diff options
author | Arfrever Frehtes Taifersar Arahesis <arfrever@gentoo.org> | 2009-05-02 18:30:04 +0000 |
---|---|---|
committer | Arfrever Frehtes Taifersar Arahesis <arfrever@gentoo.org> | 2009-05-02 18:30:04 +0000 |
commit | 47206ae3bff7559d2b0dfb91d7cd3d8179e16809 (patch) | |
tree | 052a8d576e381c10954f5669a4a367131fa6fb0e /sys-fs/ecryptfs-utils | |
parent | new developer branch (diff) | |
download | historical-47206ae3bff7559d2b0dfb91d7cd3d8179e16809.tar.gz historical-47206ae3bff7559d2b0dfb91d7cd3d8179e16809.tar.bz2 historical-47206ae3bff7559d2b0dfb91d7cd3d8179e16809.zip |
Version bump.
Package-Manager: portage-13595-svn/cvs/Linux x86_64
Diffstat (limited to 'sys-fs/ecryptfs-utils')
-rw-r--r-- | sys-fs/ecryptfs-utils/ChangeLog | 8 | ||||
-rw-r--r-- | sys-fs/ecryptfs-utils/Manifest | 5 | ||||
-rw-r--r-- | sys-fs/ecryptfs-utils/ecryptfs-utils-75.ebuild | 67 | ||||
-rw-r--r-- | sys-fs/ecryptfs-utils/files/ecryptfs-utils-75-fix_warnings.patch | 110 |
4 files changed, 188 insertions, 2 deletions
diff --git a/sys-fs/ecryptfs-utils/ChangeLog b/sys-fs/ecryptfs-utils/ChangeLog index ffac5d68ee1e..fd82b06e1220 100644 --- a/sys-fs/ecryptfs-utils/ChangeLog +++ b/sys-fs/ecryptfs-utils/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for sys-fs/ecryptfs-utils # Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-fs/ecryptfs-utils/ChangeLog,v 1.23 2009/03/29 17:08:28 arfrever Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-fs/ecryptfs-utils/ChangeLog,v 1.24 2009/05/02 18:30:04 arfrever Exp $ + +*ecryptfs-utils-75 (02 May 2009) + + 02 May 2009; Arfrever Frehtes Taifersar Arahesis <arfrever@gentoo.org> + +ecryptfs-utils-75.ebuild, +files/ecryptfs-utils-75-fix_warnings.patch: + Version bump. *ecryptfs-utils-73 (29 Mar 2009) diff --git a/sys-fs/ecryptfs-utils/Manifest b/sys-fs/ecryptfs-utils/Manifest index 29564837d24d..51253c60fe33 100644 --- a/sys-fs/ecryptfs-utils/Manifest +++ b/sys-fs/ecryptfs-utils/Manifest @@ -1,9 +1,12 @@ AUX ecryptfs-utils-73-fix_implicit_declarations.patch 965 RMD160 630c1a837f02928feb2c76d223b77eb63b8bbea6 SHA1 c0f3c98b8a93d771f8ec4e6a233e0e249c779367 SHA256 f59f35bea41d2b6573eaa82bd5cad9c9febb49b21da1d80e77b98ccf037250f6 +AUX ecryptfs-utils-75-fix_warnings.patch 2514 RMD160 b17faba44c01afdfd66ef26cf567b41d902dd274 SHA1 80e936e26c6d63807c704c43f03b65379a55e2ec SHA256 c1e2f0dec38165111670f0cada53a8e2371cd7f48f3b36403e3a1f21b668a4a2 DIST ecryptfs-utils-40.tar.bz2 550380 RMD160 1e3f72e660af5b7f3ac7747270e113f808d549a4 SHA1 4ae039471105c34d9021a51dc29b90dddf00c09f SHA256 976d0c543b37eb93b096558b803e38e983aedd89aea8b696bb209eef3b18f29c DIST ecryptfs-utils-42.tar.bz2 552939 RMD160 ce0338637c2048423cf56105cc99134de9be0c37 SHA1 607fc91fc91cdb92e19bdd96daf117826f6abcdd SHA256 05fe1a8362c95b7b9f1c872907b37423929d84560514a1331a5b8d49b44a0769 DIST ecryptfs-utils_73.orig.tar.gz 504042 RMD160 339f506b9ada01818d64c3f54b102c4783fef8dd SHA1 d4f0576bbe3c0201bccb06d3b1319f905ee47e01 SHA256 548db19e9c579bc09d4a300d176023656cab72da7f945e1e3f1d827d0aa9ea92 +DIST ecryptfs-utils_75.orig.tar.gz 510771 RMD160 ea6ad95d141a1f544bdb5e02d9847dfcee1b56b7 SHA1 c2d6baa36cb26bc3d96790331ddf75385ece06a0 SHA256 2e6806048eaae91bb8abd412445431f6cf24903b974599de8c879c4b92bb7d7e EBUILD ecryptfs-utils-40.ebuild 1485 RMD160 42c86f4da626905e5b7d11b2c08ccd98c8aa68b9 SHA1 51e81fe0feeaba8270282b398df0735016b2ebf1 SHA256 9ed6cf2f645181b101711f42c8138c15ebabc9b62ecd865365d26351f9adf128 EBUILD ecryptfs-utils-42.ebuild 1485 RMD160 0928c310bb3d8102eb174a233cf2f12cec4dadeb SHA1 07020bfe4eaeedfc5fff6dce657a4377d9f38dc5 SHA256 d047e15f378b912a158c3dc5f73aed8aa74021dd1e771c7a1407ece664542238 EBUILD ecryptfs-utils-73.ebuild 1824 RMD160 87b0d4adde256fea6cfa707f5857ecf752b854e9 SHA1 59a7782f2edf28c4f007fdcb21d1662804f264cd SHA256 84796850202313cf2400c17770d3cb0af350ad85abc93aea769aed14e8334cd4 -MISC ChangeLog 4056 RMD160 b01d2e23c99f76f36b613872bae907d5dc7ff39c SHA1 7a87b984cfb6e504e6a5fd394a4f9db10fd096a4 SHA256 049e1cb213c97b69092ff7b7037e7886f64db3a6dc154568fb498a92cdaf0bf1 +EBUILD ecryptfs-utils-75.ebuild 1771 RMD160 f5a7985e062941b170592feddee107ef67506da8 SHA1 8dde375a44640d0cc4d6b9dbd98f2e2fbdae30a7 SHA256 11f1c53f83616d20384259d2187a82a09d302659f2b6c6e0c1b060e57958edc1 +MISC ChangeLog 4254 RMD160 e45cc76c269aab78773975b9075f1b719b6aece7 SHA1 d02487f5b4dbc927e109d66b575025e929ecba74 SHA256 84890d0e030a37fcb29d081af2990219c625e4a17a5699404e83b8750f13de3f MISC metadata.xml 599 RMD160 d22b9f6ed4b1e207de5b3b032e1f30bc3a1f3aab SHA1 cd6d44b79acd6749c5ad7d220f0ff1657d44b59f SHA256 fcf1fab48a362024a1bce7fc47b5c364758fad7faadcda58cb54133b102b0edd diff --git a/sys-fs/ecryptfs-utils/ecryptfs-utils-75.ebuild b/sys-fs/ecryptfs-utils/ecryptfs-utils-75.ebuild new file mode 100644 index 000000000000..43bf93a57a07 --- /dev/null +++ b/sys-fs/ecryptfs-utils/ecryptfs-utils-75.ebuild @@ -0,0 +1,67 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/ecryptfs-utils/ecryptfs-utils-75.ebuild,v 1.1 2009/05/02 18:30:04 arfrever Exp $ + +EAPI="2" + +inherit eutils pam + +DESCRIPTION="eCryptfs userspace utilities" +HOMEPAGE="http://launchpad.net/ecryptfs" +SRC_URI="http://launchpad.net/ecryptfs/trunk/${PV}/+download/${PN}_${PV}.orig.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="doc gpg gtk nss openssl pam pkcs11 python suid tpm" + +RDEPEND=">=sys-apps/keyutils-1.0 + >=dev-libs/libgcrypt-1.2.0 + gpg? ( app-crypt/gpgme ) + gtk? ( x11-libs/gtk+ ) + nss? ( dev-libs/nss ) + openssl? ( >=dev-libs/openssl-0.9.7 ) + pam? ( sys-libs/pam ) + pkcs11? ( + >=dev-libs/openssl-0.9.7 + >=dev-libs/pkcs11-helper-1.04 + ) + python? ( >=dev-lang/python-2.5 ) + tpm? ( app-crypt/trousers )" +DEPEND="${RDEPEND} + >=dev-util/pkgconfig-0.9.0 + python? ( dev-lang/swig )" + +src_prepare() { + epatch "${FILESDIR}/${P}-fix_warnings.patch" +} + +src_configure() { + econf \ + --docdir="/usr/share/doc/${PF}" \ + --with-pamdir=$(getpam_mod_dir) \ + $(use_enable doc docs) \ + $(use_enable gpg) \ + $(use_enable gtk gui) \ + $(use_enable nss) \ + $(use_enable openssl) \ + $(use_enable pam) \ + $(use_enable pkcs11 pkcs11-helper) \ + $(use_enable python pywrap) \ + $(use_enable tpm tspi) +} + +src_install(){ + emake DESTDIR="${D}" install || die "emake install failed" + use suid && fperms u+s /sbin/mount.ecryptfs +} + +pkg_postinst() { + if use suid; then + ewarn + ewarn "You have chosen to install ${PN} with the binary setuid root. This" + ewarn "means that if there are any undetected vulnerabilities in the binary," + ewarn "then local users may be able to gain root access on your machine." + ewarn + fi +} diff --git a/sys-fs/ecryptfs-utils/files/ecryptfs-utils-75-fix_warnings.patch b/sys-fs/ecryptfs-utils/files/ecryptfs-utils-75-fix_warnings.patch new file mode 100644 index 000000000000..0a143455ba4a --- /dev/null +++ b/sys-fs/ecryptfs-utils/files/ecryptfs-utils-75-fix_warnings.patch @@ -0,0 +1,110 @@ +--- src/key_mod/ecryptfs_key_mod_gpg.c ++++ src/key_mod/ecryptfs_key_mod_gpg.c +@@ -131,7 +131,7 @@ + + int ecryptfs_gpg_encrypt(char *to, int size, char *from, unsigned char *blob) + { +- int rc; ++ int rc = 0; + + /* gpg_op_encrypt(...); */ + out: +@@ -251,7 +251,7 @@ + struct val_node **head, void **foo) + { + struct key_mod_gpg *key_mod_gpg = (struct key_mod_gpg *)(*foo); +- int i; ++ int i = 0; + gpgme_error_t err; + int rc = 0; + gpgme_key_t key; +@@ -283,10 +283,7 @@ + + static int generate_name_val_list(struct ecryptfs_name_val_pair *head) + { +- struct stat buf; +- int i = 0; + uid_t id = getuid(); +- struct passwd *pw = getpwuid(id); + int rc = 0; + + head->next = NULL; +@@ -304,6 +301,7 @@ + destroy_key_mod_gpg(key_mod_gpg); + free(key_mod_gpg); + } ++ return 0; + } + + +@@ -312,7 +310,6 @@ + { + struct key_mod_gpg *key_mod_gpg; + gpgme_error_t err; +- gpgme_keylist_result_t keylist_res; + int rc = 0; + + (*foo) = NULL; +@@ -329,7 +326,7 @@ + if ((err = gpgme_op_keylist_start(key_mod_gpg->ctx, "", 0))) { + printf("Error attempting to start keylist\n"); + rc = -EINVAL; +- gpgme_release(ctx); ++ gpgme_release(key_mod_gpg->ctx); + free(key_mod_gpg); + goto out; + } +--- src/key_mod/ecryptfs_key_mod_pkcs11_helper.c ++++ src/key_mod/ecryptfs_key_mod_pkcs11_helper.c +@@ -592,7 +592,6 @@ + char dn[1024] = {0}; + char serial[1024] = {0}; + char *ser = NULL; +- char *ssh_key = NULL; + size_t ser_len = 0; + int n; + +@@ -1538,7 +1537,6 @@ + struct ecryptfs_ctx *ctx = &_ctx; + struct ecryptfs_name_val_pair nvp_head; + struct val_node *dummy_mnt_params; +- uid_t id; + struct passwd *pw; + char *rcfile_fullpath = NULL; + int fd; +@@ -1649,6 +1647,7 @@ + if (pkcs11h_key_param_nodes[PKCS11H_KEY_TOK_ID].suggested_val) + free(pkcs11h_key_param_nodes[PKCS11H_KEY_TOK_ID].suggested_val); + pkcs11h_terminate (); ++ return 0; + } + + static struct ecryptfs_key_mod_ops ecryptfs_pkcs11h_ops = { +--- src/libecryptfs/key_management.c ++++ src/libecryptfs/key_management.c +@@ -18,6 +18,7 @@ + * 02111-1307, USA. + */ + ++#include "config.h" + #include <errno.h> + #ifdef ENABLE_NSS + #include <nss.h> +@@ -39,7 +40,6 @@ + #include <sys/types.h> + #include <sys/stat.h> + #include <pwd.h> +-#include "config.h" + #include "../include/ecryptfs.h" + + #ifndef ENOKEY +--- src/utils/ecryptfs_unwrap_passphrase.c ++++ src/utils/ecryptfs_unwrap_passphrase.c +@@ -42,7 +42,6 @@ + char *wrapping_passphrase; + char salt[ECRYPTFS_SALT_SIZE]; + char salt_hex[ECRYPTFS_SALT_SIZE_HEX]; +- struct passwd *pwd; + int rc = 0; + + if (argc == 1) { |