packages: ecryptfs-utils/ecryptfs-utils.spec, ecryptfs-utils/ecryptfs-utils...

arekm arekm at pld-linux.org
Sat Feb 5 04:15:23 CET 2011


Author: arekm                        Date: Sat Feb  5 03:15:23 2011 GMT
Module: packages                      Tag: HEAD
---- Log message:
- rel 2; patches from fc

---- Files affected:
packages/ecryptfs-utils:
   ecryptfs-utils.spec (1.20 -> 1.21) , ecryptfs-utils-75-werror.patch (NONE -> 1.1)  (NEW), ecryptfs-utils-83-fixsalt.patch (NONE -> 1.1)  (NEW), ecryptfs-utils-83-splitnss.patch (NONE -> 1.1)  (NEW), ecryptfs-utils-84-fgetc.patch (NONE -> 1.1)  (NEW), ecryptfs-utils-84-fixsigness.patch (NONE -> 1.1)  (NEW)

---- Diffs:

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils.spec
diff -u packages/ecryptfs-utils/ecryptfs-utils.spec:1.20 packages/ecryptfs-utils/ecryptfs-utils.spec:1.21
--- packages/ecryptfs-utils/ecryptfs-utils.spec:1.20	Thu Feb  3 17:32:16 2011
+++ packages/ecryptfs-utils/ecryptfs-utils.spec	Sat Feb  5 04:15:16 2011
@@ -3,12 +3,17 @@
 Summary(pl.UTF-8):	Narzędzie pomocnicze i biblioteki do montowania eCryptfs
 Name:		ecryptfs-utils
 Version:	85
-Release:	1
+Release:	2
 License:	GPL v2+
 Group:		Base
 Source0:	http://launchpad.net/ecryptfs/trunk/%{version}/+download/%{name}_%{version}.orig.tar.gz
 # Source0-md5:	eacf9488681d99651da544a4c261f784
 Patch0:		%{name}-sh.patch
+Patch1:		%{name}-83-fixsalt.patch
+Patch2:		%{name}-83-splitnss.patch
+Patch3:		%{name}-84-fgetc.patch
+Patch4:		%{name}-84-fixsigness.patch
+Patch5:		%{name}-75-werror.patch
 URL:		http://ecryptfs.sourceforge.net/
 BuildRequires:	autoconf >= 2.59
 BuildRequires:	automake
@@ -106,6 +111,11 @@
 %prep
 %setup -q
 %patch0 -p1
+%patch1 -p1
+%patch2 -p1
+%patch3 -p1
+%patch4 -p1
+%patch5 -p1
 
 %build
 %{__libtoolize}
@@ -197,6 +207,9 @@
 All persons listed below can be reached at <cvs_login>@pld-linux.org
 
 $Log$
+Revision 1.21  2011/02/05 03:15:16  arekm
+- rel 2; patches from fc
+
 Revision 1.20  2011/02/03 16:32:16  qboosh
 - unified python package name (python-ecryptfs instead of -python)
 - check-files cleanup and pl desc for python-

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch:1.1
--- /dev/null	Sat Feb  5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch	Sat Feb  5 04:15:16 2011
@@ -0,0 +1,291 @@
+diff -up ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
+--- ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror	2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c	2011-02-01 11:12:14.813646937 +0100
+@@ -86,7 +86,7 @@ static int ecryptfs_pkcs11h_deserialize(
+ 		pkcs11h_data->serialized_id = NULL;
+ 	}
+ 	else {
+-		pkcs11h_data->serialized_id = blob + i;
++		pkcs11h_data->serialized_id = (char *)blob + i;
+ 		i += serialized_id_length;
+ 	}
+ 	pkcs11h_data->certificate_blob_size = blob[i++] % 256;
+@@ -104,12 +104,11 @@ static int ecryptfs_pkcs11h_deserialize(
+ 		pkcs11h_data->passphrase = NULL;
+ 	}
+ 	else {
+-		pkcs11h_data->passphrase = blob + i;
++		pkcs11h_data->passphrase = (char *)blob + i;
+ 		i += passphrase_length;
+ 	}
+ 
+ 	rc = 0;
+-out:
+ 	return rc;
+ }
+ 
+@@ -346,14 +345,14 @@ static int ecryptfs_pkcs11h_get_key_sig(
+ 	data[i++] = '\02';
+ 	data[i++] = (char)(nbits >> 8);
+ 	data[i++] = (char)nbits;
+-	BN_bn2bin(rsa->n, &(data[i]));
++	BN_bn2bin(rsa->n, (unsigned char *)&(data[i]));
+ 	i += nbytes;
+ 	data[i++] = (char)(ebits >> 8);
+ 	data[i++] = (char)ebits;
+-	BN_bn2bin(rsa->e, &(data[i]));
++	BN_bn2bin(rsa->e, (unsigned char *)&(data[i]));
+ 	i += ebytes;
+-	SHA1(data, len + 3, hash);
+-	to_hex(sig, hash, ECRYPTFS_SIG_SIZE);
++	SHA1((unsigned char *)data, len + 3, (unsigned char *)hash);
++	to_hex((char *)sig, hash, ECRYPTFS_SIG_SIZE);
+ 	sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
+ 
+ 	rc = 0;
+@@ -411,8 +410,8 @@ static int ecryptfs_pkcs11h_encrypt(char
+ 		if (
+ 			(rc = RSA_public_encrypt(
+ 				from_size,
+-				from,
+-				to,
++				(unsigned char *)from,
++				(unsigned char *)to,
+ 				rsa,
+ 				RSA_PKCS1_PADDING
+ 			)) == -1
+@@ -506,9 +505,9 @@ static int ecryptfs_pkcs11h_decrypt(char
+ 		(rv = pkcs11h_certificate_decryptAny (
+ 			certificate,
+ 			CKM_RSA_PKCS,
+-			from,
++			(unsigned char *)from,
+ 			from_size,
+-			to,
++			(unsigned char *)to,
+ 			to_size
+ 		)) != CKR_OK
+ 	) {
+@@ -534,9 +533,9 @@ static int ecryptfs_pkcs11h_decrypt(char
+ 		pkcs11h_certificate_decryptAny (
+ 			certificate,
+ 			CKM_RSA_PKCS,
+-			from,
++			(unsigned char *)from,
+ 			from_size,
+-			tmp,
++			(unsigned char *)tmp,
+ 			to_size
+ 		);
+ 
+@@ -851,7 +850,7 @@ static int ecryptfs_pkcs11h_process_key(
+ 		rc = MOUNT_ERROR;
+ 		goto out;
+ 	}
+-	if ((rc = ecryptfs_pkcs11h_serialize(subgraph_key_ctx->key_mod->blob,
++	if ((rc = ecryptfs_pkcs11h_serialize((unsigned char *)subgraph_key_ctx->key_mod->blob,
+ 					     &subgraph_key_ctx->key_mod->blob_size, 
+ 					     pkcs11h_data))) {
+ 		syslog(LOG_ERR, "PKCS#11: Error serializing pkcs11; rc=[%d]\n", rc);
+@@ -930,7 +929,7 @@ static int tf_pkcs11h_global_loglevel(st
+ 
+ 	rc = DEFAULT_TOK;
+ 	node->val = NULL;
+-out:
++// out:
+ 	return rc;
+ }
+ 
+@@ -943,7 +942,7 @@ static int tf_pkcs11h_global_pincache(st
+ 
+ 	rc = DEFAULT_TOK;
+ 	node->val = NULL;
+-out:
++// out:
+ 	return rc;
+ }
+ 
+@@ -1013,7 +1012,7 @@ static int tf_pkcs11h_provider_prot_auth
+ 	sscanf (node->val, "%x", &subgraph_provider_ctx->allow_protected_authentication);
+ 	rc = DEFAULT_TOK;
+ 	node->val = NULL;
+-out:
++
+ 	return rc;
+ }
+ 
+@@ -1027,7 +1026,7 @@ static int tf_pkcs11h_provider_cert_priv
+ 	sscanf (node->val, "%x", &subgraph_provider_ctx->certificate_is_private);
+ 	rc = DEFAULT_TOK;
+ 	node->val = NULL;
+-out:
++
+ 	return rc;
+ }
+ 
+@@ -1042,7 +1041,7 @@ static int tf_pkcs11h_provider_private_m
+ 
+ 	rc = DEFAULT_TOK;
+ 	node->val = NULL;
+-out:
++
+ 	return rc;
+ }
+ 
+@@ -1073,7 +1072,7 @@ static int tf_pkcs11h_provider_end(struc
+ 	free(subgraph_provider_ctx);
+ 	*foo = NULL;
+ 	rc = DEFAULT_TOK;
+-out:
++
+ 	return rc;
+ }
+ 
+@@ -1120,7 +1119,7 @@ static int tf_pkcs11h_key_x509file(struc
+ 	X509 *x509 = NULL;
+ 	unsigned char *p = NULL;
+ 	FILE *fp = NULL;
+-	int rc;
++	int rc = 0;
+ 
+ 	subgraph_key_ctx = (struct pkcs11h_subgraph_key_ctx *)(*foo);
+ 
+diff -up ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c
+--- ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror	2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c	2011-02-01 11:12:14.813646937 +0100
+@@ -146,7 +146,7 @@ int ecryptfs_parse_stat(struct ecryptfs_
+ 	if (buf_size < (ECRYPTFS_FILE_SIZE_BYTES
+ 			+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
+ 			+ 4)) {
+-		printf("%s: Invalid metadata size; must have at least [%lu] "
++		printf("%s: Invalid metadata size; must have at least [%zu] "
+ 		       "bytes; there are only [%zu] bytes\n", __FUNCTION__,
+ 		       (ECRYPTFS_FILE_SIZE_BYTES
+ 			+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
+diff -up ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror	2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c	2011-02-01 11:12:18.061664154 +0100
+@@ -43,31 +43,6 @@
+ 
+ #define PRIVATE_DIR "Private"
+ 
+-static void error(const char *msg)
+-{
+-	syslog(LOG_ERR, "errno = [%i]; strerror = [%m]\n", errno);
+-	switch (errno) {
+-	case ENOKEY:
+-		syslog(LOG_ERR, "%s: Requested key not available\n", msg);
+-		return;
+-
+-	case EKEYEXPIRED:
+-		syslog(LOG_ERR, "%s: Key has expired\n", msg);
+-		return;
+-
+-	case EKEYREVOKED:
+-		syslog(LOG_ERR, "%s: Key has been revoked\n", msg);
+-		return;
+-
+-	case EKEYREJECTED:
+-		syslog(LOG_ERR, "%s: Key was rejected by service\n", msg);
+-		return;
+-	default:
+-		syslog(LOG_ERR, "%s: Unknown key error\n", msg);
+-		return;
+-	}
+-}
+-
+ /* returns: 0 for pam automounting not set, 1 for set, <0 for error */
+ static int ecryptfs_pam_automount_set(const char *homedir)
+ {
+@@ -87,7 +62,7 @@ out:
+ 	return rc;
+ }
+ 
+-static int wrap_passphrase_if_necessary(char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
++static int wrap_passphrase_if_necessary(const char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
+ {
+ 	char *unwrapped_pw_filename = NULL;
+ 	struct stat s;
+@@ -198,8 +173,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+ 		if ((argc == 1)
+ 		    && (memcmp(argv[0], "unwrap\0", 7) == 0)) {
+ 			char *wrapped_pw_filename;
+-			char *unwrapped_pw_filename;
+-			struct stat s;
+ 
+ 			rc = asprintf(
+ 				&wrapped_pw_filename, "%s/.ecryptfs/%s",
+@@ -291,8 +264,6 @@ static int private_dir(pam_handle_t *pam
+ 	char *autoumount = "auto-umount";
+ 	struct stat s;
+ 	pid_t pid;
+-	struct utmp *u;
+-	int count = 0;
+ 
+ 	if ((pwd = fetch_pwd(pamh)) == NULL) {
+ 		/* fetch_pwd() logged a message */
+@@ -339,7 +310,7 @@ static int private_dir(pam_handle_t *pam
+ 			if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
+ 				/* User has not recorded their passphrase */
+ 				unlink("/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
+-				symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
++				rc=symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
+ 				fd = open("/var/lib/update-notifier/dpkg-run-stamp", O_WRONLY|O_CREAT|O_NONBLOCK, 0666);
+ 				close(fd);
+ 			}
+@@ -410,7 +381,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ 	char *old_passphrase = NULL;
+ 	char *new_passphrase = NULL;
+ 	char *wrapped_pw_filename;
+-	char *name = NULL;
++// 	char *name = NULL;
+ 	char salt[ECRYPTFS_SALT_SIZE];
+ 	char salt_hex[ECRYPTFS_SALT_SIZE_HEX];
+ 	pid_t child_pid, tmp_pid;
+@@ -424,11 +395,11 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ 		if (pwd) {
+ 			uid = pwd->pw_uid;
+ 			homedir = pwd->pw_dir;
+-			name = pwd->pw_name;
++// 			name = pwd->pw_name;
+ 		}
+ 	} else {
+ 		syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
+-		       "rc = [%ld]\n", username, rc);
++		       "rc = [%d]\n", username, rc);
+ 		goto out;
+ 	}
+ 	saved_uid = geteuid();
+diff -up ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-85/src/utils/mount.ecryptfs.c
+--- ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror	2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/utils/mount.ecryptfs.c	2011-02-01 11:12:14.818646964 +0100
+@@ -461,7 +461,7 @@ static int ecryptfs_do_mount(int argc, c
+ {
+ 	int rc;
+ 	int flags = 0;
+-	int num_opts = 0;
++// 	int num_opts = 0;
+ 	char *src = NULL, *targ = NULL, *opts = NULL, *new_opts = NULL, *temp;
+ 	char *val;
+ 
+@@ -472,7 +472,7 @@ static int ecryptfs_do_mount(int argc, c
+ 	rc = strip_userland_opts(opts);
+ 	if (rc)
+ 		goto out;
+-	num_opts = ecryptfs_generate_mount_flags(opts, &flags);
++	ecryptfs_generate_mount_flags(opts, &flags);
+ 	if (!(temp = strdup("ecryptfs_unlink_sigs"))) {
+ 		rc = -ENOMEM;
+ 		goto out;
+diff -up ecryptfs-utils-85/src/utils/test.c.werror ecryptfs-utils-85/src/utils/test.c
+--- ecryptfs-utils-85/src/utils/test.c.werror	2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/utils/test.c	2011-02-01 11:12:14.818646964 +0100
+@@ -281,7 +281,7 @@ int ecryptfs_encrypt_page(int page_cache
+ 	struct inode *lower_inode;
+ 	struct ecryptfs_crypt_stat *crypt_stat;
+ 	int rc = 0;
+-	int lower_byte_offset;
++	int lower_byte_offset = 0;
+ 	int orig_byte_offset = 0;
+ 	int num_extents_per_page;
+ #define ECRYPTFS_PAGE_STATE_UNREAD    0

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch:1.1
--- /dev/null	Sat Feb  5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch	Sat Feb  5 04:15:16 2011
@@ -0,0 +1,12 @@
+diff -up ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c.fixsalt ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c
+--- ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c.fixsalt	2009-10-20 20:49:55.000000000 +0200
++++ ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c	2010-04-14 16:18:43.273398808 +0200
+@@ -105,7 +105,7 @@ static int tf_pass_file(struct ecryptfs_
+ out:
+ 	free(node->val);
+ 	node->val = NULL;
+-	return rc;
++	return rc ? rc : DEFAULT_TOK;
+ }
+ 
+ static int tf_salt(struct ecryptfs_ctx *ctx, struct param_node *node,

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch:1.1
--- /dev/null	Sat Feb  5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch	Sat Feb  5 04:15:16 2011
@@ -0,0 +1,86 @@
+diff -up ecryptfs-utils-83/src/libecryptfs/key_management.c.splitnss ecryptfs-utils-83/src/libecryptfs/key_management.c
+--- ecryptfs-utils-83/src/libecryptfs/key_management.c.splitnss	2010-02-16 17:59:21.000000000 +0100
++++ ecryptfs-utils-83/src/libecryptfs/key_management.c	2010-05-04 11:08:19.875872481 +0200
+@@ -133,28 +133,8 @@ out:
+ }
+ 
+ 
+-int ecryptfs_remove_auth_tok_from_keyring(char *auth_tok_sig)
+-{
+-	int rc;
++#include "key_management.inc.c"
+ 
+-	rc = (int)keyctl_search(KEY_SPEC_USER_KEYRING, "user", auth_tok_sig, 0);
+-	if (rc < 0) {
+-		rc = errno;
+-		syslog(LOG_ERR, "Failed to find key with sig [%s]: %m\n",
+-		       auth_tok_sig);
+-		goto out;
+-	}
+-	rc = keyctl_unlink(rc, KEY_SPEC_USER_KEYRING);
+-	if (rc < 0) {
+-		rc = errno;
+-		syslog(LOG_ERR, "Failed to unlink key with sig [%s]: %s\n",
+-		       auth_tok_sig, strerror(rc));
+-		goto out;
+-	}
+-	rc = 0;
+-out:
+-	return rc;
+-}
+ int ecryptfs_add_auth_tok_to_keyring(struct ecryptfs_auth_tok *auth_tok,
+ 				     char *auth_tok_sig)
+ {
+diff -up ecryptfs-utils-83/src/libecryptfs/key_management.inc.c.splitnss ecryptfs-utils-83/src/libecryptfs/key_management.inc.c
+--- ecryptfs-utils-83/src/libecryptfs/key_management.inc.c.splitnss	2010-05-04 11:08:19.875872481 +0200
++++ ecryptfs-utils-83/src/libecryptfs/key_management.inc.c	2010-05-04 11:08:19.875872481 +0200
+@@ -0,0 +1,22 @@
++int ecryptfs_remove_auth_tok_from_keyring(char *auth_tok_sig)
++{
++	int rc;
++
++	rc = (int)keyctl_search(KEY_SPEC_USER_KEYRING, "user", auth_tok_sig, 0);
++	if (rc < 0) {
++		rc = errno;
++		syslog(LOG_ERR, "Failed to find key with sig [%s]: %m\n",
++		       auth_tok_sig);
++		goto out;
++	}
++	rc = keyctl_unlink(rc, KEY_SPEC_USER_KEYRING);
++	if (rc < 0) {
++		rc = errno;
++		syslog(LOG_ERR, "Failed to unlink key with sig [%s]: %s\n",
++		       auth_tok_sig, strerror(rc));
++		goto out;
++	}
++	rc = 0;
++out:
++	return rc;
++}
+diff -up ecryptfs-utils-83/src/utils/Makefile.am.splitnss ecryptfs-utils-83/src/utils/Makefile.am
+--- ecryptfs-utils-83/src/utils/Makefile.am.splitnss	2010-05-04 11:09:05.176554494 +0200
++++ ecryptfs-utils-83/src/utils/Makefile.am	2010-05-04 11:09:05.200991500 +0200
+@@ -36,7 +36,7 @@ mount_ecryptfs_CFLAGS = $(AM_CFLAGS) $(K
+ mount_ecryptfs_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la $(KEYUTILS_LIBS) $(LIBGCRYPT_LIBS)
+ umount_ecryptfs_SOURCES = umount.ecryptfs.c
+ umount_ecryptfs_CFLAGS = $(AM_CFLAGS) $(KEYUTILS_CFLAGS)
+-umount_ecryptfs_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la
++umount_ecryptfs_LDADD = -lkeyutils
+ ecryptfs_manager_SOURCES = manager.c io.c io.h gen_key.c
+ ecryptfs_manager_CFLAGS = $(AM_CFLAGS) $(KEYUTILS_CFLAGS) $(LIBGCRYPT_CFLAGS)
+ ecryptfs_manager_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la $(KEYUTILS_LIBS) $(LIBGCRYPT_LIBS)
+diff -up ecryptfs-utils-83/src/utils/umount.ecryptfs.c.splitnss ecryptfs-utils-83/src/utils/umount.ecryptfs.c
+--- ecryptfs-utils-83/src/utils/umount.ecryptfs.c.splitnss	2009-10-20 20:49:55.000000000 +0200
++++ ecryptfs-utils-83/src/utils/umount.ecryptfs.c	2010-05-04 11:08:19.893867192 +0200
+@@ -24,7 +24,10 @@
+ #include <stdlib.h>
+ #include <string.h>
+ #include <unistd.h>
+-#include "ecryptfs.h"
++#include <keyutils.h>
++#include <syslog.h>
++
++#include "../libecryptfs/key_management.inc.c"
+ 
+ static void usage()
+ {

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch:1.1
--- /dev/null	Sat Feb  5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch	Sat Feb  5 04:15:16 2011
@@ -0,0 +1,13 @@
+diff -up ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c
+--- ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc	2011-01-11 10:44:20.000000000 +0100
++++ ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c	2011-01-11 10:44:32.000000000 +0100
+@@ -88,7 +88,8 @@ char *fetch_sig(char *pw_dir, int entry)
+ /* Read ecryptfs signature from file and validate
+  * Return signature as a string, or NULL on failure
+  */
+-	char *sig_file, c;
++	char *sig_file;
++	int c;
+ 	FILE *fh;
+ 	char *sig;
+ 	int i;

================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch:1.1
--- /dev/null	Sat Feb  5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch	Sat Feb  5 04:15:16 2011
@@ -0,0 +1,21 @@
+diff -up ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.fixsigness ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
+--- ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.fixsigness	2011-01-04 14:15:58.711761181 +0100
++++ ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c	2011-01-04 14:15:58.744761153 +0100
+@@ -1144,7 +1144,7 @@ static int tf_pkcs11h_key_x509file(struc
+ 			goto out;
+ 		}
+ 
+-		if ((subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, NULL)) < 0	) {
++		if ((ssize_t)(subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, NULL)) < 0	) {
+ 			syslog(LOG_ERR, "PKCS#11: Cannot read decode certificate");
+ 			rc = -EIO;
+ 			goto out;
+@@ -1165,7 +1165,7 @@ static int tf_pkcs11h_key_x509file(struc
+ 		 */
+ 		p = subgraph_key_ctx->pkcs11h_data.certificate_blob;
+ 
+-		if ((subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, &p)) < 0) {
++		if ((ssize_t)(subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, &p)) < 0) {
+ 			syslog(LOG_ERR, "PKCS#11: Cannot read decode certificate");
+ 			goto out;
+ 		}
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/ecryptfs-utils/ecryptfs-utils.spec?r1=1.20&r2=1.21&f=u



More information about the pld-cvs-commit mailing list