From: Christoph Fritz <chf@fritzc.com>
To: ptxdist@pengutronix.de
Subject: [ptxdist] [PATCH 1/2] strongswan: fix configure flags from previous updates
Date: Fri, 18 Sep 2015 19:25:02 +0200 [thread overview]
Message-ID: <1442597102.1817.5.camel@fritzc.com> (raw)
- Add missing configure flags from previous updates:
* bliss 5.2.2
* winhttp 5.2.0
* kernel-iph 5.2.0
* kernel-wfp 5.2.0
* socket-win 5.2.0
* vici 5.2.0
* aikgen ?
* svc ?
* ext-auth ?
* swanctl
* systemd
* dbghelp-backtraces ?
- Reorganize flags to mirror output of ./configure --help
Tested-by: Bruno Thomsen <bth@kamstrup.com>
Signed-off-by: Christoph Fritz <chf@fritzc.com>
---
rules/strongswan.make | 200 ++++++++++++++++++++++++++------------------------
1 file changed, 106 insertions(+), 94 deletions(-)
diff --git a/rules/strongswan.make b/rules/strongswan.make
index 033deeb..fe85295 100644
--- a/rules/strongswan.make
+++ b/rules/strongswan.make
@@ -33,55 +33,55 @@ STRONGSWAN_LICENSE := GPL
STRONGSWAN_CONF_TOOL := autoconf
STRONGSWAN_CONF_OPT := \
$(CROSS_AUTOCONF_USR) \
- --$(call ptx/endis, PTXCONF_STRONGSWAN_LIBCURL)-curl \
- --$(call ptx/endis, PTXCONF_STRONGSWAN_OPENSSL)-openssl \
- --disable-unbound \
- --disable-soup \
- --disable-ldap \
--enable-aes \
- --disable-des \
+ --$(call ptx/endis, PTXCONF_STRONGSWAN_AFALG)-af-alg \
+ --disable-bliss \
--disable-blowfish \
+ --disable-ccm \
+ --enable-cmac \
+ --disable-ctr \
+ --disable-des \
+ --enable-fips-prf \
+ --enable-gcm \
+ --disable-gcrypt \
+ --enable-gmp \
+ --enable-hmac \
--disable-md4 \
--disable-md5 \
+ --enable-nonce \
+ --disable-ntru \
+ --$(call ptx/endis, PTXCONF_STRONGSWAN_OPENSSL)-openssl \
+ --disable-padlock \
+ --enable-random \
+ --disable-rc2 \
+ --disable-rdrand \
--disable-aesni \
--enable-sha1 \
--enable-sha2 \
- --enable-fips-prf \
- --enable-gmp \
- --disable-rdrand \
- --enable-random \
- --disable-rc2 \
- --enable-nonce \
- --disable-ntru \
- --enable-x509 \
- --enable-revocation \
- --enable-constraints \
- --enable-pubkey \
- --disable-sshkey \
+ --enable-xcbc \
+ --enable-dnskey \
+ --enable-pem \
+ --enable-pgp \
--enable-pkcs1 \
--enable-pkcs7 \
--enable-pkcs8 \
--disable-pkcs12 \
- --enable-pgp \
- --enable-dnskey \
- --disable-ipseckey \
- --disable-keychain \
- --enable-pem \
- --enable-hmac \
- --enable-cmac \
- --enable-xcbc \
- --$(call ptx/endis, PTXCONF_STRONGSWAN_AFALG)-af-alg \
- --disable-test-vectors \
+ --enable-pubkey \
+ --disable-sshkey \
+ --enable-x509 \
+ --$(call ptx/endis, PTXCONF_STRONGSWAN_LIBCURL)-curl \
+ --disable-files \
+ --disable-ldap \
+ --disable-soup \
+ --disable-unbound \
+ --disable-winhttp \
--disable-mysql \
--disable-sqlite \
- --enable-stroke \
- --disable-medsrv \
- --disable-medcli \
- --disable-smp \
- --disable-sql \
- --disable-leak-detective \
- --disable-lock-profiler \
- --disable-load-tester \
+ --disable-addrblock \
+ --enable-acert \
+ --disable-agent \
+ --enable-constraints \
+ --disable-coupling \
--disable-dnscert \
--disable-eap-sim \
--disable-eap-sim-file \
@@ -101,92 +101,104 @@ STRONGSWAN_CONF_OPT := \
--disable-eap-tnc \
--disable-eap-dynamic \
--disable-eap-radius \
+ --disable-ext-auth \
+ --disable-ipseckey \
+ --disable-keychain \
+ --disable-pkcs11 \
+ --enable-revocation \
+ --disable-whitelist \
--enable-xauth-generic \
--disable-xauth-eap \
--disable-xauth-pam \
--disable-xauth-noauth \
- --disable-tnc-ifmap \
- --disable-tnc-pdp \
- --disable-tnc-imc \
- --disable-tnc-imv \
- --disable-tnccs-11 \
- --disable-tnccs-20 \
- --disable-tnccs-dynamic \
- --disable-imc-test \
- --disable-imv-test \
- --disable-imc-scanner \
- --disable-imv-scanner \
- --disable-imc-os \
- --disable-imv-os \
- --disable-imc-attestation \
- --disable-imv-attestation \
- --disable-imc-swid \
- --disable-imv-swid \
--enable-kernel-netlink \
--disable-kernel-pfkey \
--disable-kernel-pfroute \
+ --disable-kernel-iph \
--disable-kernel-libipsec \
- --disable-libipsec \
+ --disable-kernel-wfp \
--enable-socket-default \
--disable-socket-dynamic \
- --disable-farp \
- --disable-dumm \
- --disable-fast \
- --disable-manager \
- --disable-mediation \
- --disable-integrity-test \
- --enable-load-warning \
- --enable-ikev1 \
- --enable-ikev2 \
- --enable-charon \
- --disable-cmd \
- --enable-pki \
- --enable-scepclient \
- --enable-scripts \
- --disable-conftest \
- --enable-updown \
+ --disable-socket-win \
+ --enable-stroke \
+ --disable-smp \
+ --disable-sql \
+ --disable-uci \
+ --disable-vici \
+ --disable-android-dns \
--enable-attr \
--disable-attr-sql \
--disable-dhcp \
--disable-osx-attr \
--enable-resolve \
- --disable-padlock \
- --disable-gcrypt \
- --disable-agent \
- --disable-pkcs11 \
- --disable-ctr \
- --disable-ccm \
- --enable-gcm \
- --disable-addrblock \
- --enable-acert \
--disable-unity \
- --disable-uci \
- --disable-android-dns \
+ --disable-imc-test \
+ --disable-imv-test \
+ --disable-imc-scanner \
+ --disable-imv-scanner \
+ --disable-imc-os \
+ --disable-imv-os \
+ --disable-imc-attestation \
+ --disable-imv-attestation \
+ --disable-imc-swid \
+ --disable-imv-swid \
+ --disable-tnc-ifmap \
+ --disable-tnc-imc \
+ --disable-tnc-imv \
+ --disable-tnc-pdp \
+ --disable-tnccs-11 \
+ --disable-tnccs-20 \
+ --disable-tnccs-dynamic \
--disable-android-log \
- --disable-maemo \
- --disable-nm \
- --disable-ha \
- --disable-whitelist \
- --disable-lookip \
- --disable-error-notify \
--disable-certexpire \
--disable-connmark \
--disable-forecast \
- --disable-systime-fix \
- --disable-led \
--disable-duplicheck \
- --disable-coupling \
+ --disable-error-notify \
+ --disable-farp \
+ --disable-ha \
+ --disable-led \
+ --disable-load-tester \
+ --disable-lookip \
+ --disable-maemo \
--disable-radattr \
- --disable-monolithic \
+ --disable-systime-fix \
+ --disable-test-vectors \
+ --enable-updown \
+ --disable-aikgen \
+ --enable-charon \
+ --disable-cmd \
+ --disable-conftest \
+ --disable-dumm \
+ --disable-fast \
+ --disable-libipsec \
+ --disable-manager \
+ --disable-medcli \
+ --disable-medsrv \
+ --disable-nm \
+ --enable-pki \
+ --enable-scepclient \
+ --enable-scripts \
+ --disable-svc \
+ --$(call ptx/endis, PTXCONF_STRONGSWAN_SYSTEMD_UNIT)-systemd \
+ --disable-swanctl \
+ --disable-tkm \
--disable-bfd-backtraces \
+ --disable-dbghelp-backtraces \
+ --enable-ikev1 \
+ --enable-ikev2 \
+ --disable-integrity-test \
+ --enable-load-warning \
+ --disable-mediation \
--disable-unwind-backtraces \
--disable-ruby-gems \
--disable-ruby-gems-install \
--disable-python-eggs \
--disable-python-eggs-install \
- --disable-files \
--disable-coverage \
- --disable-tkm \
+ --disable-leak-detective \
+ --disable-lock-profiler \
+ --disable-monolithic \
--disable-defaults \
--enable-dependency-tracking \
--enable-shared \
@@ -246,7 +258,7 @@ $(STATEDIR)/strongswan.targetinstall:
@$(call install_init, strongswan)
@$(call install_fixup, strongswan,PRIORITY,optional)
@$(call install_fixup, strongswan,SECTION,base)
- @$(call install_fixup, strongswan,AUTHOR,"Christoph Fritz <chf.fritz@googlemail.com>")
+ @$(call install_fixup, strongswan,AUTHOR,"Christoph Fritz <chf@fritzc.com>")
@$(call install_fixup, strongswan,DESCRIPTION,missing)
@$(call install_alternative, strongswan, 0, 0, 0644, /etc/strongswan.conf)
--
2.1.4
--
ptxdist mailing list
ptxdist@pengutronix.de
next reply other threads:[~2015-09-18 17:25 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-09-18 17:25 Christoph Fritz [this message]
2018-05-28 8:08 ` Christoph Fritz
2018-05-28 16:03 ` Roland Hieber
2018-05-29 8:58 ` Christoph Fritz
2018-05-29 13:11 ` Bruno Thomsen
2018-05-29 5:42 ` Michael Olbrich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1442597102.1817.5.camel@fritzc.com \
--to=chf@fritzc.com \
--cc=ptxdist@pengutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox