summaryrefslogtreecommitdiff
path: root/net/pipsecd/files
diff options
context:
space:
mode:
authorRene Ladan <rene@FreeBSD.org>2022-01-15 12:15:58 +0100
committerRene Ladan <rene@FreeBSD.org>2022-01-15 12:15:58 +0100
commitc1eca381dd5792b0d591d24fdae309eb06b2cff0 (patch)
tree17522104ad66d6bc7359dd374ec5482de4340900 /net/pipsecd/files
parentlang/elixir-devel: update to 1.13.2 (diff)
cleanup: Remove expired ports:
2022-01-15 net/pipsecd: Abandonware, current release is from 1999 and uses insecure encryption algorithms 2022-01-15 devel/maven31: Outdated, unsupported upstream 2022-01-15 devel/wasi-compiler-rt12: this ports exists solely for building Firefox 95+ in 2021Q4
Diffstat (limited to 'net/pipsecd/files')
-rw-r--r--net/pipsecd/files/patch-Makefile31
-rw-r--r--net/pipsecd/files/patch-README.port47
-rw-r--r--net/pipsecd/files/patch-tunip.c209
-rw-r--r--net/pipsecd/files/pipsecd.in27
4 files changed, 0 insertions, 314 deletions
diff --git a/net/pipsecd/files/patch-Makefile b/net/pipsecd/files/patch-Makefile
deleted file mode 100644
index d16d9ddcd1ae..000000000000
--- a/net/pipsecd/files/patch-Makefile
+++ /dev/null
@@ -1,31 +0,0 @@
---- Makefile.orig Thu Sep 16 17:44:50 1999
-+++ Makefile Sun Feb 20 20:41:18 2000
-@@ -6,10 +6,13 @@
- CLEANFILES= *.core *.o pipsecd
-
- # Where your OpenSSL includes are located
--INCDIR=/usr/local/ssl/include
-+INCDIR=-I$(OPENSSLINC)/openssl -I$(OPENSSLINC) -I$(LOCALBASE)/include
-
- # Where your libcrypto is located
--LIBDIR=/usr/local/ssl/lib
-+LIBDIR=-L$(OPENSSLLIB)
-+
-+# Misc defines
-+DEFINES=-DFILE_PREFIX=\"$(PREFIX)\"
-
- # Optional: use FreeBSD's libmd
- #OPTLIB += -lmd
-@@ -19,10 +22,10 @@
- #OPTDEF += -DUSE_ETHERTAP
-
- pipsecd: tunip.c defs.h
-- gcc -Wall -I$(INCDIR) -g $(OPTDEF) -o pipsecd tunip.c -L$(LIBDIR) $(OPTLIB) -lcrypto
-+ $(CC) -Wall $(INCDIR) -g $(CFLAGS) $(OPENSSL_CFLAGS) $(OPTDEF) -o pipsecd tunip.c $(LIBDIR) -lcrypto $(OPTLIB) $(EXTRA_SSL_LIBS) $(DEFINES)
-
- install: pipsecd
-- install pipsecd /usr/local/sbin/
-+ install pipsecd $(PREFIX)/sbin/
-
- tar:
- tar cfvz tunip.tar.gz $(DISTFILES)
diff --git a/net/pipsecd/files/patch-README.port b/net/pipsecd/files/patch-README.port
deleted file mode 100644
index c6c28d940ce9..000000000000
--- a/net/pipsecd/files/patch-README.port
+++ /dev/null
@@ -1,47 +0,0 @@
---- README.port.orig Thu Oct 14 12:17:02 1999
-+++ README.port Thu Oct 14 13:10:50 1999
-@@ -0,0 +1,44 @@
-+This is the ported version of the pipsecd program
-+from Pierre Beyssac at the ENST.
-+
-+The main difference with the original code are:
-+- it compiles with OpenSSL-0.94
-+- config files are in /usr/local/etc/ipsec
-+
-+
-+Apart from that it works exactly as the original work from
-+Pierre Beyssac.
-+
-+You can obtain the source distribution of pipsecd at:
-+http://www.enst.fr/~beyssac/pipsec/
-+or
-+http://www.mindstep.com/pipsec/
-+
-+
-+Version 19991014 (pipsec-19991014.tar.gz):
-+------------------------------------------
-+
-+This version adds the following fetures:
-+- tunnels over UDP and ICMP packets (in authentication mode only).
-+- logging of events to syslog
-+- startup script in /usr/local/etc/rc.d (port only)
-+
-+
-+Version 19990831 (pipsec-19990831.tar.gz):
-+------------------------------------------
-+
-+No new feature.
-+Source distribution mirrored at http://www.mindstep.com/pipsec/
-+
-+
-+Version 19990519:
-+-----------------
-+
-+Initial version for the ports distribution.
-+
-+
-+Enjoy!
-+
-+Patrick Bihan-Faou - MindStep Corporation
-+patrick@mindstep.com - http://www.mindstep.com/
-+
diff --git a/net/pipsecd/files/patch-tunip.c b/net/pipsecd/files/patch-tunip.c
deleted file mode 100644
index 6678bbca7482..000000000000
--- a/net/pipsecd/files/patch-tunip.c
+++ /dev/null
@@ -1,209 +0,0 @@
---- tunip.c.orig 1999-09-21 22:20:40 UTC
-+++ tunip.c
-@@ -35,6 +35,8 @@
- #include <unistd.h>
- #include <fcntl.h>
- #include <stdio.h>
-+#include <sys/ioctl.h>
-+#include <net/if_tun.h>
- #include <netinet/in_systm.h>
- #include <netinet/in.h>
- #include <netinet/ip.h>
-@@ -58,8 +60,8 @@
-
- #include "defs.h"
-
--#define _PATH_CONF "/etc/ipsec/pipsecd.conf"
--#define _PATH_STARTUP "/etc/ipsec/startup"
-+#define _PATH_CONF FILE_PREFIX "/etc/ipsec/pipsecd.conf"
-+#define _PATH_STARTUP FILE_PREFIX "/etc/ipsec/startup"
- #define _PATH_DEV_RANDOM "/dev/random"
-
- #ifdef USE_ETHERTAP
-@@ -100,6 +102,7 @@ struct ethtap_header ethtap;
- #endif
-
- unsigned char buf[MAX_HEADER+MAX_PACKET];
-+char *cmd;
-
- typedef union {
- MD5_CTX md5;
-@@ -124,11 +127,11 @@ typedef struct hash_method {
-
- typedef union {
- BF_KEY bf;
-- des_key_schedule des;
-+ DES_key_schedule des;
- struct {
-- des_key_schedule k1;
-- des_key_schedule k2;
-- des_key_schedule k3;
-+ DES_key_schedule k1;
-+ DES_key_schedule k2;
-+ DES_key_schedule k3;
- } des3;
- CAST_KEY cast;
- IDEA_KEY_SCHEDULE idea;
-@@ -704,13 +707,22 @@ void tun_new(struct tun_method *this,
- */
- int tun_send_ip(struct tun_method *this, struct encap_method *encap, int fd)
- {
-- int sent;
-+ int sent, i;
-
- if (this->link_header_size) {
- encap->buflen += this->link_header_size;
- encap->buf -= this->link_header_size;
- memcpy(encap->buf, this->link_header, this->link_header_size);
- }
-+#if 0
-+ printf ("Packet sent to tun dev:");
-+ for (i = 0; i < encap->buflen; i++) {
-+ if (!(i % 16))
-+ printf ("\n ");
-+ printf (" %02x", encap->buf[i]);
-+ }
-+ printf ("\n\n");
-+#endif
- sent = write(fd, encap->buf, encap->buflen);
- if (sent != encap->buflen)
- syslog(LOG_ERR, "truncated in: %d -> %d\n", encap->buflen, sent);
-@@ -1120,6 +1132,7 @@ void config_read(FILE *cf)
- }
- } else if (strcmp(arg, "if") == 0) {
- int fd;
-+ int i = 0;
- struct sa_desc *local_sa, *remote_sa;
- struct peer_desc *peer;
-
-@@ -1128,6 +1141,7 @@ void config_read(FILE *cf)
- perror(arg);
- continue;
- }
-+ ioctl (fd, TUNSIFHEAD, &i);
-
- local_sa = NULL;
- remote_sa = NULL;
-@@ -2006,7 +2020,7 @@ int my_idea_set_decrypt_key(unsigned cha
- void my_des_cbc_encrypt(unsigned char *iv, crypt_key *ek,
- unsigned char *t, unsigned int len)
- {
-- des_cbc_encrypt(t, t, len, ek->des, iv, DES_ENCRYPT);
-+ DES_cbc_encrypt(t, t, len, &ek->des, iv, DES_ENCRYPT);
- }
-
- void my_des_cbc_decrypt(unsigned char *iv, crypt_key *dk,
-@@ -2018,7 +2032,7 @@ void my_des_cbc_decrypt(unsigned char *i
- for (i = 0; i < len; i++) printf(" %02x", ct[i]);
- printf("\n");
- #endif
-- des_cbc_encrypt(ct, ct, len, dk->des, iv, DES_DECRYPT);
-+ DES_cbc_encrypt(ct, ct, len, &dk->des, iv, DES_DECRYPT);
- #if 0
- printf("%d bytes after decrypt\n", len);
- for (i = 0; i < len; i++) printf(" %02x", ct[i]);
-@@ -2029,23 +2043,23 @@ void my_des_cbc_decrypt(unsigned char *i
- int my_des_setkey(unsigned char *b, unsigned int len, crypt_key *k)
- {
- if (len == 8)
-- return des_set_key(b, k->des);
-+ return DES_set_key(b, &k->des);
- return -1;
- }
-
- void my_des3_cbc_encrypt(unsigned char *iv, crypt_key *ek,
- unsigned char *t, unsigned int len)
- {
-- des_ede3_cbc_encrypt(t, t, len,
-- ek->des3.k1, ek->des3.k2, ek->des3.k3,
-+ DES_ede3_cbc_encrypt(t, t, len,
-+ &ek->des3.k1, &ek->des3.k2, &ek->des3.k3,
- iv, DES_ENCRYPT);
- }
-
- void my_des3_cbc_decrypt(unsigned char *iv, crypt_key *dk,
- unsigned char *ct, unsigned int len)
- {
-- des_ede3_cbc_encrypt(ct, ct, len,
-- dk->des3.k1, dk->des3.k2, dk->des3.k3,
-+ DES_ede3_cbc_encrypt(ct, ct, len,
-+ &dk->des3.k1, &dk->des3.k2, &dk->des3.k3,
- iv, DES_DECRYPT);
- }
-
-@@ -2054,11 +2068,11 @@ int my_des3_setkey(unsigned char *b, uns
- if (len != 24)
- return -1;
-
-- if (des_set_key(b, k->des3.k1) != 0)
-+ if (DES_set_key(b, &k->des3.k1) != 0)
- return -1;
-- if (des_set_key(b+8, k->des3.k2) != 0)
-+ if (DES_set_key(b+8, &k->des3.k2) != 0)
- return -1;
-- if (des_set_key(b+16, k->des3.k3) != 0)
-+ if (DES_set_key(b+16, &k->des3.k3) != 0)
- return -1;
-
- return 0;
-@@ -2081,6 +2095,11 @@ int null_setkey(unsigned char *b, unsign
- return 0;
- }
-
-+void usage()
-+{
-+ fprintf(stderr, "%s: usage: [ -c CONFIG ] [ -s SCRIPT ]\n", cmd);
-+ exit(1);
-+}
- int main(int argc, char **argv)
- {
- time_t t;
-@@ -2088,9 +2107,14 @@ int main(int argc, char **argv)
- int pack, i;
- struct sockaddr_in from;
- struct stat sb;
-+ int ch;
-+ char *path_conf = _PATH_CONF;
-+ char *path_startup = _PATH_STARTUP;
-
- FILE *f;
-
-+ cmd=argv[0];
-+
- openlog ("pipsecd", LOG_PID, LOG_DAEMON);
- syslog (LOG_NOTICE, "pipsecd starting");
-
-@@ -2113,7 +2137,21 @@ int main(int argc, char **argv)
- if (encap_icmp_new(&encap_meth[ENCAP_ICMP], IPPROTO_ICMP) == -1)
- exit(1);
-
-- f = fopen(_PATH_CONF, "r");
-+ while ((ch = getopt(argc, argv, "c:s:")) != -1) {
-+ switch (ch) {
-+ case 'c':
-+ path_conf = optarg;
-+ break;
-+ case 's':
-+ path_startup = optarg;
-+ break;
-+ case '?':
-+ default:
-+ usage();
-+ }
-+ }
-+
-+ f = fopen(path_conf, "r");
- if (f == NULL) {
- perror("configuration file");
- exit(1);
-@@ -2123,8 +2161,8 @@ int main(int argc, char **argv)
- fclose(f);
-
- /* Execute startup script, if any */
-- if (stat(_PATH_STARTUP, &sb) == 0 && (sb.st_mode & 0400))
-- system(_PATH_STARTUP);
-+ if (stat(path_startup, &sb) == 0 && (sb.st_mode & 0400))
-+ system(path_startup);
-
- /* Send a probe to every peer on startup */
- for (i = 0; i < peer_num; i++)
diff --git a/net/pipsecd/files/pipsecd.in b/net/pipsecd/files/pipsecd.in
deleted file mode 100644
index 2821d399bf56..000000000000
--- a/net/pipsecd/files/pipsecd.in
+++ /dev/null
@@ -1,27 +0,0 @@
-#!/bin/sh
-
-# PROVIDE: pipsecd
-# REQUIRE: root mountcritlocal
-# BEFORE: DAEMON
-# KEYWORD: nojail
-
-. /etc/rc.subr
-
-name="pipsecd"
-rcvar=pipsecd_enable
-command="%%PREFIX%%/sbin/${name}"
-command_args="${pipsecd_flags}"
-start_cmd="pipsecd_start"
-
-: ${pipsecd_enable="NO"}
-
-pipsecd_start() {
- if ! checkyesno pipsecd_enable ; then
- return 0
- fi
- echo "Starting ${name}."
- ${command} ${pipsecd_flags} &
-}
-
-load_rc_config $name
-run_rc_command "$1"