summaryrefslogtreecommitdiff
path: root/debian/strongswan.config
diff options
context:
space:
mode:
authorRene Mayrhofer <rene@mayrhofer.eu.org>2006-07-09 11:33:52 +0000
committerRene Mayrhofer <rene@mayrhofer.eu.org>2006-07-09 11:33:52 +0000
commit6c52b4433653fcf6a617db3ca6a32f82b5faad75 (patch)
tree2515d180a75796c0a2c4386537625fdf7cace330 /debian/strongswan.config
parentd77c03b304539cd2be9deac38b80e4a6c7bde4ba (diff)
downloadvyos-strongswan-6c52b4433653fcf6a617db3ca6a32f82b5faad75.tar.gz
vyos-strongswan-6c52b4433653fcf6a617db3ca6a32f82b5faad75.zip
- Many small changes to make it a Debian policy compliant package.
- No longer build the KLIPS binary packages, because strongswan 4.x will remove KLIPS anyway.
Diffstat (limited to 'debian/strongswan.config')
-rw-r--r--debian/strongswan.config44
1 files changed, 22 insertions, 22 deletions
diff --git a/debian/strongswan.config b/debian/strongswan.config
index e779a2ab1..0d051f4ce 100644
--- a/debian/strongswan.config
+++ b/debian/strongswan.config
@@ -2,56 +2,56 @@
. /usr/share/debconf/confmodule
-db_input medium openswan/start_level || true
+db_input medium strongswan/start_level || true
-db_input medium openswan/restart || true
+db_input medium strongswan/restart || true
-db_input high openswan/enable-oe || true
+db_input high strongswan/enable-oe || true
-db_input high openswan/create_rsa_key || true
+db_input high strongswan/create_rsa_key || true
db_go || true
-db_get openswan/create_rsa_key
+db_get strongswan/create_rsa_key
if [ "$RET" = "true" ]; then
- db_input high openswan/rsa_key_type || true
+ db_input high strongswan/rsa_key_type || true
db_go || true
- db_get openswan/rsa_key_type
+ db_get strongswan/rsa_key_type
if [ "$RET" = "plain" ]; then
# create just a plain RSA keypair
- db_input medium openswan/rsa_key_length || true
+ db_input medium strongswan/rsa_key_length || true
db_go || true
else
# extract the RSA keypair from a x509 certificate
- db_input high openswan/existing_x509_certificate || true
+ db_input high strongswan/existing_x509_certificate || true
db_go || true
# create a new certificate
- db_input medium openswan/rsa_key_length || true
- db_input high openswan/x509_self_signed || true
+ db_input medium strongswan/rsa_key_length || true
+ db_input high strongswan/x509_self_signed || true
# we can't allow the country code to be empty - openssl will
# refuse to create a certificate this way
countrycode=""
while [ -z "$countrycode" ]; do
- db_input medium openswan/x509_country_code || true
+ db_input medium strongswan/x509_country_code || true
db_go || true
- db_get openswan/x509_country_code
+ db_get strongswan/x509_country_code
countrycode="$RET"
done
- db_input medium openswan/x509_state_name || true
- db_input medium openswan/x509_locality_name || true
- db_input medium openswan/x509_organization_name || true
- db_input medium openswan/x509_organizational_unit || true
- db_input medium openswan/x509_common_name || true
- db_input medium openswan/x509_email_address || true
+ db_input medium strongswan/x509_state_name || true
+ db_input medium strongswan/x509_locality_name || true
+ db_input medium strongswan/x509_organization_name || true
+ db_input medium strongswan/x509_organizational_unit || true
+ db_input medium strongswan/x509_common_name || true
+ db_input medium strongswan/x509_email_address || true
db_go || true
fi
else
- db_get openswan/existing_x509_certificate
+ db_get strongswan/existing_x509_certificate
if [ "$RET" = "true" ]; then
# existing certificate - use it
- db_input critical openswan/existing_x509_certificate_filename || true
- db_input critical openswan/existing_x509_key_filename || true
+ db_input critical strongswan/existing_x509_certificate_filename || true
+ db_input critical strongswan/existing_x509_key_filename || true
db_go || true
fi
fi