strongswan: enable options that are required for MSCHAPv2.

According to the documentation [1], StrongSwan needs --enable-md4 for
eap-mschapv2 to work. Moreover, many EAP-MSCHAPv2 based VPNs require
--enable-eap-identity and --enable-eap-dynamic to correctly work. This
commit simply adds these flags in the StrongSwan `template` file.

https://wiki.strongswan.org/projects/strongswan/wiki/AutoConf
This commit is contained in:
Domagoj Stolfa 2021-05-03 15:10:25 +01:00 committed by Érico Nogueira Rolim
parent e8c505f89e
commit 81a158d905

View File

@ -1,12 +1,12 @@
# Template file for 'strongswan'
pkgname=strongswan
version=5.8.4
revision=1
revision=2
build_style=gnu-configure
# tpm support waits on libtss2
configure_args="--disable-static --enable-blowfish --enable-curl
--enable-eap-radius --enable-eap-mschapv2 --enable-eap-md5 --enable-led
--enable-ha --enable-dhcp --enable-mediation --enable-soup --disable-des
configure_args="--disable-static --enable-blowfish --enable-curl --enable-md4
--enable-eap-radius --enable-eap-mschapv2 --enable-eap-md5 --enable-eap-identity --enable-eap-dynamic
--enable-led --enable-ha --enable-dhcp --enable-mediation --enable-soup --disable-des
--enable-chapoly --enable-nm"
hostmakedepends="pkg-config flex bison python"
makedepends="gmp-devel libsoup-devel libldns-devel unbound-devel libcurl-devel NetworkManager-devel"