1 |
commit: 2e87c63750bc66c1dc9e270f3f76f6490efec090 |
2 |
Author: Sam James <sam <AT> gentoo <DOT> org> |
3 |
AuthorDate: Tue Dec 7 07:23:23 2021 +0000 |
4 |
Commit: Sam James <sam <AT> gentoo <DOT> org> |
5 |
CommitDate: Tue Dec 7 07:23:25 2021 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=2e87c637 |
7 |
|
8 |
net-vpn/ipsec-tools: treeclean (dropped from ::gentoo) |
9 |
|
10 |
Signed-off-by: Sam James <sam <AT> gentoo.org> |
11 |
|
12 |
net-vpn/ipsec-tools/Manifest | 1 - |
13 |
.../files/ipsec-tools-0.8.0-sysctl.patch | 22 -- |
14 |
.../files/ipsec-tools-CVE-2015-4047.patch | 16 -- |
15 |
.../ipsec-tools/files/ipsec-tools-def-psk.patch | 25 -- |
16 |
.../files/ipsec-tools-include-vendoridh.patch | 11 - |
17 |
.../files/ipsec-tools-remove_GLOB_TILDE.patch | 24 -- |
18 |
.../ipsec-tools/files/ipsec-tools-remove__P.patch | 137 ---------- |
19 |
.../files/ipsec-tools-replace-strtouq.patch | 16 -- |
20 |
net-vpn/ipsec-tools/files/ipsec-tools.conf | 26 -- |
21 |
net-vpn/ipsec-tools/files/ipsec-tools.service | 12 - |
22 |
net-vpn/ipsec-tools/files/psk.txt | 10 - |
23 |
net-vpn/ipsec-tools/files/racoon.conf | 33 --- |
24 |
net-vpn/ipsec-tools/files/racoon.conf.d-r2 | 29 --- |
25 |
net-vpn/ipsec-tools/files/racoon.init.d-r3 | 57 ---- |
26 |
net-vpn/ipsec-tools/files/racoon.pam.d | 4 - |
27 |
net-vpn/ipsec-tools/files/racoon.service | 11 - |
28 |
net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild | 286 --------------------- |
29 |
net-vpn/ipsec-tools/metadata.xml | 17 -- |
30 |
18 files changed, 737 deletions(-) |
31 |
|
32 |
diff --git a/net-vpn/ipsec-tools/Manifest b/net-vpn/ipsec-tools/Manifest |
33 |
deleted file mode 100644 |
34 |
index e78840e7..00000000 |
35 |
--- a/net-vpn/ipsec-tools/Manifest |
36 |
+++ /dev/null |
37 |
@@ -1 +0,0 @@ |
38 |
-DIST ipsec-tools-0.8.2.tar.bz2 866465 BLAKE2B cf8c9175d96326fc5c74e6b1921bc66911256e289e6fe9cef77f26c197546902be3ebd5696af39c749a2abaac3f42010c9e2a281fd208122cd59222044b9dd4c SHA512 2b7d0efa908d3a699be7ef8b2b126a3809956cb7add50e8efb1cfdfc2d9b70c39ef517379cb9a4fad9e5f0c25937e98535b06c32bd3e729f5129da4ab133e30f |
39 |
|
40 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch b/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch |
41 |
deleted file mode 100644 |
42 |
index 5c69bbb2..00000000 |
43 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-0.8.0-sysctl.patch |
44 |
+++ /dev/null |
45 |
@@ -1,22 +0,0 @@ |
46 |
-https://bugs.gentoo.org/425770 |
47 |
- |
48 |
---- a/src/racoon/pfkey.c |
49 |
-+++ b/src/racoon/pfkey.c |
50 |
-@@ -59,7 +59,6 @@ |
51 |
- #include <sys/param.h> |
52 |
- #include <sys/socket.h> |
53 |
- #include <sys/queue.h> |
54 |
--#include <sys/sysctl.h> |
55 |
- |
56 |
- #include <net/route.h> |
57 |
- #include <net/pfkeyv2.h> |
58 |
---- a/src/setkey/setkey.c |
59 |
-+++ b/src/setkey/setkey.c |
60 |
-@@ -40,7 +40,6 @@ |
61 |
- #include <sys/socket.h> |
62 |
- #include <sys/time.h> |
63 |
- #include <sys/stat.h> |
64 |
--#include <sys/sysctl.h> |
65 |
- #include <err.h> |
66 |
- #include <netinet/in.h> |
67 |
- #include <net/pfkeyv2.h> |
68 |
|
69 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch b/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch |
70 |
deleted file mode 100644 |
71 |
index 58f72e10..00000000 |
72 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-CVE-2015-4047.patch |
73 |
+++ /dev/null |
74 |
@@ -1,16 +0,0 @@ |
75 |
-See: https://bugs.gentoo.org/show_bug.cgi?id=550118 |
76 |
- |
77 |
---- ./src/racoon/gssapi.c 9 Sep 2006 16:22:09 -0000 1.4 |
78 |
-+++ ./src/racoon/gssapi.c 19 May 2015 15:16:00 -0000 1.6 |
79 |
-@@ -192,6 +192,11 @@ |
80 |
- gss_name_t princ, canon_princ; |
81 |
- OM_uint32 maj_stat, min_stat; |
82 |
- |
83 |
-+ if (iph1->rmconf == NULL) { |
84 |
-+ plog(LLV_ERROR, LOCATION, NULL, "no remote config\n"); |
85 |
-+ return -1; |
86 |
-+ } |
87 |
-+ |
88 |
- gps = racoon_calloc(1, sizeof (struct gssapi_ph1_state)); |
89 |
- if (gps == NULL) { |
90 |
- plog(LLV_ERROR, LOCATION, NULL, "racoon_calloc failed\n"); |
91 |
|
92 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch b/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch |
93 |
deleted file mode 100644 |
94 |
index f351860a..00000000 |
95 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-def-psk.patch |
96 |
+++ /dev/null |
97 |
@@ -1,25 +0,0 @@ |
98 |
-diff -brau ipsec-tools-0.7.3.o/src/racoon/oakley.c ipsec-tools-0.7.3/src/racoon/oakley.c |
99 |
---- ipsec-tools-0.7.3.o/src/racoon/oakley.c 2009-08-13 11:18:45.000000000 +0200 |
100 |
-+++ ipsec-tools-0.7.3/src/racoon/oakley.c 2011-06-06 09:36:11.000000000 +0200 |
101 |
-@@ -2498,8 +2498,21 @@ |
102 |
- plog(LLV_ERROR, LOCATION, iph1->remote, |
103 |
- "couldn't find the pskey for %s.\n", |
104 |
- saddrwop2str(iph1->remote)); |
105 |
-+ } |
106 |
-+ } |
107 |
-+ if (iph1->authstr == NULL) { |
108 |
-+ /* |
109 |
-+ * If we could not locate a psk above try and locate |
110 |
-+ * the default psk, ie, "*". |
111 |
-+ */ |
112 |
-+ iph1->authstr = privsep_getpsk("*", 1); |
113 |
-+ if (iph1->authstr == NULL) { |
114 |
-+ plog(LLV_ERROR, LOCATION, iph1->remote, |
115 |
-+ "couldn't find the the default pskey either.\n"); |
116 |
- goto end; |
117 |
- } |
118 |
-+ plog(LLV_NOTIFY, LOCATION, iph1->remote, |
119 |
-+ "Using default PSK.\n"); |
120 |
- } |
121 |
- plog(LLV_DEBUG, LOCATION, NULL, "the psk found.\n"); |
122 |
- /* should be secret PSK */ |
123 |
|
124 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch b/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch |
125 |
deleted file mode 100644 |
126 |
index 2e22c82d..00000000 |
127 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-include-vendoridh.patch |
128 |
+++ /dev/null |
129 |
@@ -1,11 +0,0 @@ |
130 |
-diff -Naur ipsec-tools-0.8.0.orig//src/racoon/ipsec_doi.c ipsec-tools-0.8.0/src/racoon/ipsec_doi.c |
131 |
---- ipsec-tools-0.8.0.orig//src/racoon/ipsec_doi.c 2012-02-28 13:42:24.000000000 -0500 |
132 |
-+++ ipsec-tools-0.8.0/src/racoon/ipsec_doi.c 2012-02-28 13:41:22.000000000 -0500 |
133 |
-@@ -87,6 +87,7 @@ |
134 |
- #ifdef HAVE_GSSAPI |
135 |
- #include <iconv.h> |
136 |
- #include "gssapi.h" |
137 |
-+#include "vendorid.h" |
138 |
- #ifdef HAVE_ICONV_2ND_CONST |
139 |
- #define __iconv_const const |
140 |
- #else |
141 |
|
142 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch b/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch |
143 |
deleted file mode 100644 |
144 |
index 25984f48..00000000 |
145 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-remove_GLOB_TILDE.patch |
146 |
+++ /dev/null |
147 |
@@ -1,24 +0,0 @@ |
148 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/cftoken.c ipsec-tools-0.8.2/src/racoon/cftoken.c |
149 |
---- ipsec-tools-0.8.2.orig/src/racoon/cftoken.c 2012-08-29 11:24:51.000000000 +0000 |
150 |
-+++ ipsec-tools-0.8.2/src/racoon/cftoken.c 2018-08-11 08:01:12.177136634 +0000 |
151 |
-@@ -4753,7 +4753,7 @@ |
152 |
- return -1; |
153 |
- } |
154 |
- |
155 |
-- if (glob(path, GLOB_TILDE, NULL, &incstack[incstackp].matches) != 0 || |
156 |
-+ if (glob(path, 0, NULL, &incstack[incstackp].matches) != 0 || |
157 |
- incstack[incstackp].matches.gl_pathc == 0) { |
158 |
- plog(LLV_ERROR, LOCATION, NULL, |
159 |
- "glob found no matches for path \"%s\"\n", path); |
160 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/cftoken.l ipsec-tools-0.8.2/src/racoon/cftoken.l |
161 |
---- ipsec-tools-0.8.2.orig/src/racoon/cftoken.l 2012-08-29 08:42:24.000000000 +0000 |
162 |
-+++ ipsec-tools-0.8.2/src/racoon/cftoken.l 2018-08-11 08:01:21.512854300 +0000 |
163 |
-@@ -725,7 +725,7 @@ |
164 |
- return -1; |
165 |
- } |
166 |
- |
167 |
-- if (glob(path, GLOB_TILDE, NULL, &incstack[incstackp].matches) != 0 || |
168 |
-+ if (glob(path, 0, NULL, &incstack[incstackp].matches) != 0 || |
169 |
- incstack[incstackp].matches.gl_pathc == 0) { |
170 |
- plog(LLV_ERROR, LOCATION, NULL, |
171 |
- "glob found no matches for path \"%s\"\n", path); |
172 |
|
173 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch b/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch |
174 |
deleted file mode 100644 |
175 |
index a0a44f50..00000000 |
176 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-remove__P.patch |
177 |
+++ /dev/null |
178 |
@@ -1,137 +0,0 @@ |
179 |
-diff -Naur ipsec-tools-0.8.2.orig/src/libipsec/ipsec_strerror.h ipsec-tools-0.8.2/src/libipsec/ipsec_strerror.h |
180 |
---- ipsec-tools-0.8.2.orig/src/libipsec/ipsec_strerror.h 2006-09-09 16:22:09.000000000 +0000 |
181 |
-+++ ipsec-tools-0.8.2/src/libipsec/ipsec_strerror.h 2018-08-11 06:56:43.378265279 +0000 |
182 |
-@@ -34,6 +34,8 @@ |
183 |
- #ifndef _IPSEC_STRERROR_H |
184 |
- #define _IPSEC_STRERROR_H |
185 |
- |
186 |
-+#define __P(protos) protos |
187 |
-+ |
188 |
- extern int __ipsec_errcode; |
189 |
- extern void __ipsec_set_strerror __P((const char *)); |
190 |
- |
191 |
-diff -Naur ipsec-tools-0.8.2.orig/src/libipsec/libpfkey.h ipsec-tools-0.8.2/src/libipsec/libpfkey.h |
192 |
---- ipsec-tools-0.8.2.orig/src/libipsec/libpfkey.h 2012-08-23 11:10:45.000000000 +0000 |
193 |
-+++ ipsec-tools-0.8.2/src/libipsec/libpfkey.h 2018-08-11 06:58:44.102604340 +0000 |
194 |
-@@ -44,6 +44,8 @@ |
195 |
- #define PRIORITY_OFFSET_POSITIVE_MAX 0x3fffffff |
196 |
- #define PRIORITY_OFFSET_NEGATIVE_MAX 0x40000000 |
197 |
- |
198 |
-+#define __P(protos) protos |
199 |
-+ |
200 |
- struct sadb_msg; |
201 |
- extern void pfkey_sadump __P((struct sadb_msg *)); |
202 |
- extern void pfkey_sadump_withports __P((struct sadb_msg *)); |
203 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/gnuc.h ipsec-tools-0.8.2/src/racoon/gnuc.h |
204 |
---- ipsec-tools-0.8.2.orig/src/racoon/gnuc.h 2006-09-09 16:22:09.000000000 +0000 |
205 |
-+++ ipsec-tools-0.8.2/src/racoon/gnuc.h 2018-08-11 06:54:00.543203861 +0000 |
206 |
-@@ -3,14 +3,7 @@ |
207 |
- /* Id: gnuc.h,v 1.4 2004/11/18 15:14:44 ludvigm Exp */ |
208 |
- |
209 |
- /* Define __P() macro, if necessary */ |
210 |
--#undef __P |
211 |
--#ifndef __P |
212 |
--#if __STDC__ |
213 |
- #define __P(protos) protos |
214 |
--#else |
215 |
--#define __P(protos) () |
216 |
--#endif |
217 |
--#endif |
218 |
- |
219 |
- /* inline foo */ |
220 |
- #ifdef __GNUC__ |
221 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/logger.h ipsec-tools-0.8.2/src/racoon/logger.h |
222 |
---- ipsec-tools-0.8.2.orig/src/racoon/logger.h 2006-09-09 16:22:09.000000000 +0000 |
223 |
-+++ ipsec-tools-0.8.2/src/racoon/logger.h 2018-08-11 07:04:12.320653159 +0000 |
224 |
-@@ -42,6 +42,8 @@ |
225 |
- char *fname; |
226 |
- }; |
227 |
- |
228 |
-+#define __P(protos) protos |
229 |
-+ |
230 |
- extern struct log *log_open __P((size_t, char *)); |
231 |
- extern void log_add __P((struct log *, char *)); |
232 |
- extern int log_print __P((struct log *, char *)); |
233 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/misc.h ipsec-tools-0.8.2/src/racoon/misc.h |
234 |
---- ipsec-tools-0.8.2.orig/src/racoon/misc.h 2008-07-15 00:47:09.000000000 +0000 |
235 |
-+++ ipsec-tools-0.8.2/src/racoon/misc.h 2018-08-11 07:01:29.029603601 +0000 |
236 |
-@@ -42,6 +42,8 @@ |
237 |
- #define LOCATION debug_location(__FILE__, __LINE__, NULL) |
238 |
- #endif |
239 |
- |
240 |
-+#define __P(protos) protos |
241 |
-+ |
242 |
- extern int racoon_hexdump __P((void *, size_t)); |
243 |
- extern char *bit2str __P((int, int)); |
244 |
- extern void *get_newbuf __P((void *, size_t)); |
245 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/missing/crypto/sha2/sha2.h ipsec-tools-0.8.2/src/racoon/missing/crypto/sha2/sha2.h |
246 |
---- ipsec-tools-0.8.2.orig/src/racoon/missing/crypto/sha2/sha2.h 2006-09-09 16:22:36.000000000 +0000 |
247 |
-+++ ipsec-tools-0.8.2/src/racoon/missing/crypto/sha2/sha2.h 2018-08-11 07:04:57.967269426 +0000 |
248 |
-@@ -119,6 +119,8 @@ |
249 |
- |
250 |
- /*** SHA-256/384/512 Function Prototypes ******************************/ |
251 |
- |
252 |
-+#define __P(protos) protos |
253 |
-+ |
254 |
- #ifndef HAVE_SHA2_IN_SHA_H |
255 |
- void SHA256_Init __P((SHA256_CTX *)); |
256 |
- void SHA256_Update __P((SHA256_CTX*, const u_int8_t*, size_t)); |
257 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/netdb_dnssec.h ipsec-tools-0.8.2/src/racoon/netdb_dnssec.h |
258 |
---- ipsec-tools-0.8.2.orig/src/racoon/netdb_dnssec.h 2006-09-09 16:22:09.000000000 +0000 |
259 |
-+++ ipsec-tools-0.8.2/src/racoon/netdb_dnssec.h 2018-08-11 07:06:07.145172460 +0000 |
260 |
-@@ -68,6 +68,8 @@ |
261 |
- struct certinfo *ci_next; /* next structure */ |
262 |
- }; |
263 |
- |
264 |
-+#define __P(protos) protos |
265 |
-+ |
266 |
- extern void freecertinfo __P((struct certinfo *)); |
267 |
- extern int getcertsbyname __P((char *, struct certinfo **)); |
268 |
- |
269 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/plog.h ipsec-tools-0.8.2/src/racoon/plog.h |
270 |
---- ipsec-tools-0.8.2.orig/src/racoon/plog.h 2007-10-02 09:47:40.000000000 +0000 |
271 |
-+++ ipsec-tools-0.8.2/src/racoon/plog.h 2018-08-11 07:06:55.163716961 +0000 |
272 |
-@@ -63,6 +63,8 @@ |
273 |
- extern int f_foreground; |
274 |
- extern int print_location; |
275 |
- |
276 |
-+#define __P(protos) protos |
277 |
-+ |
278 |
- struct sockaddr; |
279 |
- #define plog(pri, ...) \ |
280 |
- do { \ |
281 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/str2val.h ipsec-tools-0.8.2/src/racoon/str2val.h |
282 |
---- ipsec-tools-0.8.2.orig/src/racoon/str2val.h 2006-09-09 16:22:10.000000000 +0000 |
283 |
-+++ ipsec-tools-0.8.2/src/racoon/str2val.h 2018-08-11 07:05:31.530252028 +0000 |
284 |
-@@ -34,6 +34,8 @@ |
285 |
- #ifndef _STR2VAL_H |
286 |
- #define _STR2VAL_H |
287 |
- |
288 |
-+#define __P(protos) protos |
289 |
-+ |
290 |
- extern caddr_t val2str __P((const char *, size_t)); |
291 |
- extern char *str2val __P((const char *, int, size_t *)); |
292 |
- |
293 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/vmbuf.h ipsec-tools-0.8.2/src/racoon/vmbuf.h |
294 |
---- ipsec-tools-0.8.2.orig/src/racoon/vmbuf.h 2006-09-09 16:22:10.000000000 +0000 |
295 |
-+++ ipsec-tools-0.8.2/src/racoon/vmbuf.h 2018-08-11 07:03:41.489587802 +0000 |
296 |
-@@ -65,6 +65,8 @@ |
297 |
- #define vfree vmbuf_free |
298 |
- #endif |
299 |
- |
300 |
-+#define __P(protos) protos |
301 |
-+ |
302 |
- extern vchar_t *vmalloc __P((size_t)); |
303 |
- extern vchar_t *vrealloc __P((vchar_t *, size_t)); |
304 |
- extern void vfree __P((vchar_t *)); |
305 |
-diff -Naur ipsec-tools-0.8.2.orig/src/setkey/extern.h ipsec-tools-0.8.2/src/setkey/extern.h |
306 |
---- ipsec-tools-0.8.2.orig/src/setkey/extern.h 2009-03-06 11:45:03.000000000 +0000 |
307 |
-+++ ipsec-tools-0.8.2/src/setkey/extern.h 2018-08-11 06:59:26.933305604 +0000 |
308 |
-@@ -1,6 +1,6 @@ |
309 |
- /* $NetBSD: extern.h,v 1.5 2009/03/06 11:45:03 tteras Exp $ */ |
310 |
- |
311 |
-- |
312 |
-+#define __P(protos) protos |
313 |
- |
314 |
- void parse_init __P((void)); |
315 |
- int parse __P((FILE **)); |
316 |
|
317 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch b/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch |
318 |
deleted file mode 100644 |
319 |
index 73baf36e..00000000 |
320 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools-replace-strtouq.patch |
321 |
+++ /dev/null |
322 |
@@ -1,16 +0,0 @@ |
323 |
-diff -Naur ipsec-tools-0.8.2.orig/src/racoon/backupsa.c ipsec-tools-0.8.2/src/racoon/backupsa.c |
324 |
---- ipsec-tools-0.8.2.orig/src/racoon/backupsa.c 2010-04-02 15:15:00.000000000 +0000 |
325 |
-+++ ipsec-tools-0.8.2/src/racoon/backupsa.c 2018-08-11 14:22:15.868343597 +0000 |
326 |
-@@ -276,9 +276,9 @@ |
327 |
- GETNEXTNUM(sa_args.a_keylen, strtoul); |
328 |
- GETNEXTNUM(sa_args.flags, strtoul); |
329 |
- GETNEXTNUM(sa_args.l_alloc, strtoul); |
330 |
-- GETNEXTNUM(sa_args.l_bytes, strtouq); |
331 |
-- GETNEXTNUM(sa_args.l_addtime, strtouq); |
332 |
-- GETNEXTNUM(sa_args.l_usetime, strtouq); |
333 |
-+ GETNEXTNUM(sa_args.l_bytes, strtoull); |
334 |
-+ GETNEXTNUM(sa_args.l_addtime, strtoull); |
335 |
-+ GETNEXTNUM(sa_args.l_usetime, strtoull); |
336 |
- GETNEXTNUM(sa_args.seq, strtoul); |
337 |
- |
338 |
- #undef GETNEXTNUM |
339 |
|
340 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools.conf b/net-vpn/ipsec-tools/files/ipsec-tools.conf |
341 |
deleted file mode 100644 |
342 |
index bfff04af..00000000 |
343 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools.conf |
344 |
+++ /dev/null |
345 |
@@ -1,26 +0,0 @@ |
346 |
-#!/usr/sbin/setkey -f |
347 |
-# |
348 |
-# THIS IS A SAMPLE FILE! |
349 |
-# |
350 |
-# This is a sample file to test Gentoo's ipsec-tools out of the box. |
351 |
-# Do not use it in production. See: http://www.ipsec-howto.org/ |
352 |
-# |
353 |
-flush; |
354 |
-spdflush; |
355 |
- |
356 |
-# |
357 |
-# Uncomment the following if you want to do manual keying, ie, you want to run IPsec without racoon. |
358 |
-# Do not switch 192.168.3.21 <-> 192.168.3.25 on the peer |
359 |
-# |
360 |
-#add 192.168.3.25 192.168.3.21 ah 0x200 -A hmac-md5 0xc0291ff014dccdd03874d9e8e4cdf3e6; |
361 |
-#add 192.168.3.21 192.168.3.25 ah 0x300 -A hmac-md5 0x96358c90783bbfa3d7b196ceabe0536b; |
362 |
-#add 192.168.3.25 192.168.3.21 esp 0x201 -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831; |
363 |
-#add 192.168.3.21 192.168.3.25 esp 0x301 -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df; |
364 |
- |
365 |
-# |
366 |
-# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer |
367 |
-# |
368 |
-#spdadd 192.168.3.21 192.168.3.25 any -P out ipsec esp/transport//require ah/transport//require; |
369 |
-#spdadd 192.168.3.25 192.168.3.21 any -P in ipsec esp/transport//require ah/transport//require; |
370 |
-spdadd 192.168.3.25 192.168.3.21 any -P out ipsec esp/transport//require ah/transport//require; |
371 |
-spdadd 192.168.3.21 192.168.3.25 any -P in ipsec esp/transport//require ah/transport//require; |
372 |
|
373 |
diff --git a/net-vpn/ipsec-tools/files/ipsec-tools.service b/net-vpn/ipsec-tools/files/ipsec-tools.service |
374 |
deleted file mode 100644 |
375 |
index 0341aa7e..00000000 |
376 |
--- a/net-vpn/ipsec-tools/files/ipsec-tools.service |
377 |
+++ /dev/null |
378 |
@@ -1,12 +0,0 @@ |
379 |
-[Unit] |
380 |
-Description=Load IPSec Security Policy Database |
381 |
-After=syslog.target network.target |
382 |
- |
383 |
-[Service] |
384 |
-Type=oneshot |
385 |
-RemainAfterExit=true |
386 |
-ExecStart=/usr/sbin/setkey -k -f /etc/ipsec-tools.conf |
387 |
-ExecStop=/usr/sbin/setkey -F -P ; /usr/sbin/setkey -F |
388 |
- |
389 |
-[Install] |
390 |
-WantedBy=multi-user.target |
391 |
|
392 |
diff --git a/net-vpn/ipsec-tools/files/psk.txt b/net-vpn/ipsec-tools/files/psk.txt |
393 |
deleted file mode 100644 |
394 |
index 97f5180f..00000000 |
395 |
--- a/net-vpn/ipsec-tools/files/psk.txt |
396 |
+++ /dev/null |
397 |
@@ -1,10 +0,0 @@ |
398 |
-# THIS IS A SAMPLE FILE! |
399 |
-# |
400 |
-# This is a sample file to test Gentoo's ipsec-tools out of the box. |
401 |
-# Do not use it in production. See: http://www.ipsec-howto.org/ |
402 |
-# |
403 |
-# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer |
404 |
-# |
405 |
-# Peer IP/FQDN Secret |
406 |
-# 192.168.3.25 sample |
407 |
-192.168.3.21 sample |
408 |
|
409 |
diff --git a/net-vpn/ipsec-tools/files/racoon.conf b/net-vpn/ipsec-tools/files/racoon.conf |
410 |
deleted file mode 100644 |
411 |
index 2e9206db..00000000 |
412 |
--- a/net-vpn/ipsec-tools/files/racoon.conf |
413 |
+++ /dev/null |
414 |
@@ -1,33 +0,0 @@ |
415 |
-# THIS IS A SAMPLE FILE! |
416 |
-# |
417 |
-# This is a sample file to test Gentoo's ipsec-tools out of the box. |
418 |
-# Do not use it in production. See: http://www.ipsec-howto.org/ |
419 |
-# |
420 |
-path pre_shared_key "/etc/racoon/psk.txt"; |
421 |
- |
422 |
-# |
423 |
-# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer |
424 |
-# |
425 |
-#remote 192.168.3.25 |
426 |
-remote 192.168.3.21 |
427 |
-{ |
428 |
- exchange_mode main; |
429 |
- proposal { |
430 |
- encryption_algorithm 3des; |
431 |
- hash_algorithm md5; |
432 |
- authentication_method pre_shared_key; |
433 |
- dh_group modp1024; |
434 |
- } |
435 |
-} |
436 |
- |
437 |
-# |
438 |
-# Make sure to switch 192.168.3.21 <-> 192.168.3.25 on the peer |
439 |
-# |
440 |
-#sainfo address 192.168.3.21 any address 192.168.3.25 any |
441 |
-sainfo address 192.168.3.25 any address 192.168.3.21 any |
442 |
-{ |
443 |
- pfs_group modp768; |
444 |
- encryption_algorithm 3des; |
445 |
- authentication_algorithm hmac_md5; |
446 |
- compression_algorithm deflate; |
447 |
-} |
448 |
|
449 |
diff --git a/net-vpn/ipsec-tools/files/racoon.conf.d-r2 b/net-vpn/ipsec-tools/files/racoon.conf.d-r2 |
450 |
deleted file mode 100644 |
451 |
index cbb04807..00000000 |
452 |
--- a/net-vpn/ipsec-tools/files/racoon.conf.d-r2 |
453 |
+++ /dev/null |
454 |
@@ -1,29 +0,0 @@ |
455 |
-# Copyright 1999-2018 Gentoo Foundation |
456 |
-# Distributed under the terms of the GNU General Public License v2 |
457 |
- |
458 |
-# Config file for /etc/init.d/racoon |
459 |
- |
460 |
-# See the man page or run `racoon --help` for valid command-line options |
461 |
-# RACOON_OPTS="-d" |
462 |
- |
463 |
-RACOON_CONF="/etc/racoon/racoon.conf" |
464 |
-RACOON_PSK_FILE="/etc/racoon/psk.txt" |
465 |
- |
466 |
-# The amount of time in ms for start-stop-daemon to wait before a timeout |
467 |
-# Racoon can sometimes be slow. We'll wait 1 sec. Bug #435398. |
468 |
- |
469 |
-RACOON_WAIT="1000" |
470 |
- |
471 |
-# The setkey config file. Don't name it ipsec.conf as this clashes |
472 |
-# with strongswan. We'll follow debian's naming. Bug #436144. |
473 |
- |
474 |
-SETKEY_CONF="/etc/ipsec-tools.conf" |
475 |
- |
476 |
-# Comment or remove the following if you don't want the policy tables |
477 |
-# to be flushed when racoon is stopped. |
478 |
- |
479 |
-RACOON_RESET_TABLES="true" |
480 |
- |
481 |
-# If you need to set custom options to the setkey command when loading rules, use this |
482 |
-# more info in the setkey mangage (example below sets kernel mode instead of RFC mode): |
483 |
-#SETKEY_OPTS="-k" |
484 |
|
485 |
diff --git a/net-vpn/ipsec-tools/files/racoon.init.d-r3 b/net-vpn/ipsec-tools/files/racoon.init.d-r3 |
486 |
deleted file mode 100644 |
487 |
index 61a37697..00000000 |
488 |
--- a/net-vpn/ipsec-tools/files/racoon.init.d-r3 |
489 |
+++ /dev/null |
490 |
@@ -1,57 +0,0 @@ |
491 |
-#!/sbin/openrc-run |
492 |
-# Copyright 1999-2018 Gentoo Foundation |
493 |
-# Distributed under the terms of the GNU General Public License v2 |
494 |
- |
495 |
-depend() { |
496 |
- before netmount |
497 |
- use net |
498 |
-} |
499 |
- |
500 |
-checkconfig() { |
501 |
- if [ ! -e ${SETKEY_CONF} ] ; then |
502 |
- eerror "You need to configure setkey before starting racoon." |
503 |
- return 1 |
504 |
- fi |
505 |
- if [ ! -e ${RACOON_CONF} ] ; then |
506 |
- eerror "You need a configuration file to start racoon." |
507 |
- return 1 |
508 |
- fi |
509 |
- if [ ! -z ${RACOON_PSK_FILE} ] ; then |
510 |
- if [ ! -f ${RACOON_PSK_FILE} ] ; then |
511 |
- eerror "PSK file not found as specified." |
512 |
- eerror "Set RACOON_PSK_FILE in /etc/conf.d/racoon." |
513 |
- return 1 |
514 |
- fi |
515 |
- case "`ls -Lldn ${RACOON_PSK_FILE}`" in |
516 |
- -r--------*) |
517 |
- ;; |
518 |
- *) |
519 |
- eerror "Your defined PSK file should be mode 400 for security!" |
520 |
- return 1 |
521 |
- ;; |
522 |
- esac |
523 |
- fi |
524 |
-} |
525 |
- |
526 |
-command=/usr/sbin/racoon |
527 |
-command_args="-f ${RACOON_CONF} ${RACOON_OPTS}" |
528 |
-pidfile=/var/run/racoon.pid |
529 |
-start_stop_daemon_args="--wait ${RACOON_WAIT}" |
530 |
- |
531 |
-start_pre() { |
532 |
- checkconfig || return 1 |
533 |
- einfo "Loading ipsec policies from ${SETKEY_CONF}." |
534 |
- /usr/sbin/setkey ${SETKEY_OPTS} -f ${SETKEY_CONF} |
535 |
- if [ $? -eq 1 ] ; then |
536 |
- eerror "Error while loading ipsec policies" |
537 |
- fi |
538 |
-} |
539 |
- |
540 |
-stop_post() { |
541 |
- if [ -n "${RACOON_RESET_TABLES}" ]; then |
542 |
- ebegin "Flushing policy entries" |
543 |
- /usr/sbin/setkey -F |
544 |
- /usr/sbin/setkey -FP |
545 |
- eend $? |
546 |
- fi |
547 |
-} |
548 |
|
549 |
diff --git a/net-vpn/ipsec-tools/files/racoon.pam.d b/net-vpn/ipsec-tools/files/racoon.pam.d |
550 |
deleted file mode 100644 |
551 |
index b801aaaf..00000000 |
552 |
--- a/net-vpn/ipsec-tools/files/racoon.pam.d |
553 |
+++ /dev/null |
554 |
@@ -1,4 +0,0 @@ |
555 |
-auth include system-remote-login |
556 |
-account include system-remote-login |
557 |
-password include system-remote-login |
558 |
-session include system-remote-login |
559 |
|
560 |
diff --git a/net-vpn/ipsec-tools/files/racoon.service b/net-vpn/ipsec-tools/files/racoon.service |
561 |
deleted file mode 100644 |
562 |
index df7f1bb8..00000000 |
563 |
--- a/net-vpn/ipsec-tools/files/racoon.service |
564 |
+++ /dev/null |
565 |
@@ -1,11 +0,0 @@ |
566 |
-[Unit] |
567 |
-Description=Racoon IKEv1 key management daemon for IPSEC |
568 |
-After=syslog.target network.target |
569 |
-Requires=ipsec-tools.service |
570 |
- |
571 |
-[Service] |
572 |
-Type=forking |
573 |
-ExecStart=/usr/sbin/racoon -f /etc/racoon/racoon.conf |
574 |
- |
575 |
-[Install] |
576 |
-WantedBy=multi-user.target |
577 |
|
578 |
diff --git a/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild b/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild |
579 |
deleted file mode 100644 |
580 |
index 578041ca..00000000 |
581 |
--- a/net-vpn/ipsec-tools/ipsec-tools-0.8.2-r5.ebuild |
582 |
+++ /dev/null |
583 |
@@ -1,286 +0,0 @@ |
584 |
-# Copyright 1999-2021 Gentoo Authors |
585 |
-# Distributed under the terms of the GNU General Public License v2 |
586 |
- |
587 |
-EAPI="6" |
588 |
- |
589 |
-inherit flag-o-matic autotools linux-info pam systemd |
590 |
- |
591 |
-DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation" |
592 |
-HOMEPAGE="http://ipsec-tools.sourceforge.net/" |
593 |
-SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2" |
594 |
- |
595 |
-LICENSE="BSD GPL-2" |
596 |
-SLOT="0" |
597 |
-KEYWORDS="amd64 arm ~mips ppc ppc64 x86" |
598 |
-IUSE="hybrid idea ipv6 kerberos ldap nat pam rc5 readline selinux stats" |
599 |
- |
600 |
-CDEPEND=" |
601 |
- dev-libs/openssl:0 |
602 |
- kerberos? ( virtual/krb5 ) |
603 |
- ldap? ( net-nds/openldap ) |
604 |
- pam? ( sys-libs/pam ) |
605 |
- readline? ( sys-libs/readline:0= ) |
606 |
- selinux? ( sys-libs/libselinux )" |
607 |
- |
608 |
-DEPEND="${CDEPEND} |
609 |
- >=sys-kernel/linux-headers-2.6.30" |
610 |
- |
611 |
-RDEPEND="${CDEPEND} |
612 |
- selinux? ( sec-policy/selinux-ipsec ) |
613 |
-" |
614 |
- |
615 |
-pkg_preinst() { |
616 |
- if has_version "<${CATEGORY}/${PN}-0.8.0-r5" ; then |
617 |
- ewarn |
618 |
- ewarn "\033[1;33m**************************************************\033[00m" |
619 |
- ewarn |
620 |
- if ! has_version "net-vpn/strongswan" && |
621 |
- ! has_version "net-misc/openswan" && |
622 |
- ! has_version "net-vpn/libreswan"; then |
623 |
- ewarn "We found an earlier version of ${PN} installed." |
624 |
- ewarn "As of ${PN}-0.8.0-r5, the old configuration file," |
625 |
- ewarn "ipsec.conf, has been changed to ipsec-tools.conf to avoid" |
626 |
- ewarn "a conflict with net-vpn/strongswan; bug #436144. We will" |
627 |
- ewarn "rename this file for you with this upgrade. However, if" |
628 |
- ewarn "you later downgrade, you'll have to rename the file to" |
629 |
- ewarn "its orignal manually or change /etc/conf.d/racoon to point" |
630 |
- ewarn "to the new file." |
631 |
- |
632 |
- if [[ -f /etc/ipsec.conf && ! -f /etc/ipsec-tools.conf ]] ; then |
633 |
- mv /etc/ipsec.conf /etc/ipsec-tools.conf |
634 |
- else |
635 |
- ewarn |
636 |
- ewarn "Oops! I can't move ipsec.conf to ipsec-tools.conf!" |
637 |
- ewarn "Either the former doesn't exist or the later does and" |
638 |
- ewarn "I won't clobber it. Please fix this situation manually." |
639 |
- fi |
640 |
- else |
641 |
- ewarn "You had both an earlier version of ${PN} and" |
642 |
- ewarn "net-vpn/strongswan installed. I can't tell whether" |
643 |
- ewarn "the configuration file, ipsec.conf, belongs to one" |
644 |
- ewarn "package or the other due to a file conflict; bug #436144." |
645 |
- ewarn "The current version of ${PN} uses ipsec-tools.conf" |
646 |
- ewarn "as its configuration file, as will future versions." |
647 |
- ewarn "Please fix this situation manually." |
648 |
- fi |
649 |
- ewarn |
650 |
- ewarn "\033[1;33m**************************************************\033[00m" |
651 |
- ewarn |
652 |
- fi |
653 |
-} |
654 |
- |
655 |
-pkg_setup() { |
656 |
- linux-info_pkg_setup |
657 |
- |
658 |
- get_version |
659 |
- |
660 |
- if linux_config_exists && kernel_is -ge 2 6 19; then |
661 |
- ewarn |
662 |
- ewarn "\033[1;33m**************************************************\033[00m" |
663 |
- ewarn |
664 |
- ewarn "Checking kernel configuration in /usr/src/linux or" |
665 |
- ewarn "or /proc/config.gz for compatibility with ${PN}." |
666 |
- ewarn "Here are the potential problems:" |
667 |
- ewarn |
668 |
- |
669 |
- local nothing="1" |
670 |
- |
671 |
- # Check options for all flavors of IPSec |
672 |
- local msg="" |
673 |
- for i in XFRM_USER NET_KEY; do |
674 |
- if ! linux_chkconfig_present ${i}; then |
675 |
- msg="${msg} ${i}" |
676 |
- fi |
677 |
- done |
678 |
- if [[ ! -z "$msg" ]]; then |
679 |
- nothing="0" |
680 |
- ewarn |
681 |
- ewarn "ALL IPSec may fail. CHECK:" |
682 |
- ewarn "${msg}" |
683 |
- fi |
684 |
- |
685 |
- # Check unencrypted IPSec |
686 |
- if ! linux_chkconfig_present CRYPTO_NULL; then |
687 |
- nothing="0" |
688 |
- ewarn |
689 |
- ewarn "Unencrypted IPSec may fail. CHECK:" |
690 |
- ewarn " CRYPTO_NULL" |
691 |
- fi |
692 |
- |
693 |
- # Check IPv4 IPSec |
694 |
- msg="" |
695 |
- for i in \ |
696 |
- INET_IPCOMP INET_AH INET_ESP \ |
697 |
- INET_XFRM_MODE_TRANSPORT \ |
698 |
- INET_XFRM_MODE_TUNNEL \ |
699 |
- INET_XFRM_MODE_BEET |
700 |
- do |
701 |
- if ! linux_chkconfig_present ${i}; then |
702 |
- msg="${msg} ${i}" |
703 |
- fi |
704 |
- done |
705 |
- if [[ ! -z "$msg" ]]; then |
706 |
- nothing="0" |
707 |
- ewarn |
708 |
- ewarn "IPv4 IPSec may fail. CHECK:" |
709 |
- ewarn "${msg}" |
710 |
- fi |
711 |
- |
712 |
- # Check IPv6 IPSec |
713 |
- if use ipv6; then |
714 |
- msg="" |
715 |
- for i in INET6_IPCOMP INET6_AH INET6_ESP \ |
716 |
- INET6_XFRM_MODE_TRANSPORT \ |
717 |
- INET6_XFRM_MODE_TUNNEL \ |
718 |
- INET6_XFRM_MODE_BEET |
719 |
- do |
720 |
- if ! linux_chkconfig_present ${i}; then |
721 |
- msg="${msg} ${i}" |
722 |
- fi |
723 |
- done |
724 |
- if [[ ! -z "$msg" ]]; then |
725 |
- nothing="0" |
726 |
- ewarn |
727 |
- ewarn "IPv6 IPSec may fail. CHECK:" |
728 |
- ewarn "${msg}" |
729 |
- fi |
730 |
- fi |
731 |
- |
732 |
- # Check IPSec behind NAT |
733 |
- if use nat; then |
734 |
- if ! linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; then |
735 |
- nothing="0" |
736 |
- ewarn |
737 |
- ewarn "IPSec behind NAT may fail. CHECK:" |
738 |
- ewarn " NETFILTER_XT_MATCH_POLICY" |
739 |
- fi |
740 |
- fi |
741 |
- |
742 |
- if [[ $nothing == "1" ]]; then |
743 |
- ewarn "NO PROBLEMS FOUND" |
744 |
- fi |
745 |
- |
746 |
- ewarn |
747 |
- ewarn "WARNING: If your *configured* and *running* kernel" |
748 |
- ewarn "differ either now or in the future, then these checks" |
749 |
- ewarn "may lead to misleading results." |
750 |
- ewarn |
751 |
- ewarn "\033[1;33m**************************************************\033[00m" |
752 |
- ewarn |
753 |
- else |
754 |
- eerror |
755 |
- eerror "\033[1;31m**************************************************\033[00m" |
756 |
- eerror "Make sure that your *running* kernel is/will be >=2.6.19." |
757 |
- eerror "Building ${PN} now, assuming that you know what you're doing." |
758 |
- eerror "\033[1;31m**************************************************\033[00m" |
759 |
- eerror |
760 |
- fi |
761 |
-} |
762 |
- |
763 |
-src_prepare() { |
764 |
- # fix for bug #124813 |
765 |
- sed -i 's:-Werror::g' "${S}"/configure.ac || die |
766 |
- # fix for building with gcc-4.6 |
767 |
- sed -i 's: -R: -Wl,-R:' "${S}"/configure.ac || die |
768 |
- |
769 |
- eapply "${FILESDIR}/${PN}-def-psk.patch" |
770 |
- eapply "${FILESDIR}/${PN}-include-vendoridh.patch" |
771 |
- eapply "${FILESDIR}"/${PN}-0.8.0-sysctl.patch #425770 |
772 |
- eapply "${FILESDIR}"/${PN}-CVE-2015-4047.patch |
773 |
- |
774 |
- # musl fixes |
775 |
- eapply "${FILESDIR}"/${PN}-remove__P.patch |
776 |
- eapply "${FILESDIR}"/${PN}-remove_GLOB_TILDE.patch |
777 |
- eapply "${FILESDIR}"/${PN}-replace-strtouq.patch |
778 |
- |
779 |
- AT_M4DIR="${S}" eautoreconf |
780 |
- |
781 |
- eapply_user |
782 |
-} |
783 |
- |
784 |
-src_configure() { |
785 |
- #--with-{libiconv,libradius} lead to "Broken getaddrinfo()" |
786 |
- #--enable-samode-unspec is not supported in linux |
787 |
- local myconf |
788 |
- myconf="--with-kernel-headers=/usr/include \ |
789 |
- --enable-adminport \ |
790 |
- --enable-dependency-tracking \ |
791 |
- --enable-dpd \ |
792 |
- --enable-frag \ |
793 |
- --without-libiconv \ |
794 |
- --without-libradius \ |
795 |
- --disable-samode-unspec \ |
796 |
- $(use_enable idea) \ |
797 |
- $(use_enable ipv6) \ |
798 |
- $(use_enable kerberos gssapi) \ |
799 |
- $(use_with ldap libldap) \ |
800 |
- $(use_enable nat natt) \ |
801 |
- $(use_with pam libpam) \ |
802 |
- $(use_enable rc5) \ |
803 |
- $(use_with readline) \ |
804 |
- $(use_enable selinux security-context) \ |
805 |
- $(use_enable stats)" |
806 |
- |
807 |
- use nat && myconf="${myconf} --enable-natt-versions=yes" |
808 |
- |
809 |
- # enable mode-cfg and xauth support |
810 |
- if use pam; then |
811 |
- myconf="${myconf} --enable-hybrid" |
812 |
- else |
813 |
- myconf="${myconf} $(use_enable hybrid)" |
814 |
- fi |
815 |
- |
816 |
- econf ${myconf} |
817 |
-} |
818 |
- |
819 |
-src_install() { |
820 |
- emake DESTDIR="${D}" install |
821 |
- keepdir /var/lib/racoon |
822 |
- newconfd "${FILESDIR}"/racoon.conf.d-r2 racoon |
823 |
- newinitd "${FILESDIR}"/racoon.init.d-r3 racoon |
824 |
- systemd_dounit "${FILESDIR}/ipsec-tools.service" |
825 |
- systemd_dounit "${FILESDIR}/racoon.service" |
826 |
- use pam && newpamd "${FILESDIR}"/racoon.pam.d racoon |
827 |
- |
828 |
- insinto /etc |
829 |
- doins "${FILESDIR}"/ipsec-tools.conf |
830 |
- insinto /etc/racoon |
831 |
- doins "${FILESDIR}"/racoon.conf |
832 |
- doins "${FILESDIR}"/psk.txt |
833 |
- chmod 400 "${D}"/etc/racoon/psk.txt |
834 |
- |
835 |
- dodoc ChangeLog README NEWS |
836 |
- dodoc -r src/racoon/samples |
837 |
- dodoc -r src/racoon/doc |
838 |
- docinto samples |
839 |
- newdoc src/setkey/sample.cf ipsec-tools.conf |
840 |
-} |
841 |
- |
842 |
-pkg_postinst() { |
843 |
- if use nat; then |
844 |
- elog |
845 |
- elog "You have enabled the nat traversal functionnality." |
846 |
- elog "Nat versions wich are enabled by default are 00,02,rfc" |
847 |
- elog "you can find those drafts in the CVS repository:" |
848 |
- elog "cvs -d anoncvs@××××××××××××××.org:/cvsroot co ipsec-tools" |
849 |
- elog |
850 |
- elog "If you feel brave enough and you know what you are" |
851 |
- elog "doing, you can consider emerging this ebuild with" |
852 |
- elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\"" |
853 |
- elog |
854 |
- fi |
855 |
- |
856 |
- if use ldap; then |
857 |
- elog |
858 |
- elog "You have enabled ldap support with {$PN}." |
859 |
- elog "The man page does NOT contain any information on it yet." |
860 |
- elog "Consider using a more recent version or CVS." |
861 |
- elog |
862 |
- fi |
863 |
- |
864 |
- elog |
865 |
- elog "Please have a look in /usr/share/doc/${P} and visit" |
866 |
- elog "http://www.netbsd.org/Documentation/network/ipsec/" |
867 |
- elog "to find more information on how to configure this tool." |
868 |
- elog |
869 |
-} |
870 |
|
871 |
diff --git a/net-vpn/ipsec-tools/metadata.xml b/net-vpn/ipsec-tools/metadata.xml |
872 |
deleted file mode 100644 |
873 |
index b9c2c832..00000000 |
874 |
--- a/net-vpn/ipsec-tools/metadata.xml |
875 |
+++ /dev/null |
876 |
@@ -1,17 +0,0 @@ |
877 |
-<?xml version="1.0" encoding="UTF-8"?> |
878 |
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> |
879 |
-<pkgmetadata> |
880 |
- <maintainer type="person"> |
881 |
- <email>blueness@g.o</email> |
882 |
- </maintainer> |
883 |
- <use> |
884 |
- <flag name="hybrid">Makes available both mode-cfg and xauth support</flag> |
885 |
- <flag name="idea">Enable support for the IDEA algorithm</flag> |
886 |
- <flag name="nat">Enable NAT-Traversal</flag> |
887 |
- <flag name="rc5">Enable support for the patented RC5 algorithm</flag> |
888 |
- <flag name="stats">Enable statistics reporting</flag> |
889 |
- </use> |
890 |
- <upstream> |
891 |
- <remote-id type="sourceforge">ipsec-tools</remote-id> |
892 |
- </upstream> |
893 |
-</pkgmetadata> |