source:
freewrt/package/openswan/patches/scripts.patch@
b917538
| Last change on this file since b917538 was b917538, checked in by , 19 years ago | |
|---|---|
|
|
| File size: 7.6 KB | |
-
programs/loggerfix
diff -Nur openswan-2.4.6/programs/loggerfix openswan-2.4.6.scripts/programs/loggerfix
old new 1 #!/bin/sh 2 # use filename instead of /dev/null to log, but dont log to flash or ram 3 # pref. log to nfs mount 4 echo "$*" >> /dev/null 5 exit 0 -
programs/look/look.in
diff -Nur openswan-2.4.6/programs/look/look.in openswan-2.4.6.scripts/programs/look/look.in
old new 84 84 then 85 85 pat="$pat|$defaultroutephys\$|$defaultroutevirt\$" 86 86 else 87 for i in `echo "$IPSECinterfaces" | sed 's/=/ /'`87 for i in `echo "$IPSECinterfaces" | tr '=' ' '` 88 88 do 89 89 pat="$pat|$i\$" 90 90 done -
programs/_plutorun/_plutorun.in
diff -Nur openswan-2.4.6/programs/_plutorun/_plutorun.in openswan-2.4.6.scripts/programs/_plutorun/_plutorun.in
old new 147 147 exit 1 148 148 fi 149 149 else 150 if test ! -w "` dirname $stderrlog`"150 if test ! -w "`echo $stderrlog | sed -r 's/(^.*\/)(.*$)/\1/'`" 151 151 then 152 152 echo Cannot write to directory to create \"$stderrlog\". 153 153 exit 1 -
programs/_realsetup/_realsetup.in
diff -Nur openswan-2.4.6/programs/_realsetup/_realsetup.in openswan-2.4.6.scripts/programs/_realsetup/_realsetup.in
old new 232 232 233 233 # misc pre-Pluto setup 234 234 235 perform test -d ` dirname $subsyslock` "&&" touch $subsyslock235 perform test -d `echo $subsyslock | sed -r 's/(^.*\/)(.*$)/\1/'` "&&" touch $subsyslock 236 236 237 237 if test " $IPSECforwardcontrol" = " yes" 238 238 then … … 344 344 lsmod 2>&1 | grep "^xfrm_user" > /dev/null && rmmod -s xfrm_user 345 345 fi 346 346 347 perform test -d ` dirname $subsyslock`"&&" rm -f $subsyslock347 perform test -d `echo $subsyslock | sed -r 's/(^.*\/)(.*$)/\1/'` "&&" touch $subsyslock "&&" rm -f $subsyslock 348 348 349 349 perform rm -f $info $lock $plutopid 350 350 perform echo "...Openswan IPsec stopped" "|" $LOGONLY -
programs/send-pr/send-pr.in
diff -Nur openswan-2.4.6/programs/send-pr/send-pr.in openswan-2.4.6.scripts/programs/send-pr/send-pr.in
old new 402 402 else 403 403 if [ "$fieldname" != "Category" ] 404 404 then 405 values=`${BINDIR}/query-pr --valid-values $fieldname | sed ':a;N;$!ba;s/\n/ /g' | sed 's/ *$//g;s/ / | /g;s/^/[ /;s/$/ ]/;'`405 values=`${BINDIR}/query-pr --valid-values $fieldname | tr '\n' ' ' | sed 's/ *$//g;s/ / | /g;s/^/[ /;s/$/ ]/;'` 406 406 valslen=`echo "$values" | wc -c` 407 407 else 408 408 values="choose from a category listed above" … … 414 414 else 415 415 desc="<${values} (one line)>"; 416 416 fi 417 dpat=`echo "$desc" | sed 's/[][*+^$|\()&/]/./g'`417 dpat=`echo "$desc" | tr '\]\[*+^$|\()&/' '............'` 418 418 echo "/^>${fieldname}:/ s/${dpat}//" >> $FIXFIL 419 419 fi 420 420 echo "${fmtname}${desc}" >> $file … … 425 425 desc=" $default_val"; 426 426 else 427 427 desc=" <`${BINDIR}/query-pr --field-description $fieldname` (multiple lines)>"; 428 dpat=`echo "$desc" | sed 's/[][*+^$|\()&/]/./g'`428 dpat=`echo "$desc" | tr '\]\[*+^$|\()&/' '............'` 429 429 echo "s/^${dpat}//" >> $FIXFIL 430 430 fi 431 431 echo "${fmtname}" >> $file; … … 437 437 desc="${default_val}" 438 438 else 439 439 desc="<`${BINDIR}/query-pr --field-description $fieldname` (one line)>" 440 dpat=`echo "$desc" | sed 's/[][*+^$|\()&/]/./g'`440 dpat=`echo "$desc" | tr '\]\[*+^$|\()&/' '............'` 441 441 echo "/^>${fieldname}:/ s/${dpat}//" >> $FIXFIL 442 442 fi 443 443 echo "${fmtname}${desc}" >> $file -
programs/setup/setup.in
diff -Nur openswan-2.4.6/programs/setup/setup.in openswan-2.4.6.scripts/programs/setup/setup.in
old new 117 117 # do it 118 118 case "$1" in 119 119 start|--start|stop|--stop|_autostop|_autostart) 120 if test " `id -u`" != " 0"120 if [ "x${USER}" != "xroot" ] 121 121 then 122 122 echo "permission denied (must be superuser)" | 123 123 logger -s -p $IPSECsyslog -t ipsec_setup 2>&1 124 124 exit 1 125 125 fi 126 127 # make sure all required directories exist 128 if [ ! -d /var/run/pluto ] 129 then 130 mkdir -p /var/run/pluto 131 fi 132 if [ ! -d /var/lock/subsys ] 133 then 134 mkdir -p /var/lock/subsys 135 fi 126 136 tmp=/var/run/pluto/ipsec_setup.st 127 137 outtmp=/var/run/pluto/ipsec_setup.out 128 138 ( -
programs/showhostkey/showhostkey.in
diff -Nur openswan-2.4.6/programs/showhostkey/showhostkey.in openswan-2.4.6.scripts/programs/showhostkey/showhostkey.in
old new 63 63 exit 1 64 64 fi 65 65 66 host="` hostname --fqdn`"66 host="`cat /proc/sys/kernel/hostname`" 67 67 68 68 awk ' BEGIN { 69 69 inkey = 0 -
programs/_startklips/_startklips.in
diff -Nur openswan-2.4.6/programs/_startklips/_startklips.in openswan-2.4.6.scripts/programs/_startklips/_startklips.in
old new 242 242 fi 243 243 if test -f $moduleinstplace/$wantgoo 244 244 then 245 echo " modprobefailed, but found matching template module $wantgoo."245 echo "insmod failed, but found matching template module $wantgoo." 246 246 echo "Copying $moduleinstplace/$wantgoo to $module." 247 247 rm -f $module 248 248 mkdir -p $moduleplace … … 262 262 echo "FATAL ERROR: Both KLIPS and NETKEY IPsec code is present in kernel" 263 263 exit 264 264 fi 265 if test ! -f $ipsecversion && test ! -f $netkey && modprobe -qnipsec265 if test ! -f $ipsecversion && test ! -f $netkey && insmod ipsec 266 266 then 267 267 # statically compiled KLIPS/NETKEY not found; try to load the module 268 modprobeipsec268 insmod ipsec 269 269 fi 270 270 271 271 if test ! -f $ipsecversion && test ! -f $netkey 272 272 then 273 modprobe-v af_key273 insmod -v af_key 274 274 fi 275 275 276 276 if test -f $netkey … … 278 278 klips=false 279 279 if test -f $modules 280 280 then 281 modprobe-qv ah4282 modprobe-qv esp4283 modprobe-qv ipcomp281 insmod -qv ah4 282 insmod -qv esp4 283 insmod -qv ipcomp 284 284 # xfrm4_tunnel is needed by ipip and ipcomp 285 modprobe-qv xfrm4_tunnel285 insmod -qv xfrm4_tunnel 286 286 # xfrm_user contains netlink support for IPsec 287 modprobe-qv xfrm_user287 insmod -qv xfrm_user 288 288 if [ -n "`cat /proc/cpuinfo |grep Nehemiah`" ] 289 289 then 290 290 echo "VIA Nehemiah detected, probing for PadLock" 291 modprobe-qv hw_random291 insmod -qv hw_random 292 292 # padlock must load before aes module 293 modprobe-qv padlock293 insmod -qv padlock 294 294 fi 295 295 # load the most common ciphers/algo's 296 modprobe-qv sha1297 modprobe-qv md5298 modprobe-qv des299 modprobe-qv aes296 insmod -qv sha1 297 insmod -qv md5 298 insmod -qv des 299 insmod -qv aes 300 300 fi 301 301 fi 302 302 … … 312 312 fi 313 313 unset MODPATH MODULECONF # no user overrides! 314 314 depmod -a >/dev/null 2>&1 315 modprobe-qv hw_random315 insmod -qv hw_random 316 316 # padlock must load before aes module 317 modprobe-qv padlock318 modprobe-v ipsec317 insmod -qv padlock 318 insmod -v ipsec 319 319 fi 320 320 if test ! -f $ipsecversion 321 321 then
Note:
See TracBrowser
for help on using the repository browser.
