diff options
author | Jean-Yves Lefort <jylefort@FreeBSD.org> | 2005-05-23 22:21:25 +0000 |
---|---|---|
committer | Jean-Yves Lefort <jylefort@FreeBSD.org> | 2005-05-23 22:21:25 +0000 |
commit | 9e01a15a9e7a21c24d7218d9348be55257b501cd (patch) | |
tree | bc94d035785acb4bf8d5af10a8b5a9ded60b9b52 /security/openscep/files | |
parent | bf9a2be8e16be3ec91828db9152a641cdaf5f54d (diff) | |
download | ports-9e01a15a9e7a21c24d7218d9348be55257b501cd.tar.gz ports-9e01a15a9e7a21c24d7218d9348be55257b501cd.zip |
Notes
Diffstat (limited to 'security/openscep/files')
-rw-r--r-- | security/openscep/files/patch-include_openscep_err.h | 36 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_Makefile.in | 37 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_decode.c | 10 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_http.c | 10 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_init.c | 22 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_isasu.c | 28 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_openscep__err.c | 139 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_payload.c | 28 | ||||
-rw-r--r-- | security/openscep/files/patch-lib_sigattr.c | 35 | ||||
-rw-r--r-- | security/openscep/files/patch-scepd_Makefile.in | 11 | ||||
-rw-r--r-- | security/openscep/files/patch-scepd_dn2xid.c | 10 | ||||
-rw-r--r-- | security/openscep/files/patch-scepd_sceplist.c | 32 | ||||
-rw-r--r-- | security/openscep/files/pkg-deinstall.in | 9 | ||||
-rw-r--r-- | security/openscep/files/pkg-install.in | 7 | ||||
-rw-r--r-- | security/openscep/files/pkg-message.in | 14 |
15 files changed, 428 insertions, 0 deletions
diff --git a/security/openscep/files/patch-include_openscep_err.h b/security/openscep/files/patch-include_openscep_err.h new file mode 100644 index 000000000000..6b003582d0f0 --- /dev/null +++ b/security/openscep/files/patch-include_openscep_err.h @@ -0,0 +1,36 @@ +--- include/openscep_err.h.orig Thu May 19 16:26:46 2005 ++++ include/openscep_err.h Thu May 19 16:26:46 2005 +@@ -0,0 +1,33 @@ ++#ifndef HEADER_OPENSCEP_ERR_H ++#define HEADER_OPENSCEP_ERR_H ++ ++#if OPENSSL_VERSION_NUMBER < 0x00907000L ++/* ERR_unload_strings was added in 0.9.7. with older versions, it's ++ redefined as a no-op here so the auto-generated code in ++ openscep_err.c doesn't need to be changed. */ ++#define ERR_unload_strings(A,B) do{}while(0) ++#endif ++ ++/* BEGIN ERROR CODES */ ++/* The following lines are auto generated by the script mkerr.pl. Any changes ++ * made after this point may be overwritten when the script is next run. ++ */ ++void ERR_load_OPENSCEP_strings(void); ++void ERR_unload_OPENSCEP_strings(void); ++void ERR_OPENSCEP_error(int function, int reason, char *file, int line); ++#define OPENSCEPerr(f,r) ERR_OPENSCEP_error((f),(r),__FILE__,__LINE__) ++ ++/* Error codes for the OPENSCEP functions. */ ++ ++/* Function codes. */ ++#define OPENSCEP_F_D2I_ISSUER_AND_SUBJECT 100 ++#define OPENSCEP_F_D2I_PAYLOAD 101 ++#define OPENSCEP_F_ISSUER_AND_SUBJECT_NEW 102 ++#define OPENSCEP_F_PAYLOAD_NEW 103 ++ ++/* Reason codes. */ ++ ++#ifdef __cplusplus ++} ++#endif ++#endif diff --git a/security/openscep/files/patch-lib_Makefile.in b/security/openscep/files/patch-lib_Makefile.in new file mode 100644 index 000000000000..e65904cf12a2 --- /dev/null +++ b/security/openscep/files/patch-lib_Makefile.in @@ -0,0 +1,37 @@ +--- lib/Makefile.in.orig Tue Feb 26 02:11:39 2002 ++++ lib/Makefile.in Thu May 19 16:35:38 2005 +@@ -115,14 +115,13 @@ + + LDADD = libscep.la + LDFLAGS = -R$(libdir) $(LIBS) +-CPPFLAGS = -DOPENSCEPDIR=\"$(OPENSCEPDIR)\" ++CPPFLAGS += -DOPENSCEPDIR=\"$(OPENSCEPDIR)\" + + VERSION_FILE = openscep_vers.c + + libscep_la_LDFLAGS = -version-info `../shtool version -d libtool $(VERSION_FILE)` + +-libscep_la_SOURCES = init.c isasu.c decode.c sigattr.c pkcsreq.c certrep.c getcertinitial.c getcert.c getcrl.c badreply.c attr.c goodreply.c encode.c check.c grant.c scepldap.c fingerprint.c openscep_vers.c selfsigned.c createreq.c http.c iser.c proxy.c payload.c v2request.c transcheck.c pending.c spki2file.c +- ++libscep_la_SOURCES = init.c isasu.c decode.c sigattr.c pkcsreq.c certrep.c getcertinitial.c getcert.c getcrl.c badreply.c attr.c goodreply.c encode.c check.c grant.c scepldap.c fingerprint.c openscep_vers.c selfsigned.c createreq.c http.c iser.c proxy.c payload.c v2request.c transcheck.c pending.c spki2file.c openscep_err.c + + INCLUDES = $(INCLTDL) -I$(top_srcdir)/include -I$(OPENSSLDIR)/include + mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs +@@ -138,7 +137,8 @@ + certrep.lo getcertinitial.lo getcert.lo getcrl.lo badreply.lo attr.lo \ + goodreply.lo encode.lo check.lo grant.lo scepldap.lo fingerprint.lo \ + openscep_vers.lo selfsigned.lo createreq.lo http.lo iser.lo proxy.lo \ +-payload.lo v2request.lo transcheck.lo pending.lo spki2file.lo ++payload.lo v2request.lo transcheck.lo pending.lo spki2file.lo \ ++openscep_err.lo + CFLAGS = @CFLAGS@ + COMPILE = $(CC) $(DEFS) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) + LTCOMPILE = $(LIBTOOL) --mode=compile $(CC) $(DEFS) $(INCLUDES) $(AM_CPPFLAGS) $(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS) +@@ -364,6 +364,7 @@ + ../include/scep.h ../include/isasu.h ../include/payload.h \ + ../include/transcheck.h ../include/pending.h \ + ../include/goodreply.h ../include/badreply.h ../include/init.h ++openscep_err.lo openscep_err.o : openscep_err.c ../include/openscep_err.h + + info-am: + info: info-am diff --git a/security/openscep/files/patch-lib_decode.c b/security/openscep/files/patch-lib_decode.c new file mode 100644 index 000000000000..e06c58fed984 --- /dev/null +++ b/security/openscep/files/patch-lib_decode.c @@ -0,0 +1,10 @@ +--- lib/decode.c.orig Tue Feb 26 02:01:06 2002 ++++ lib/decode.c Thu May 19 16:23:01 2005 +@@ -58,6 +58,7 @@ + __LINE__, (scep->client) ? "reply" : "request"); + + /* convert from base64 to internal representation */ ++ BIO_set_mem_eof_return(bio, 0); + if (msg->base64) { + if (debug) + BIO_printf(bio_err, "%s:%d: prepending Base64 " diff --git a/security/openscep/files/patch-lib_http.c b/security/openscep/files/patch-lib_http.c new file mode 100644 index 000000000000..57cd8f999c36 --- /dev/null +++ b/security/openscep/files/patch-lib_http.c @@ -0,0 +1,10 @@ +--- lib/http.c.orig Thu May 19 16:37:26 2005 ++++ lib/http.c Thu May 19 16:38:42 2005 +@@ -19,6 +19,7 @@ + #include <string.h> + #include <openssl/err.h> + #include <arpa/inet.h> ++#include <netinet/in.h> + + /* + * parse the url given in the second argument and fill in the h member diff --git a/security/openscep/files/patch-lib_init.c b/security/openscep/files/patch-lib_init.c new file mode 100644 index 000000000000..75bdd1330f11 --- /dev/null +++ b/security/openscep/files/patch-lib_init.c @@ -0,0 +1,22 @@ +--- lib/init.c.orig Wed Feb 20 02:40:06 2002 ++++ lib/init.c Thu May 19 16:23:01 2005 +@@ -21,6 +21,7 @@ + #include <sys/types.h> + #include <sys/stat.h> + #include <unistd.h> ++#include <openscep_err.h> + + #define TMPPATH "/var/tmp/openscep" + +@@ -66,6 +67,11 @@ + ERR_load_crypto_strings(); + if (debug) + fprintf(stderr, "%s:%d: crypto strings loaded\n", __FILE__, ++ __LINE__); ++ ++ ERR_load_OPENSCEP_strings(); ++ if (debug) ++ fprintf(stderr, "%s:%d: openscep strings loaded\n", __FILE__, + __LINE__); + + /* add the encryption algorithms available */ diff --git a/security/openscep/files/patch-lib_isasu.c b/security/openscep/files/patch-lib_isasu.c new file mode 100644 index 000000000000..07f62ca1ed5d --- /dev/null +++ b/security/openscep/files/patch-lib_isasu.c @@ -0,0 +1,28 @@ +--- lib/isasu.c.orig Wed Feb 20 02:40:06 2002 ++++ lib/isasu.c Thu May 19 16:23:01 2005 +@@ -12,6 +12,7 @@ + #include <init.h> + #include <unistd.h> + #include <fcntl.h> ++#include <openscep_err.h> + + /* + * the methods in this file are based on the similar functions for the +@@ -40,7 +41,7 @@ + M_ASN1_D2I_get(ret->issuer, d2i_X509_NAME); + M_ASN1_D2I_get(ret->subject, d2i_X509_NAME); + M_ASN1_D2I_Finish(a,issuer_and_subject_free, +- ASN1_F_D2I_PKCS7_ISSUER_AND_SERIAL); ++ OPENSCEP_F_D2I_ISSUER_AND_SUBJECT); + } + + issuer_and_subject_t *issuer_and_subject_new(void) { +@@ -50,7 +51,7 @@ + M_ASN1_New(ret->issuer, X509_NAME_new); + M_ASN1_New(ret->subject, X509_NAME_new); + return ret; +- M_ASN1_New_Error(ASN1_F_PKCS7_ISSUER_AND_SERIAL_NEW); /* wrong error code */ ++ M_ASN1_New_Error(OPENSCEP_F_ISSUER_AND_SUBJECT_NEW); + } + + void issuer_and_subject_free(issuer_and_subject_t *isasu) { diff --git a/security/openscep/files/patch-lib_openscep__err.c b/security/openscep/files/patch-lib_openscep__err.c new file mode 100644 index 000000000000..a0ea6b031416 --- /dev/null +++ b/security/openscep/files/patch-lib_openscep__err.c @@ -0,0 +1,139 @@ +--- lib/openscep_err.c.orig Thu May 19 16:26:46 2005 ++++ lib/openscep_err.c Thu May 19 16:26:46 2005 +@@ -0,0 +1,136 @@ ++/* openscep_err.c */ ++/* ==================================================================== ++ * Copyright (c) 1999-2003 The OpenSSL Project. All rights reserved. ++ * ++ * Redistribution and use in source and binary forms, with or without ++ * modification, are permitted provided that the following conditions ++ * are met: ++ * ++ * 1. Redistributions of source code must retain the above copyright ++ * notice, this list of conditions and the following disclaimer. ++ * ++ * 2. Redistributions in binary form must reproduce the above copyright ++ * notice, this list of conditions and the following disclaimer in ++ * the documentation and/or other materials provided with the ++ * distribution. ++ * ++ * 3. All advertising materials mentioning features or use of this ++ * software must display the following acknowledgment: ++ * "This product includes software developed by the OpenSSL Project ++ * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" ++ * ++ * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to ++ * endorse or promote products derived from this software without ++ * prior written permission. For written permission, please contact ++ * openssl-core@OpenSSL.org. ++ * ++ * 5. Products derived from this software may not be called "OpenSSL" ++ * nor may "OpenSSL" appear in their names without prior written ++ * permission of the OpenSSL Project. ++ * ++ * 6. Redistributions of any form whatsoever must retain the following ++ * acknowledgment: ++ * "This product includes software developed by the OpenSSL Project ++ * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" ++ * ++ * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY ++ * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ++ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR ++ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ++ * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, ++ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT ++ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; ++ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) ++ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, ++ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ++ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED ++ * OF THE POSSIBILITY OF SUCH DAMAGE. ++ * ==================================================================== ++ * ++ * This product includes cryptographic software written by Eric Young ++ * (eay@cryptsoft.com). This product includes software written by Tim ++ * Hudson (tjh@cryptsoft.com). ++ * ++ */ ++ ++/* NOTE: this file was auto generated by the mkerr.pl script: any changes ++ * made to it will be overwritten when the script next updates this file, ++ * only reason strings will be preserved. ++ */ ++ ++#include <stdio.h> ++#include <openssl/err.h> ++#include "openscep_err.h" ++ ++/* BEGIN ERROR CODES */ ++#ifndef OPENSSL_NO_ERR ++static ERR_STRING_DATA OPENSCEP_str_functs[]= ++ { ++{ERR_PACK(0,OPENSCEP_F_D2I_ISSUER_AND_SUBJECT,0), "D2I_ISSUER_AND_SUBJECT"}, ++{ERR_PACK(0,OPENSCEP_F_D2I_PAYLOAD,0), "D2I_PAYLOAD"}, ++{ERR_PACK(0,OPENSCEP_F_ISSUER_AND_SUBJECT_NEW,0), "ISSUER_AND_SUBJECT_NEW"}, ++{ERR_PACK(0,OPENSCEP_F_PAYLOAD_NEW,0), "PAYLOAD_NEW"}, ++{0,NULL} ++ }; ++ ++static ERR_STRING_DATA OPENSCEP_str_reasons[]= ++ { ++{0,NULL} ++ }; ++ ++#endif ++ ++#ifdef OPENSCEP_LIB_NAME ++static ERR_STRING_DATA OPENSCEP_lib_name[]= ++ { ++{0 ,OPENSCEP_LIB_NAME}, ++{0,NULL} ++ }; ++#endif ++ ++ ++static int OPENSCEP_lib_error_code=0; ++static int OPENSCEP_error_init=1; ++ ++void ERR_load_OPENSCEP_strings(void) ++ { ++ if (OPENSCEP_lib_error_code == 0) ++ OPENSCEP_lib_error_code=ERR_get_next_error_library(); ++ ++ if (OPENSCEP_error_init) ++ { ++ OPENSCEP_error_init=0; ++#ifndef OPENSSL_NO_ERR ++ ERR_load_strings(OPENSCEP_lib_error_code,OPENSCEP_str_functs); ++ ERR_load_strings(OPENSCEP_lib_error_code,OPENSCEP_str_reasons); ++#endif ++ ++#ifdef OPENSCEP_LIB_NAME ++ OPENSCEP_lib_name->error = ERR_PACK(OPENSCEP_lib_error_code,0,0); ++ ERR_load_strings(0,OPENSCEP_lib_name); ++#endif ++ } ++ } ++ ++void ERR_unload_OPENSCEP_strings(void) ++ { ++ if (OPENSCEP_error_init == 0) ++ { ++#ifndef OPENSSL_NO_ERR ++ ERR_unload_strings(OPENSCEP_lib_error_code,OPENSCEP_str_functs); ++ ERR_unload_strings(OPENSCEP_lib_error_code,OPENSCEP_str_reasons); ++#endif ++ ++#ifdef OPENSCEP_LIB_NAME ++ ERR_unload_strings(0,OPENSCEP_lib_name); ++#endif ++ OPENSCEP_error_init=1; ++ } ++ } ++ ++void ERR_OPENSCEP_error(int function, int reason, char *file, int line) ++ { ++ if (OPENSCEP_lib_error_code == 0) ++ OPENSCEP_lib_error_code=ERR_get_next_error_library(); ++ ERR_PUT_error(OPENSCEP_lib_error_code,function,reason,file,line); ++ } diff --git a/security/openscep/files/patch-lib_payload.c b/security/openscep/files/patch-lib_payload.c new file mode 100644 index 000000000000..fe73e22a1dc5 --- /dev/null +++ b/security/openscep/files/patch-lib_payload.c @@ -0,0 +1,28 @@ +--- lib/payload.c.orig Mon Feb 25 00:40:01 2002 ++++ lib/payload.c Thu May 19 16:26:46 2005 +@@ -16,6 +16,7 @@ + #include <missl.h> + #include <scepldap.h> + #include <fcntl.h> ++#include <openscep_err.h> + + /* + * payload_build_original convert the original request into a bit string +@@ -68,7 +69,7 @@ + p->rt = -1; + p->od.req = NULL; + return p; +- M_ASN1_New_Error(ASN1_F_X509_REQ_INFO_NEW); /* wrong error code */ ++ M_ASN1_New_Error(OPENSCEP_F_PAYLOAD_NEW); + } + + void payload_free(payload_t *a) { +@@ -171,7 +172,7 @@ + ret->od.spki = d2i_NETSCAPE_SPKI(&r2, &u, l); + break; + } +- M_ASN1_D2I_Finish(a, payload_free, ASN1_F_D2I_X509_REQ_INFO); ++ M_ASN1_D2I_Finish(a, payload_free, OPENSCEP_F_D2I_PAYLOAD); + } + + /* diff --git a/security/openscep/files/patch-lib_sigattr.c b/security/openscep/files/patch-lib_sigattr.c new file mode 100644 index 000000000000..f90f9afc4600 --- /dev/null +++ b/security/openscep/files/patch-lib_sigattr.c @@ -0,0 +1,35 @@ +--- lib/sigattr.c.orig Wed Feb 20 02:40:06 2002 ++++ lib/sigattr.c Thu May 19 16:26:46 2005 +@@ -8,6 +8,7 @@ + #include <sigattr.h> + #include <init.h> + #include <openssl/err.h> ++#include <openssl/opensslv.h> + + /* + * read an attribute of type string +@@ -120,6 +121,7 @@ + X509_ATTRIBUTE *attr; + int i; + scepmsg_t *msg; ++ int single; + + if (debug) + BIO_printf(bio_err, "%s:%d: looking for attribute '%s'\n", +@@ -146,8 +148,14 @@ + for (i = 0; i < sk_X509_ATTRIBUTE_num(sig_attribs); i++) { + attr = sk_X509_ATTRIBUTE_value(sig_attribs, i); + if (OBJ_cmp(attr->object, asn1_obj) == 0) { +- if ((!attr->set) || (sk_ASN1_TYPE_num(attr->value.set) +- == 0)) { ++#if OPENSSL_VERSION_NUMBER < 0x00907000L ++ /* attr->set was replaced with attr->single (with opposite ++ meaning) somewhere between 0.9.6m-engine and 0.9.7d */ ++ single = !attr->set; ++#else ++ single = attr->single; ++#endif ++ if (single || (sk_ASN1_TYPE_num(attr->value.set) == 0)) { + BIO_printf(bio_err, "%s:%d: attr has no val\n", + __FILE__, __LINE__); + goto err; diff --git a/security/openscep/files/patch-scepd_Makefile.in b/security/openscep/files/patch-scepd_Makefile.in new file mode 100644 index 000000000000..975147e37e41 --- /dev/null +++ b/security/openscep/files/patch-scepd_Makefile.in @@ -0,0 +1,11 @@ +--- scepd/Makefile.in.orig Thu May 19 16:41:14 2005 ++++ scepd/Makefile.in Thu May 19 16:41:26 2005 +@@ -132,7 +132,7 @@ + LDADD = ../lib/libscep.la + LDFLAGS = -R$(libdir) + +-CPPFLAGS = -DOPENSCEPDIR=\"$(OPENSCEPDIR)\" ++CPPFLAGS += -DOPENSCEPDIR=\"$(OPENSCEPDIR)\" + + INCLUDES = $(INCLTDL) -I$(top_srcdir)/include -I$(OPENSSLDIR)/include + mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs diff --git a/security/openscep/files/patch-scepd_dn2xid.c b/security/openscep/files/patch-scepd_dn2xid.c new file mode 100644 index 000000000000..13b79fec6b1c --- /dev/null +++ b/security/openscep/files/patch-scepd_dn2xid.c @@ -0,0 +1,10 @@ +--- scepd/dn2xid.c.orig Mon Mar 26 14:36:47 2001 ++++ scepd/dn2xid.c Thu May 19 16:26:46 2005 +@@ -11,6 +11,7 @@ + #include <ldap.h> + #include <unistd.h> + #include <openssl/bio.h> ++#include <openssl/evp.h> + #include <openssl/x509.h> + #include <openssl/err.h> + #include <fingerprint.h> diff --git a/security/openscep/files/patch-scepd_sceplist.c b/security/openscep/files/patch-scepd_sceplist.c new file mode 100644 index 000000000000..6fff4ae7bd07 --- /dev/null +++ b/security/openscep/files/patch-scepd_sceplist.c @@ -0,0 +1,32 @@ +--- scepd/sceplist.c.orig Thu May 19 16:59:02 2005 ++++ scepd/sceplist.c Thu May 19 17:02:22 2005 +@@ -96,7 +96,6 @@ + /* + * convert ASN1 time string to a struct tm + */ +-extern time_t timezone; /* compiler does not like it inside func */ + #ifdef HAVE_ALTZONE + extern time_t altzone; + #endif /* HAVE_ALTZONE */ +@@ -124,19 +123,15 @@ + rtm.tm_year = atoi(work); + if (rtm.tm_year < 70) + rtm.tm_year += 100; ++ rtm.tm_zone = 0; + +- /* set the time zone to GMT, as mktime uses the local time zone */ +- timezone = 0; + #ifdef HAVE_ALTZONE + altzone = 0; + #endif /* HAVE_ALTZONE */ + + /* use mktime to normalize the structure and t convert to a */ + /* time_t value */ +- rt = mktime(&rtm); +- +- /* reset the time zone to local settings */ +- tzset(); ++ rt = timegm(&rtm); + + return rt; + } diff --git a/security/openscep/files/pkg-deinstall.in b/security/openscep/files/pkg-deinstall.in new file mode 100644 index 000000000000..19c51b8a3ad8 --- /dev/null +++ b/security/openscep/files/pkg-deinstall.in @@ -0,0 +1,9 @@ +#!/bin/sh + +[ "$2" != "DEINSTALL" ] && exit 0 + +for f in %%CONF_FILES%%; do + if cmp -s "%%CONF_DIR%%/$f" "%%CONF_DIR%%/$f.default"; then + rm -f "%%CONF_DIR%%/$f" + fi +done diff --git a/security/openscep/files/pkg-install.in b/security/openscep/files/pkg-install.in new file mode 100644 index 000000000000..585a18d73eba --- /dev/null +++ b/security/openscep/files/pkg-install.in @@ -0,0 +1,7 @@ +#!/bin/sh + +[ "$2" != "POST-INSTALL" ] && exit 0 + +for f in %%CONF_FILES%%; do + [ -f "%%CONF_DIR%%/$f" ] || cp -p "%%CONF_DIR%%/$f.default" "%%CONF_DIR%%/$f" +done diff --git a/security/openscep/files/pkg-message.in b/security/openscep/files/pkg-message.in new file mode 100644 index 000000000000..83a5e542d1c6 --- /dev/null +++ b/security/openscep/files/pkg-message.in @@ -0,0 +1,14 @@ +====================================================================== +You now need to add an alias to apache's httpd.conf pointing to +%%PREFIX%%/www/openscep in order to access openscep from +your web browser, or create a VirtualHost with DocumentRoot set +to that directory. + +You should also include %%PREFIX%%/etc/openscep/openscep.schema +into your slapd config (sample of this is at +%%PREFIX%%/etc/openscep/slapd.conf). + +Furthermore, you should add your ldap directory information from +%%PREFIX%%/etc/openscep/openscep.ldif and edit DN specific information +there before doing ldapadd. +====================================================================== |