diff options
author | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2006-07-09 11:33:52 +0000 |
---|---|---|
committer | Rene Mayrhofer <rene@mayrhofer.eu.org> | 2006-07-09 11:33:52 +0000 |
commit | 6c52b4433653fcf6a617db3ca6a32f82b5faad75 (patch) | |
tree | 2515d180a75796c0a2c4386537625fdf7cace330 /debian/strongswan.config | |
parent | d77c03b304539cd2be9deac38b80e4a6c7bde4ba (diff) | |
download | vyos-strongswan-6c52b4433653fcf6a617db3ca6a32f82b5faad75.tar.gz vyos-strongswan-6c52b4433653fcf6a617db3ca6a32f82b5faad75.zip |
- Many small changes to make it a Debian policy compliant package.
- No longer build the KLIPS binary packages, because strongswan 4.x will
remove KLIPS anyway.
Diffstat (limited to 'debian/strongswan.config')
-rw-r--r-- | debian/strongswan.config | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/debian/strongswan.config b/debian/strongswan.config index e779a2ab1..0d051f4ce 100644 --- a/debian/strongswan.config +++ b/debian/strongswan.config @@ -2,56 +2,56 @@ . /usr/share/debconf/confmodule -db_input medium openswan/start_level || true +db_input medium strongswan/start_level || true -db_input medium openswan/restart || true +db_input medium strongswan/restart || true -db_input high openswan/enable-oe || true +db_input high strongswan/enable-oe || true -db_input high openswan/create_rsa_key || true +db_input high strongswan/create_rsa_key || true db_go || true -db_get openswan/create_rsa_key +db_get strongswan/create_rsa_key if [ "$RET" = "true" ]; then - db_input high openswan/rsa_key_type || true + db_input high strongswan/rsa_key_type || true db_go || true - db_get openswan/rsa_key_type + db_get strongswan/rsa_key_type if [ "$RET" = "plain" ]; then # create just a plain RSA keypair - db_input medium openswan/rsa_key_length || true + db_input medium strongswan/rsa_key_length || true db_go || true else # extract the RSA keypair from a x509 certificate - db_input high openswan/existing_x509_certificate || true + db_input high strongswan/existing_x509_certificate || true db_go || true # create a new certificate - db_input medium openswan/rsa_key_length || true - db_input high openswan/x509_self_signed || true + db_input medium strongswan/rsa_key_length || true + db_input high strongswan/x509_self_signed || true # we can't allow the country code to be empty - openssl will # refuse to create a certificate this way countrycode="" while [ -z "$countrycode" ]; do - db_input medium openswan/x509_country_code || true + db_input medium strongswan/x509_country_code || true db_go || true - db_get openswan/x509_country_code + db_get strongswan/x509_country_code countrycode="$RET" done - db_input medium openswan/x509_state_name || true - db_input medium openswan/x509_locality_name || true - db_input medium openswan/x509_organization_name || true - db_input medium openswan/x509_organizational_unit || true - db_input medium openswan/x509_common_name || true - db_input medium openswan/x509_email_address || true + db_input medium strongswan/x509_state_name || true + db_input medium strongswan/x509_locality_name || true + db_input medium strongswan/x509_organization_name || true + db_input medium strongswan/x509_organizational_unit || true + db_input medium strongswan/x509_common_name || true + db_input medium strongswan/x509_email_address || true db_go || true fi else - db_get openswan/existing_x509_certificate + db_get strongswan/existing_x509_certificate if [ "$RET" = "true" ]; then # existing certificate - use it - db_input critical openswan/existing_x509_certificate_filename || true - db_input critical openswan/existing_x509_key_filename || true + db_input critical strongswan/existing_x509_certificate_filename || true + db_input critical strongswan/existing_x509_key_filename || true db_go || true fi fi |