From 6c52b4433653fcf6a617db3ca6a32f82b5faad75 Mon Sep 17 00:00:00 2001 From: Rene Mayrhofer Date: Sun, 9 Jul 2006 11:33:52 +0000 Subject: - Many small changes to make it a Debian policy compliant package. - No longer build the KLIPS binary packages, because strongswan 4.x will remove KLIPS anyway. --- debian/strongswan.config | 44 ++++++++++++++++++++++---------------------- 1 file changed, 22 insertions(+), 22 deletions(-) (limited to 'debian/strongswan.config') diff --git a/debian/strongswan.config b/debian/strongswan.config index e779a2ab1..0d051f4ce 100644 --- a/debian/strongswan.config +++ b/debian/strongswan.config @@ -2,56 +2,56 @@ . /usr/share/debconf/confmodule -db_input medium openswan/start_level || true +db_input medium strongswan/start_level || true -db_input medium openswan/restart || true +db_input medium strongswan/restart || true -db_input high openswan/enable-oe || true +db_input high strongswan/enable-oe || true -db_input high openswan/create_rsa_key || true +db_input high strongswan/create_rsa_key || true db_go || true -db_get openswan/create_rsa_key +db_get strongswan/create_rsa_key if [ "$RET" = "true" ]; then - db_input high openswan/rsa_key_type || true + db_input high strongswan/rsa_key_type || true db_go || true - db_get openswan/rsa_key_type + db_get strongswan/rsa_key_type if [ "$RET" = "plain" ]; then # create just a plain RSA keypair - db_input medium openswan/rsa_key_length || true + db_input medium strongswan/rsa_key_length || true db_go || true else # extract the RSA keypair from a x509 certificate - db_input high openswan/existing_x509_certificate || true + db_input high strongswan/existing_x509_certificate || true db_go || true # create a new certificate - db_input medium openswan/rsa_key_length || true - db_input high openswan/x509_self_signed || true + db_input medium strongswan/rsa_key_length || true + db_input high strongswan/x509_self_signed || true # we can't allow the country code to be empty - openssl will # refuse to create a certificate this way countrycode="" while [ -z "$countrycode" ]; do - db_input medium openswan/x509_country_code || true + db_input medium strongswan/x509_country_code || true db_go || true - db_get openswan/x509_country_code + db_get strongswan/x509_country_code countrycode="$RET" done - db_input medium openswan/x509_state_name || true - db_input medium openswan/x509_locality_name || true - db_input medium openswan/x509_organization_name || true - db_input medium openswan/x509_organizational_unit || true - db_input medium openswan/x509_common_name || true - db_input medium openswan/x509_email_address || true + db_input medium strongswan/x509_state_name || true + db_input medium strongswan/x509_locality_name || true + db_input medium strongswan/x509_organization_name || true + db_input medium strongswan/x509_organizational_unit || true + db_input medium strongswan/x509_common_name || true + db_input medium strongswan/x509_email_address || true db_go || true fi else - db_get openswan/existing_x509_certificate + db_get strongswan/existing_x509_certificate if [ "$RET" = "true" ]; then # existing certificate - use it - db_input critical openswan/existing_x509_certificate_filename || true - db_input critical openswan/existing_x509_key_filename || true + db_input critical strongswan/existing_x509_certificate_filename || true + db_input critical strongswan/existing_x509_key_filename || true db_go || true fi fi -- cgit v1.2.3