summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Black <dragonheart@gentoo.org>2007-04-21 12:24:23 +0000
committerDaniel Black <dragonheart@gentoo.org>2007-04-21 12:24:23 +0000
commit4ef01484c6e2c52d2379138f0082b6ccd8dd6759 (patch)
tree28dc623a02a7aa0a91c4fd924d98a55419d83c8e /net-firewall/ipsec-tools
parentia64 stable (diff)
downloadgentoo-2-4ef01484c6e2c52d2379138f0082b6ccd8dd6759.tar.gz
gentoo-2-4ef01484c6e2c52d2379138f0082b6ccd8dd6759.tar.bz2
gentoo-2-4ef01484c6e2c52d2379138f0082b6ccd8dd6759.zip
sercurity version bump as per bug #173219. Init script enhancement as per bug #151375. bug #152971 for major enhancements to this ebuild
(Portage version: 2.1.2.2)
Diffstat (limited to 'net-firewall/ipsec-tools')
-rw-r--r--net-firewall/ipsec-tools/ChangeLog17
-rw-r--r--net-firewall/ipsec-tools/files/digest-ipsec-tools-0.4-r23
-rw-r--r--net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.2-r13
-rw-r--r--net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.33
-rw-r--r--net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.73
-rw-r--r--net-firewall/ipsec-tools/files/ipsec-tools-0.4-dos-fix.diff29
-rw-r--r--net-firewall/ipsec-tools/files/ipsec-tools-0.4-gcc34.diff31
-rw-r--r--net-firewall/ipsec-tools/files/ipsec-tools-0.5-ipv6.diff10
-rw-r--r--net-firewall/ipsec-tools/files/ipsec-tools-0.5-isakmp-underrun.diff22
-rw-r--r--net-firewall/ipsec-tools/files/ipsec-tools-0.6.2-dos-fix.diff29
-rw-r--r--net-firewall/ipsec-tools/files/ipsec.conf.sample10
-rw-r--r--net-firewall/ipsec-tools/files/racoon.init.d4
-rw-r--r--net-firewall/ipsec-tools/ipsec-tools-0.4-r2.ebuild53
-rw-r--r--net-firewall/ipsec-tools/ipsec-tools-0.6.2-r1.ebuild62
-rw-r--r--net-firewall/ipsec-tools/ipsec-tools-0.6.3.ebuild61
-rw-r--r--net-firewall/ipsec-tools/ipsec-tools-0.6.7.ebuild267
16 files changed, 288 insertions, 319 deletions
diff --git a/net-firewall/ipsec-tools/ChangeLog b/net-firewall/ipsec-tools/ChangeLog
index b97d09fd58fc..7db5420f8de6 100644
--- a/net-firewall/ipsec-tools/ChangeLog
+++ b/net-firewall/ipsec-tools/ChangeLog
@@ -1,6 +1,21 @@
# ChangeLog for net-firewall/ipsec-tools
# Copyright 2000-2007 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.49 2007/03/12 21:03:37 armin76 Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.50 2007/04/21 12:24:23 dragonheart Exp $
+
+*ipsec-tools-0.6.7 (21 Apr 2007)
+
+ 21 Apr 2007; Daniel Black <dragonheart@gentoo.org>
+ -files/ipsec-tools-0.4-dos-fix.diff, -files/ipsec-tools-0.4-gcc34.diff,
+ -files/ipsec-tools-0.5-ipv6.diff,
+ -files/ipsec-tools-0.5-isakmp-underrun.diff,
+ -files/ipsec-tools-0.6.2-dos-fix.diff, -files/ipsec.conf.sample,
+ files/racoon.init.d, -ipsec-tools-0.4-r2.ebuild,
+ -ipsec-tools-0.6.2-r1.ebuild, -ipsec-tools-0.6.3.ebuild,
+ +ipsec-tools-0.6.7.ebuild:
+ security version bump as per bug #173219. Init script enhancement as per bug
+ #151375 thanks Hopeless. Big thanks to Kalin KOZHUHAROV bug #152971 comment
+ 23 and Cyrius for the major enhancements to this ebuild. Cleaned out old
+ ebuilds too
12 Mar 2007; Raúl Porcel <armin76@gentoo.org> ipsec-tools-0.6.5.ebuild:
x86 stable
diff --git a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.4-r2 b/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.4-r2
deleted file mode 100644
index 7a3e4dcf311e..000000000000
--- a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.4-r2
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 dceea3b72328a580cf156d74cbee6f80 ipsec-tools-0.4.tar.gz 915420
-RMD160 3bdb7f6013ec98db29d0c1bd307f7a49335f4edd ipsec-tools-0.4.tar.gz 915420
-SHA256 bc25b398f8a0e0b3456c968961ccf972f66c02422c4d3e549e14d331f977e155 ipsec-tools-0.4.tar.gz 915420
diff --git a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.2-r1 b/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.2-r1
deleted file mode 100644
index 812190d9d5af..000000000000
--- a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.2-r1
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 3d94d4a13daff63c1bd57a4f1f6462d0 ipsec-tools-0.6.2.tar.bz2 663760
-RMD160 427c394e3af1cc9a23ee2dd6a5753481ee528908 ipsec-tools-0.6.2.tar.bz2 663760
-SHA256 d59f8441000cb6a4e6108eeecca1f1233e43575eb5bd16c2cff7a2e0fae5602c ipsec-tools-0.6.2.tar.bz2 663760
diff --git a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.3 b/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.3
deleted file mode 100644
index 4fc0eb65ad35..000000000000
--- a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.3
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 8070f90402919d8d313c32c2ee465b2f ipsec-tools-0.6.3.tar.bz2 664796
-RMD160 b9569a7af2069d3b7fe9d7153dac96ffab59c64c ipsec-tools-0.6.3.tar.bz2 664796
-SHA256 b5755278226d7ca7fecddc50ecd78ec98b0551d11977c8739466709fea3584da ipsec-tools-0.6.3.tar.bz2 664796
diff --git a/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.7 b/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.7
new file mode 100644
index 000000000000..37b4293bbb67
--- /dev/null
+++ b/net-firewall/ipsec-tools/files/digest-ipsec-tools-0.6.7
@@ -0,0 +1,3 @@
+MD5 4fb764f282dc21cf9a656c58e13dacbb ipsec-tools-0.6.7.tar.bz2 723032
+RMD160 97c27922f5be941fd6c69e35e69bed921b9f13e7 ipsec-tools-0.6.7.tar.bz2 723032
+SHA256 4239f836dc610a2443ded7ba35cb3b87de9d582c800e5d9eb5eed37defd61ef2 ipsec-tools-0.6.7.tar.bz2 723032
diff --git a/net-firewall/ipsec-tools/files/ipsec-tools-0.4-dos-fix.diff b/net-firewall/ipsec-tools/files/ipsec-tools-0.4-dos-fix.diff
deleted file mode 100644
index a7b44c268897..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec-tools-0.4-dos-fix.diff
+++ /dev/null
@@ -1,29 +0,0 @@
-diff -aur ipsec-tools-0.4-orig/src/racoon/isakmp_agg.c ipsec-tools-0.4/src/racoon/isakmp_agg.c
---- ipsec-tools-0.4-orig/src/racoon/isakmp_agg.c 2004-03-23 04:50:27.000000000 -0800
-+++ ipsec-tools-0.4/src/racoon/isakmp_agg.c 2005-12-03 11:25:10.000000000 -0800
-@@ -400,7 +400,11 @@
- }
-
- /* payload existency check */
-- /* XXX to be checked each authentication method. */
-+ if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
-+ plog(LLV_ERROR, LOCATION, iph1->remote,
-+ "few isakmp message received.\n");
-+ goto end;
-+ }
-
- /* verify identifier */
- if (ipsecdoi_checkid1(iph1) != 0) {
-@@ -755,7 +759,11 @@
- }
-
- /* payload existency check */
-- /* XXX to be checked each authentication method. */
-+ if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
-+ plog(LLV_ERROR, LOCATION, iph1->remote,
-+ "few isakmp message received.\n");
-+ goto end;
-+ }
-
- /* verify identifier */
- if (ipsecdoi_checkid1(iph1) != 0) {
diff --git a/net-firewall/ipsec-tools/files/ipsec-tools-0.4-gcc34.diff b/net-firewall/ipsec-tools/files/ipsec-tools-0.4-gcc34.diff
deleted file mode 100644
index 7f6caec6b2f0..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec-tools-0.4-gcc34.diff
+++ /dev/null
@@ -1,31 +0,0 @@
-diff -aur ipsec-tools-0.4-orig/src/racoon/sockmisc.c ipsec-tools-0.4/src/racoon/sockmisc.c
---- ipsec-tools-0.4-orig/src/racoon/sockmisc.c 2004-11-16 11:15:42.000000000 -0500
-+++ ipsec-tools-0.4/src/racoon/sockmisc.c 2004-12-16 14:42:25.543888328 -0500
-@@ -834,7 +834,7 @@
- if (saddr == NULL)
- return NULL;
-
-- GETNAMEINFO(saddr, addr, NULL);
-+ GETNAMEINFO_NULL(saddr, addr);
- snprintf(buf, sizeof(buf), "%s", addr);
-
- return buf;
-diff -aur ipsec-tools-0.4-orig/src/racoon/var.h ipsec-tools-0.4/src/racoon/var.h
---- ipsec-tools-0.4-orig/src/racoon/var.h 2004-06-11 12:00:17.000000000 -0400
-+++ ipsec-tools-0.4/src/racoon/var.h 2004-12-16 14:42:14.983493752 -0500
-@@ -82,6 +82,15 @@
- } \
- } while (0);
-
-+#define GETNAMEINFO_NULL(x, y) \
-+do { \
-+ if (getnameinfo((x), sysdep_sa_len(x), (y), sizeof(y), NULL, 0, \
-+ NIFLAGS) != 0) { \
-+ if (y) \
-+ strncpy((y), "(invalid)", sizeof(y)); \
-+ } \
-+} while (0);
-+
- #include <sys/queue.h>
- #ifndef LIST_FOREACH
- #define LIST_FOREACH(elm, head, field) \
diff --git a/net-firewall/ipsec-tools/files/ipsec-tools-0.5-ipv6.diff b/net-firewall/ipsec-tools/files/ipsec-tools-0.5-ipv6.diff
deleted file mode 100644
index e2939f046f23..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec-tools-0.5-ipv6.diff
+++ /dev/null
@@ -1,10 +0,0 @@
---- configure.ac.orig 2005-04-10 21:56:50.000000000 +0900
-+++ configure.ac 2005-04-10 21:56:37.000000000 +0900
-@@ -326,6 +326,7 @@
- ))
-
- if test "$ipv6" = "yes"; then
-+ AC_DEFINE([INET6], [], [Support IPv6])
- AC_MSG_CHECKING(for advanced API support)
- AC_TRY_COMPILE([#ifndef INET6
- #define INET6
diff --git a/net-firewall/ipsec-tools/files/ipsec-tools-0.5-isakmp-underrun.diff b/net-firewall/ipsec-tools/files/ipsec-tools-0.5-isakmp-underrun.diff
deleted file mode 100644
index 87453d98421f..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec-tools-0.5-isakmp-underrun.diff
+++ /dev/null
@@ -1,22 +0,0 @@
-? configure.lineno
-? src/racoon/kmpstat.lo
-? src/racoon/libracoon.la
-? src/racoon/misc.lo
-? src/racoon/sockmisc.lo
-? src/racoon/vmbuf.lo
-Index: src/racoon/isakmp.c
-===================================================================
-RCS file: /cvsroot/ipsec-tools/ipsec-tools/src/racoon/isakmp.c,v
-retrieving revision 1.36
-diff -u -r1.36 isakmp.c
---- src/racoon/isakmp.c 7 Mar 2005 00:30:37 -0000 1.36
-+++ src/racoon/isakmp.c 7 Mar 2005 16:31:24 -0000
-@@ -1352,7 +1352,7 @@
-
- p->type = np;
- p->len = ntohs(gen->len);
-- if (p->len == 0 || p->len > tlen) {
-+ if (p->len < sizeof(struct isakmp_gen) || p->len > tlen) {
- plog(LLV_DEBUG, LOCATION, NULL,
- "invalid length of payload\n");
- vfree(result);
diff --git a/net-firewall/ipsec-tools/files/ipsec-tools-0.6.2-dos-fix.diff b/net-firewall/ipsec-tools/files/ipsec-tools-0.6.2-dos-fix.diff
deleted file mode 100644
index 385d5a14000f..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec-tools-0.6.2-dos-fix.diff
+++ /dev/null
@@ -1,29 +0,0 @@
-diff -aur ipsec-tools-0.6.2-orig/src/racoon/isakmp_agg.c ipsec-tools-0.6.2/src/racoon/isakmp_agg.c
---- ipsec-tools-0.6.2-orig/src/racoon/isakmp_agg.c 2005-09-26 09:12:20.000000000 -0700
-+++ ipsec-tools-0.6.2/src/racoon/isakmp_agg.c 2005-12-02 01:04:23.000000000 -0800
-@@ -488,7 +488,11 @@
- }
-
- /* payload existency check */
-- /* XXX to be checked each authentication method. */
-+ if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
-+ plog(LLV_ERROR, LOCATION, iph1->remote,
-+ "few isakmp message received.\n");
-+ goto end;
-+ }
-
- /* verify identifier */
- if (ipsecdoi_checkid1(iph1) != 0) {
-@@ -888,7 +892,11 @@
- }
-
- /* payload existency check */
-- /* XXX to be checked each authentication method. */
-+ if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
-+ plog(LLV_ERROR, LOCATION, iph1->remote,
-+ "few isakmp message received.\n");
-+ goto end;
-+ }
-
- /* verify identifier */
- if (ipsecdoi_checkid1(iph1) != 0) {
diff --git a/net-firewall/ipsec-tools/files/ipsec.conf.sample b/net-firewall/ipsec-tools/files/ipsec.conf.sample
deleted file mode 100644
index 078d5baf5fe8..000000000000
--- a/net-firewall/ipsec-tools/files/ipsec.conf.sample
+++ /dev/null
@@ -1,10 +0,0 @@
-#!/usr/sbin/setkey -f
-
-flush;
-spdflush;
-
-spdadd xxx.xxx.xxx.xxx/32 0.0.0.0/0 any
- -P out ipsec esp/tunnel/xxx.xxx.xxx.xxx-yyy.yyy.yyy.yyy/require;
-
-spdadd 0.0.0.0/0 xxx.xxx.xxx.xxx/32 any
- -P in ipsec esp/tunnel/yyy.yyy.yyy.yyy-xxx.xxx.xxx.xxx/require;
diff --git a/net-firewall/ipsec-tools/files/racoon.init.d b/net-firewall/ipsec-tools/files/racoon.init.d
index a0b47237a768..16fdec7e3a37 100644
--- a/net-firewall/ipsec-tools/files/racoon.init.d
+++ b/net-firewall/ipsec-tools/files/racoon.init.d
@@ -41,13 +41,13 @@ start() {
eerror "Error while loading ipsec policies"
fi
ebegin "Starting racoon"
- /usr/sbin/racoon -f ${RACOON_CONF} ${RACOON_OPTS}
+ start-stop-daemon -S -x /usr/sbin/racoon -- -f ${RACOON_CONF} ${RACOON_OPTS}
eend $?
}
stop() {
ebegin "Stopping racoon"
- kill `cat /var/run/racoon.pid`
+ start-stop-daemon -K -p /var/run/racoon.pid
eend $?
if [ -n "${RACOON_RESET_TABLES}" ]; then
ebegin "Flushing policy entries"
diff --git a/net-firewall/ipsec-tools/ipsec-tools-0.4-r2.ebuild b/net-firewall/ipsec-tools/ipsec-tools-0.4-r2.ebuild
deleted file mode 100644
index a91f1e88ed87..000000000000
--- a/net-firewall/ipsec-tools/ipsec-tools-0.4-r2.ebuild
+++ /dev/null
@@ -1,53 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.4-r2.ebuild,v 1.2 2005/12/04 20:20:56 weeve Exp $
-
-inherit eutils
-
-DESCRIPTION="IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation."
-HOMEPAGE="http://ipsec-tools.sourceforge.net/"
-SRC_URI="mirror://sourceforge/${PN}/${P}.tar.gz"
-LICENSE="BSD"
-KEYWORDS="~amd64 sparc ~x86"
-SLOT="0"
-IUSE="selinux"
-DEPEND="virtual/libc
- >=dev-libs/openssl-0.9.6"
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-ipsec-tools )"
-
-pkg_setup() {
- my_KV=`echo ${KV} | cut -f-2 -d "."`
- if [ ${my_KV} != "2.6" ] ; then
- echo; eerror "You need a 2.6.x kernel to use the ipsec tools!"; die "You need a 2.6 kernel to use ipsec-tools!"
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
- epatch ${FILESDIR}/${P}-gcc34.diff
- epatch ${FILESDIR}/${PN}-0.5-isakmp-underrun.diff
- epatch ${FILESDIR}/${P}-dos-fix.diff
-}
-
-src_compile() {
- unset CC
- ./configure --prefix=/usr --sysconfdir=/etc --with-kernel-headers=/usr/src/linux/include || die
- sed -e 's:AM_CFLAGS = :AM_CFLAGS = -include /usr/src/linux/include/linux/compiler.h :' -i src/setkey/Makefile || die
- sed -e 's:CPPFLAGS=:CPPFLAGS = -include /usr/src/linux/include/linux/compiler.h :' -i src/racoon/Makefile || die
- sed -e 's:va_copy:__va_copy:g' -i src/racoon/plog.c || die # GCC 2 Fix
- emake || die
-}
-
-src_install() {
- einstall || die
- rm ${D}/usr/bin
- dosbin src/racoon/racoon
- insinto /etc && doins ${FILESDIR}/ipsec.conf.sample
- insinto /etc/conf.d && newins ${FILESDIR}/racoon.conf.d racoon
- exeinto /etc/init.d && newexe ${FILESDIR}/racoon.init.d racoon
-
- dodoc ChangeLog README NEWS
- dodoc ${S}/src/racoon/samples/racoon.conf.sample*
-}
diff --git a/net-firewall/ipsec-tools/ipsec-tools-0.6.2-r1.ebuild b/net-firewall/ipsec-tools/ipsec-tools-0.6.2-r1.ebuild
deleted file mode 100644
index 20d58e9eb3dc..000000000000
--- a/net-firewall/ipsec-tools/ipsec-tools-0.6.2-r1.ebuild
+++ /dev/null
@@ -1,62 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.6.2-r1.ebuild,v 1.3 2005/12/04 22:15:24 latexer Exp $
-
-inherit eutils flag-o-matic
-
-DESCRIPTION="IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation."
-HOMEPAGE="http://ipsec-tools.sourceforge.net/"
-SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2"
-LICENSE="BSD"
-KEYWORDS="amd64 ~ppc x86"
-SLOT="0"
-IUSE="idea ipv6 pam rc5 readline selinux"
-
-DEPEND="virtual/libc
- >=sys-kernel/linux-headers-2.6
- readline? ( sys-libs/readline )
- pam? ( sys-libs/pam )
- >=dev-libs/openssl-0.9.6"
-
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-ipsec-tools )"
-
-src_unpack() {
- unpack ${A}
- cd ${S}
- sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c
- epatch ${FILESDIR}/${P}-dos-fix.diff
- epunt_cxx
-}
-
-src_compile() {
- # Filter the c3 flag for now. Probably a GCC problem, but we'll
- # avoid it here for now. See bug #61025
- filter-flags -march=c3
-
- econf \
- --enable-hybrid \
- --enable-dpd \
- --enable-natt \
- --enable-adminport \
- --enable-frag \
- $(use_enable idea) \
- $(use_enable rc5) \
- $(use_enable ipv6) \
- $(use_with readline) \
- $(use_with pam libpam) \
- || die
- # Removed due to some problems
- # --enable-samode-unspec \
- emake -j1 || die
-}
-
-src_install() {
- einstall || die
- keepdir /var/lib/racoon
- insinto /etc/conf.d && newins ${FILESDIR}/racoon.conf.d racoon
- exeinto /etc/init.d && newexe ${FILESDIR}/racoon.init.d racoon
-
- dodoc ChangeLog README NEWS
- dodoc ${S}/src/racoon/samples/racoon.conf.sample*
-}
diff --git a/net-firewall/ipsec-tools/ipsec-tools-0.6.3.ebuild b/net-firewall/ipsec-tools/ipsec-tools-0.6.3.ebuild
deleted file mode 100644
index 70109cc16998..000000000000
--- a/net-firewall/ipsec-tools/ipsec-tools-0.6.3.ebuild
+++ /dev/null
@@ -1,61 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.6.3.ebuild,v 1.4 2006/10/25 14:30:58 blubb Exp $
-
-inherit eutils flag-o-matic
-
-DESCRIPTION="IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation."
-HOMEPAGE="http://ipsec-tools.sourceforge.net/"
-SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2"
-LICENSE="BSD"
-KEYWORDS="amd64 ~ppc x86"
-SLOT="0"
-IUSE="idea ipv6 pam rc5 readline selinux"
-
-DEPEND="virtual/libc
- !<sys-kernel/linux-headers-2.6
- readline? ( sys-libs/readline )
- pam? ( sys-libs/pam )
- >=dev-libs/openssl-0.9.6"
-
-RDEPEND="${DEPEND}
- selinux? ( sec-policy/selinux-ipsec-tools )"
-
-src_unpack() {
- unpack ${A}
- cd ${S}
- sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c
- epunt_cxx
-}
-
-src_compile() {
- # Filter the c3 flag for now. Probably a GCC problem, but we'll
- # avoid it here for now. See bug #61025
- filter-flags -march=c3
-
- econf \
- --enable-hybrid \
- --enable-dpd \
- --enable-natt \
- --enable-adminport \
- --enable-frag \
- $(use_enable idea) \
- $(use_enable rc5) \
- $(use_enable ipv6) \
- $(use_with readline) \
- $(use_with pam libpam) \
- || die
- # Removed due to some problems
- # --enable-samode-unspec \
- emake -j1 || die
-}
-
-src_install() {
- einstall || die
- keepdir /var/lib/racoon
- insinto /etc/conf.d && newins ${FILESDIR}/racoon.conf.d racoon
- exeinto /etc/init.d && newexe ${FILESDIR}/racoon.init.d racoon
-
- dodoc ChangeLog README NEWS
- dodoc ${S}/src/racoon/samples/racoon.conf.sample*
-}
diff --git a/net-firewall/ipsec-tools/ipsec-tools-0.6.7.ebuild b/net-firewall/ipsec-tools/ipsec-tools-0.6.7.ebuild
new file mode 100644
index 000000000000..c4ca3fde83ea
--- /dev/null
+++ b/net-firewall/ipsec-tools/ipsec-tools-0.6.7.ebuild
@@ -0,0 +1,267 @@
+# Copyright 1999-2007 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.6.7.ebuild,v 1.1 2007/04/21 12:24:23 dragonheart Exp $
+
+inherit eutils flag-o-matic autotools linux-info
+
+DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation"
+HOMEPAGE="http://ipsec-tools.sourceforge.net/"
+SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2"
+LICENSE="BSD"
+KEYWORDS="~amd64 ~ppc ~sparc ~x86"
+SLOT="0"
+IUSE="idea ipv6 pam rc5 readline selinux ldap kerberos nat hybrid"
+
+
+# FIXME: what is the correct syntax for ~sparc ???
+DEPEND="virtual/libc
+ !sparc? ( >=sys-kernel/linux-headers-2.6 )
+ readline? ( sys-libs/readline )
+ pam? ( sys-libs/pam )
+ ldap? ( net-nds/openldap )
+ kerberos? ( app-crypt/mit-krb5 )
+ >=dev-libs/openssl-0.9.8
+ iconv? ( virtual/libiconv )"
+
+# radius? ( net-dialup/gnuradius )
+
+RDEPEND="${DEPEND}
+ selinux? ( sec-policy/selinux-ipsec-tools )"
+
+# {{{ kernel_check()
+kernel_check() {
+ get_version
+ if kernel_is 2 6 ; then
+ if test "${KV_PATCH}" -ge 19 ; then
+ # Just for kernel >=2.6.19
+ ebegin "Checking for suitable kernel configuration (Networking | Networking support | Networking options)"
+
+ if use nat ; then
+ if ! { linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; } ; then
+ ewarn "[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is NOT enabled"
+ eerror "${P} won't compile with use nat traversal (USE=nat) until you enable NETFILTER_XT_MATCH_POLICY in your kernel"
+ die
+ else
+ einfo "....[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is enabled :-)"
+ fi
+ fi
+ # {{{ general stuff
+ if ! { linux_chkconfig_present XFRM_USER; }; then
+ ewarn "[XFRM_USER] Transformation user configuration interface is NOT enabled."
+ else
+ einfo "....[XFRM_USER] Transformation user configuration interface is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present NET_KEY; }; then
+ ewarn "[NET_KEY] PF_KEY sockets is NOT enabled."
+ else
+ einfo "....[NET_KEY] PF_KEY sockets is enabled :-)"
+ fi
+ # }}}
+ # {{{ IPv4 stuff
+ if ! { linux_chkconfig_present INET_IPCOMP; }; then
+ ewarn "[INET_IPCOMP] IP: IPComp transformation is NOT enabled"
+ else
+ einfo "....[INET_IPCOMP] IP: IPComp transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET_AH; }; then
+ ewarn "[INET_AH] AH Transformation is NOT enabled."
+ else
+ einfo "....[INET_AH] AH Transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET_ESP; }; then
+ ewarn "[INET_ESP] ESP Transformation is NOT enabled."
+ else
+ einfo "....[INET_ESP] ESP Transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET_XFRM_MODE_TRANSPORT; }; then
+ ewarn "[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is NOT enabled."
+ else
+ einfo "....[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET_XFRM_MODE_TUNNEL; }; then
+ ewarn "[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is NOT enabled."
+ else
+ einfo "....[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET_XFRM_MODE_BEET; }; then
+ ewarn "[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is NOT enabled."
+ else
+ einfo "....[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is enabled :-)"
+ fi
+ # }}}
+ # {{{ IPv6 stuff
+ if use ipv6 ; then
+ if ! { linux_chkconfig_present INET6_IPCOMP; }; then
+ ewarn "[INET6_IPCOMP] IPv6: IPComp transformation is NOT enabled"
+ else
+ einfo "....[INET6_IPCOMP] IPv6: IPComp transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET6_AH; }; then
+ ewarn "[INET6_AH] IPv6: AH Transformation is NOT enabled."
+ else
+ einfo "....[INET6_AH] IPv6: AH Transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET6_ESP; }; then
+ ewarn "[INET6_ESP] IPv6: ESP Transformation is NOT enabled."
+ else
+ einfo "....[INET6_ESP] IPv6: ESP Transformation is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET6_XFRM_MODE_TRANSPORT; }; then
+ ewarn "[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is NOT enabled."
+ else
+ einfo "....[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET6_XFRM_MODE_TUNNEL; }; then
+ ewarn "[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is NOT enabled."
+ else
+ einfo "....[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is enabled :-)"
+ fi
+
+ if ! { linux_chkconfig_present INET6_XFRM_MODE_BEET; }; then
+ ewarn "[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is NOT enabled."
+ else
+ einfo "....[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is enabled :-)"
+ fi
+ fi
+ # }}}
+
+ eend $?
+ fi
+ fi
+}
+# }}}
+
+src_unpack() {
+ unpack ${A}
+ cd ${S}
+ # fix for bug #76741
+ sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c
+ # fix for bug #124813
+ sed -i 's:-Werror::g' ${S}/configure.ac
+
+ AT_M4DIR="${S}" eautoreconf
+ epunt_cxx
+}
+
+
+
+src_compile() {
+ # fix for bug #61025
+ filter-flags -march=c3
+
+ kernel_check
+
+ myconf="${myconf} --with-kernel-headers=/lib/modules/${KV_FULL}/build/include"
+
+ use nat && myconf="${myconf} --enable-natt --enable-natt-versions=yes"
+# myconf="${myconf} $(use_enable broken-natt)"
+ myconf="${myconf} --enable-dependency-tracking $(use_enable ipv6)"
+# myconf="${myconf} $(use_enable adminport)"
+ myconf="${myconf} $(use_enable rc5)"
+ if use pam; then
+ myconf="${myconf} --enable-hybrid"
+ else
+ myconf="${myconf} $(use_enable hybrid)"
+ fi;
+# myconf="${myconf} $(use_enable dpd)"
+# myconf="${myconf} $(use_enable frag)"
+# myconf="${myconf} $(use_enable stats)"
+# myconf="${myconf} $(use_enable fastquit)"
+# myconf="${myconf} $(use_enable security-context)"
+ myconf="${myconf} --enable-dpd --enable-frag --enable-stats --enable-fastquit"
+ myconf="${myconf} --enable-adminport --enable-security-context"
+ myconf="${myconf} $(use_enable idea)"
+ myconf="${myconf} $(use_enable kerberos gssapi)"
+
+ # dev-libs/libiconv is hard masked
+ #use iconv && myconf="${myconf} $(use_with iconv libiconv)"
+ myconf="${myconf} $(use_with ldap libldap)"
+ myconf="${myconf} $(use_with pam libpam)"
+
+ # the default (/usr/include/openssl/) is OK for Gentoo, leave it
+ # myconf="${myconf} $(use_with ssl openssl )"
+
+ # No way to get it compiling with freeradius or gnuradius
+ # We need libradius wich only exist on FreeBSD
+ #use radius && myconf="${myconf} $(use_with radius libradius )"
+
+ use readline && myconf="${myconf} $(use_with readline )"
+
+ # See bug #77369
+ #myconf="${myconf} --enable-samode-unspec"
+
+ econf ${myconf} || die
+ # As of ${PN}-0.6.6 parallel make is still broken. I hope its fixed now.
+ emake || die
+
+}
+
+src_install() {
+ emake DESTDIR="${D}" install || die
+ keepdir /var/lib/racoon
+ insinto /etc/conf.d && newins "${FILESDIR}"/racoon.conf.d racoon
+ exeinto /etc/init.d && newexe "${FILESDIR}"/racoon.init.d racoon
+
+ dodoc ChangeLog README NEWS
+ dodoc src/racoon/samples/*
+ dodoc src/racoon/doc/*
+
+ docinto roadwarrior
+ dodoc src/racoon/samples/roadwarrior/*
+
+ docinto roadwarrior/client
+ dodoc src/racoon/samples/roadwarrior/client/*
+ docinto roadwarrior/server
+ dodoc src/racoon/samples/roadwarrior/server/*
+
+ docinto setkey
+ dodoc src/setkey/sample.cf
+
+ # RFC are only available from CVS for the moment, see einfo below
+ #docinto "rfc"
+ #dodoc ${S}/src/racoon/rfc/*
+}
+
+pkg_postinst() {
+ if use nat; then
+ elog ""
+ elog " You have enabled the nat traversal functionnality."
+ elog " Nat versions wich are enabled by default are 00,02,rfc"
+ elog " you can find those drafts in the CVS repository:"
+ elog "cvs -d anoncvs@anoncvs.netbsd.org:/cvsroot co ipsec-tools"
+ elog ""
+ elog "If you feel brave enough and you know what you are"
+ elog "doing, you can consider emerging this ebuild"
+ elog "with"
+ elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\""
+ elog ""
+ fi;
+
+ if use ldap; then
+ elog ""
+ elog " You have enabled ldap support with {$PN}."
+ elog " The man page does NOT contain any information on it yet."
+ elog " Consider to use a more recent version or CVS"
+ elog ""
+ fi;
+
+
+ elog ""
+ elog "Please have a look in /usr/share/doc/${P} and visit"
+ elog "http://www.netbsd.org/Documentation/network/ipsec/"
+ elog "to find a lot of information on how to configure this great tool."
+ elog ""
+
+}
+
+# vim: set foldmethod=marker nowrap :