packages: ecryptfs-utils/ecryptfs-utils.spec, ecryptfs-utils/ecryptfs-utils...
arekm
arekm at pld-linux.org
Sat Feb 5 04:15:23 CET 2011
Author: arekm Date: Sat Feb 5 03:15:23 2011 GMT
Module: packages Tag: HEAD
---- Log message:
- rel 2; patches from fc
---- Files affected:
packages/ecryptfs-utils:
ecryptfs-utils.spec (1.20 -> 1.21) , ecryptfs-utils-75-werror.patch (NONE -> 1.1) (NEW), ecryptfs-utils-83-fixsalt.patch (NONE -> 1.1) (NEW), ecryptfs-utils-83-splitnss.patch (NONE -> 1.1) (NEW), ecryptfs-utils-84-fgetc.patch (NONE -> 1.1) (NEW), ecryptfs-utils-84-fixsigness.patch (NONE -> 1.1) (NEW)
---- Diffs:
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils.spec
diff -u packages/ecryptfs-utils/ecryptfs-utils.spec:1.20 packages/ecryptfs-utils/ecryptfs-utils.spec:1.21
--- packages/ecryptfs-utils/ecryptfs-utils.spec:1.20 Thu Feb 3 17:32:16 2011
+++ packages/ecryptfs-utils/ecryptfs-utils.spec Sat Feb 5 04:15:16 2011
@@ -3,12 +3,17 @@
Summary(pl.UTF-8): Narzędzie pomocnicze i biblioteki do montowania eCryptfs
Name: ecryptfs-utils
Version: 85
-Release: 1
+Release: 2
License: GPL v2+
Group: Base
Source0: http://launchpad.net/ecryptfs/trunk/%{version}/+download/%{name}_%{version}.orig.tar.gz
# Source0-md5: eacf9488681d99651da544a4c261f784
Patch0: %{name}-sh.patch
+Patch1: %{name}-83-fixsalt.patch
+Patch2: %{name}-83-splitnss.patch
+Patch3: %{name}-84-fgetc.patch
+Patch4: %{name}-84-fixsigness.patch
+Patch5: %{name}-75-werror.patch
URL: http://ecryptfs.sourceforge.net/
BuildRequires: autoconf >= 2.59
BuildRequires: automake
@@ -106,6 +111,11 @@
%prep
%setup -q
%patch0 -p1
+%patch1 -p1
+%patch2 -p1
+%patch3 -p1
+%patch4 -p1
+%patch5 -p1
%build
%{__libtoolize}
@@ -197,6 +207,9 @@
All persons listed below can be reached at <cvs_login>@pld-linux.org
$Log$
+Revision 1.21 2011/02/05 03:15:16 arekm
+- rel 2; patches from fc
+
Revision 1.20 2011/02/03 16:32:16 qboosh
- unified python package name (python-ecryptfs instead of -python)
- check-files cleanup and pl desc for python-
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch:1.1
--- /dev/null Sat Feb 5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-75-werror.patch Sat Feb 5 04:15:16 2011
@@ -0,0 +1,291 @@
+diff -up ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
+--- ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror 2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c 2011-02-01 11:12:14.813646937 +0100
+@@ -86,7 +86,7 @@ static int ecryptfs_pkcs11h_deserialize(
+ pkcs11h_data->serialized_id = NULL;
+ }
+ else {
+- pkcs11h_data->serialized_id = blob + i;
++ pkcs11h_data->serialized_id = (char *)blob + i;
+ i += serialized_id_length;
+ }
+ pkcs11h_data->certificate_blob_size = blob[i++] % 256;
+@@ -104,12 +104,11 @@ static int ecryptfs_pkcs11h_deserialize(
+ pkcs11h_data->passphrase = NULL;
+ }
+ else {
+- pkcs11h_data->passphrase = blob + i;
++ pkcs11h_data->passphrase = (char *)blob + i;
+ i += passphrase_length;
+ }
+
+ rc = 0;
+-out:
+ return rc;
+ }
+
+@@ -346,14 +345,14 @@ static int ecryptfs_pkcs11h_get_key_sig(
+ data[i++] = '\02';
+ data[i++] = (char)(nbits >> 8);
+ data[i++] = (char)nbits;
+- BN_bn2bin(rsa->n, &(data[i]));
++ BN_bn2bin(rsa->n, (unsigned char *)&(data[i]));
+ i += nbytes;
+ data[i++] = (char)(ebits >> 8);
+ data[i++] = (char)ebits;
+- BN_bn2bin(rsa->e, &(data[i]));
++ BN_bn2bin(rsa->e, (unsigned char *)&(data[i]));
+ i += ebytes;
+- SHA1(data, len + 3, hash);
+- to_hex(sig, hash, ECRYPTFS_SIG_SIZE);
++ SHA1((unsigned char *)data, len + 3, (unsigned char *)hash);
++ to_hex((char *)sig, hash, ECRYPTFS_SIG_SIZE);
+ sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
+
+ rc = 0;
+@@ -411,8 +410,8 @@ static int ecryptfs_pkcs11h_encrypt(char
+ if (
+ (rc = RSA_public_encrypt(
+ from_size,
+- from,
+- to,
++ (unsigned char *)from,
++ (unsigned char *)to,
+ rsa,
+ RSA_PKCS1_PADDING
+ )) == -1
+@@ -506,9 +505,9 @@ static int ecryptfs_pkcs11h_decrypt(char
+ (rv = pkcs11h_certificate_decryptAny (
+ certificate,
+ CKM_RSA_PKCS,
+- from,
++ (unsigned char *)from,
+ from_size,
+- to,
++ (unsigned char *)to,
+ to_size
+ )) != CKR_OK
+ ) {
+@@ -534,9 +533,9 @@ static int ecryptfs_pkcs11h_decrypt(char
+ pkcs11h_certificate_decryptAny (
+ certificate,
+ CKM_RSA_PKCS,
+- from,
++ (unsigned char *)from,
+ from_size,
+- tmp,
++ (unsigned char *)tmp,
+ to_size
+ );
+
+@@ -851,7 +850,7 @@ static int ecryptfs_pkcs11h_process_key(
+ rc = MOUNT_ERROR;
+ goto out;
+ }
+- if ((rc = ecryptfs_pkcs11h_serialize(subgraph_key_ctx->key_mod->blob,
++ if ((rc = ecryptfs_pkcs11h_serialize((unsigned char *)subgraph_key_ctx->key_mod->blob,
+ &subgraph_key_ctx->key_mod->blob_size,
+ pkcs11h_data))) {
+ syslog(LOG_ERR, "PKCS#11: Error serializing pkcs11; rc=[%d]\n", rc);
+@@ -930,7 +929,7 @@ static int tf_pkcs11h_global_loglevel(st
+
+ rc = DEFAULT_TOK;
+ node->val = NULL;
+-out:
++// out:
+ return rc;
+ }
+
+@@ -943,7 +942,7 @@ static int tf_pkcs11h_global_pincache(st
+
+ rc = DEFAULT_TOK;
+ node->val = NULL;
+-out:
++// out:
+ return rc;
+ }
+
+@@ -1013,7 +1012,7 @@ static int tf_pkcs11h_provider_prot_auth
+ sscanf (node->val, "%x", &subgraph_provider_ctx->allow_protected_authentication);
+ rc = DEFAULT_TOK;
+ node->val = NULL;
+-out:
++
+ return rc;
+ }
+
+@@ -1027,7 +1026,7 @@ static int tf_pkcs11h_provider_cert_priv
+ sscanf (node->val, "%x", &subgraph_provider_ctx->certificate_is_private);
+ rc = DEFAULT_TOK;
+ node->val = NULL;
+-out:
++
+ return rc;
+ }
+
+@@ -1042,7 +1041,7 @@ static int tf_pkcs11h_provider_private_m
+
+ rc = DEFAULT_TOK;
+ node->val = NULL;
+-out:
++
+ return rc;
+ }
+
+@@ -1073,7 +1072,7 @@ static int tf_pkcs11h_provider_end(struc
+ free(subgraph_provider_ctx);
+ *foo = NULL;
+ rc = DEFAULT_TOK;
+-out:
++
+ return rc;
+ }
+
+@@ -1120,7 +1119,7 @@ static int tf_pkcs11h_key_x509file(struc
+ X509 *x509 = NULL;
+ unsigned char *p = NULL;
+ FILE *fp = NULL;
+- int rc;
++ int rc = 0;
+
+ subgraph_key_ctx = (struct pkcs11h_subgraph_key_ctx *)(*foo);
+
+diff -up ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c
+--- ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror 2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c 2011-02-01 11:12:14.813646937 +0100
+@@ -146,7 +146,7 @@ int ecryptfs_parse_stat(struct ecryptfs_
+ if (buf_size < (ECRYPTFS_FILE_SIZE_BYTES
+ + MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
+ + 4)) {
+- printf("%s: Invalid metadata size; must have at least [%lu] "
++ printf("%s: Invalid metadata size; must have at least [%zu] "
+ "bytes; there are only [%zu] bytes\n", __FUNCTION__,
+ (ECRYPTFS_FILE_SIZE_BYTES
+ + MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
+diff -up ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror 2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c 2011-02-01 11:12:18.061664154 +0100
+@@ -43,31 +43,6 @@
+
+ #define PRIVATE_DIR "Private"
+
+-static void error(const char *msg)
+-{
+- syslog(LOG_ERR, "errno = [%i]; strerror = [%m]\n", errno);
+- switch (errno) {
+- case ENOKEY:
+- syslog(LOG_ERR, "%s: Requested key not available\n", msg);
+- return;
+-
+- case EKEYEXPIRED:
+- syslog(LOG_ERR, "%s: Key has expired\n", msg);
+- return;
+-
+- case EKEYREVOKED:
+- syslog(LOG_ERR, "%s: Key has been revoked\n", msg);
+- return;
+-
+- case EKEYREJECTED:
+- syslog(LOG_ERR, "%s: Key was rejected by service\n", msg);
+- return;
+- default:
+- syslog(LOG_ERR, "%s: Unknown key error\n", msg);
+- return;
+- }
+-}
+-
+ /* returns: 0 for pam automounting not set, 1 for set, <0 for error */
+ static int ecryptfs_pam_automount_set(const char *homedir)
+ {
+@@ -87,7 +62,7 @@ out:
+ return rc;
+ }
+
+-static int wrap_passphrase_if_necessary(char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
++static int wrap_passphrase_if_necessary(const char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
+ {
+ char *unwrapped_pw_filename = NULL;
+ struct stat s;
+@@ -198,8 +173,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+ if ((argc == 1)
+ && (memcmp(argv[0], "unwrap\0", 7) == 0)) {
+ char *wrapped_pw_filename;
+- char *unwrapped_pw_filename;
+- struct stat s;
+
+ rc = asprintf(
+ &wrapped_pw_filename, "%s/.ecryptfs/%s",
+@@ -291,8 +264,6 @@ static int private_dir(pam_handle_t *pam
+ char *autoumount = "auto-umount";
+ struct stat s;
+ pid_t pid;
+- struct utmp *u;
+- int count = 0;
+
+ if ((pwd = fetch_pwd(pamh)) == NULL) {
+ /* fetch_pwd() logged a message */
+@@ -339,7 +310,7 @@ static int private_dir(pam_handle_t *pam
+ if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
+ /* User has not recorded their passphrase */
+ unlink("/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
+- symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
++ rc=symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
+ fd = open("/var/lib/update-notifier/dpkg-run-stamp", O_WRONLY|O_CREAT|O_NONBLOCK, 0666);
+ close(fd);
+ }
+@@ -410,7 +381,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ char *old_passphrase = NULL;
+ char *new_passphrase = NULL;
+ char *wrapped_pw_filename;
+- char *name = NULL;
++// char *name = NULL;
+ char salt[ECRYPTFS_SALT_SIZE];
+ char salt_hex[ECRYPTFS_SALT_SIZE_HEX];
+ pid_t child_pid, tmp_pid;
+@@ -424,11 +395,11 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ if (pwd) {
+ uid = pwd->pw_uid;
+ homedir = pwd->pw_dir;
+- name = pwd->pw_name;
++// name = pwd->pw_name;
+ }
+ } else {
+ syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
+- "rc = [%ld]\n", username, rc);
++ "rc = [%d]\n", username, rc);
+ goto out;
+ }
+ saved_uid = geteuid();
+diff -up ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-85/src/utils/mount.ecryptfs.c
+--- ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror 2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/utils/mount.ecryptfs.c 2011-02-01 11:12:14.818646964 +0100
+@@ -461,7 +461,7 @@ static int ecryptfs_do_mount(int argc, c
+ {
+ int rc;
+ int flags = 0;
+- int num_opts = 0;
++// int num_opts = 0;
+ char *src = NULL, *targ = NULL, *opts = NULL, *new_opts = NULL, *temp;
+ char *val;
+
+@@ -472,7 +472,7 @@ static int ecryptfs_do_mount(int argc, c
+ rc = strip_userland_opts(opts);
+ if (rc)
+ goto out;
+- num_opts = ecryptfs_generate_mount_flags(opts, &flags);
++ ecryptfs_generate_mount_flags(opts, &flags);
+ if (!(temp = strdup("ecryptfs_unlink_sigs"))) {
+ rc = -ENOMEM;
+ goto out;
+diff -up ecryptfs-utils-85/src/utils/test.c.werror ecryptfs-utils-85/src/utils/test.c
+--- ecryptfs-utils-85/src/utils/test.c.werror 2010-12-17 18:34:04.000000000 +0100
++++ ecryptfs-utils-85/src/utils/test.c 2011-02-01 11:12:14.818646964 +0100
+@@ -281,7 +281,7 @@ int ecryptfs_encrypt_page(int page_cache
+ struct inode *lower_inode;
+ struct ecryptfs_crypt_stat *crypt_stat;
+ int rc = 0;
+- int lower_byte_offset;
++ int lower_byte_offset = 0;
+ int orig_byte_offset = 0;
+ int num_extents_per_page;
+ #define ECRYPTFS_PAGE_STATE_UNREAD 0
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch:1.1
--- /dev/null Sat Feb 5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-83-fixsalt.patch Sat Feb 5 04:15:16 2011
@@ -0,0 +1,12 @@
+diff -up ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c.fixsalt ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c
+--- ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c.fixsalt 2009-10-20 20:49:55.000000000 +0200
++++ ecryptfs-utils-83/src/key_mod/ecryptfs_key_mod_passphrase.c 2010-04-14 16:18:43.273398808 +0200
+@@ -105,7 +105,7 @@ static int tf_pass_file(struct ecryptfs_
+ out:
+ free(node->val);
+ node->val = NULL;
+- return rc;
++ return rc ? rc : DEFAULT_TOK;
+ }
+
+ static int tf_salt(struct ecryptfs_ctx *ctx, struct param_node *node,
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch:1.1
--- /dev/null Sat Feb 5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-83-splitnss.patch Sat Feb 5 04:15:16 2011
@@ -0,0 +1,86 @@
+diff -up ecryptfs-utils-83/src/libecryptfs/key_management.c.splitnss ecryptfs-utils-83/src/libecryptfs/key_management.c
+--- ecryptfs-utils-83/src/libecryptfs/key_management.c.splitnss 2010-02-16 17:59:21.000000000 +0100
++++ ecryptfs-utils-83/src/libecryptfs/key_management.c 2010-05-04 11:08:19.875872481 +0200
+@@ -133,28 +133,8 @@ out:
+ }
+
+
+-int ecryptfs_remove_auth_tok_from_keyring(char *auth_tok_sig)
+-{
+- int rc;
++#include "key_management.inc.c"
+
+- rc = (int)keyctl_search(KEY_SPEC_USER_KEYRING, "user", auth_tok_sig, 0);
+- if (rc < 0) {
+- rc = errno;
+- syslog(LOG_ERR, "Failed to find key with sig [%s]: %m\n",
+- auth_tok_sig);
+- goto out;
+- }
+- rc = keyctl_unlink(rc, KEY_SPEC_USER_KEYRING);
+- if (rc < 0) {
+- rc = errno;
+- syslog(LOG_ERR, "Failed to unlink key with sig [%s]: %s\n",
+- auth_tok_sig, strerror(rc));
+- goto out;
+- }
+- rc = 0;
+-out:
+- return rc;
+-}
+ int ecryptfs_add_auth_tok_to_keyring(struct ecryptfs_auth_tok *auth_tok,
+ char *auth_tok_sig)
+ {
+diff -up ecryptfs-utils-83/src/libecryptfs/key_management.inc.c.splitnss ecryptfs-utils-83/src/libecryptfs/key_management.inc.c
+--- ecryptfs-utils-83/src/libecryptfs/key_management.inc.c.splitnss 2010-05-04 11:08:19.875872481 +0200
++++ ecryptfs-utils-83/src/libecryptfs/key_management.inc.c 2010-05-04 11:08:19.875872481 +0200
+@@ -0,0 +1,22 @@
++int ecryptfs_remove_auth_tok_from_keyring(char *auth_tok_sig)
++{
++ int rc;
++
++ rc = (int)keyctl_search(KEY_SPEC_USER_KEYRING, "user", auth_tok_sig, 0);
++ if (rc < 0) {
++ rc = errno;
++ syslog(LOG_ERR, "Failed to find key with sig [%s]: %m\n",
++ auth_tok_sig);
++ goto out;
++ }
++ rc = keyctl_unlink(rc, KEY_SPEC_USER_KEYRING);
++ if (rc < 0) {
++ rc = errno;
++ syslog(LOG_ERR, "Failed to unlink key with sig [%s]: %s\n",
++ auth_tok_sig, strerror(rc));
++ goto out;
++ }
++ rc = 0;
++out:
++ return rc;
++}
+diff -up ecryptfs-utils-83/src/utils/Makefile.am.splitnss ecryptfs-utils-83/src/utils/Makefile.am
+--- ecryptfs-utils-83/src/utils/Makefile.am.splitnss 2010-05-04 11:09:05.176554494 +0200
++++ ecryptfs-utils-83/src/utils/Makefile.am 2010-05-04 11:09:05.200991500 +0200
+@@ -36,7 +36,7 @@ mount_ecryptfs_CFLAGS = $(AM_CFLAGS) $(K
+ mount_ecryptfs_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la $(KEYUTILS_LIBS) $(LIBGCRYPT_LIBS)
+ umount_ecryptfs_SOURCES = umount.ecryptfs.c
+ umount_ecryptfs_CFLAGS = $(AM_CFLAGS) $(KEYUTILS_CFLAGS)
+-umount_ecryptfs_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la
++umount_ecryptfs_LDADD = -lkeyutils
+ ecryptfs_manager_SOURCES = manager.c io.c io.h gen_key.c
+ ecryptfs_manager_CFLAGS = $(AM_CFLAGS) $(KEYUTILS_CFLAGS) $(LIBGCRYPT_CFLAGS)
+ ecryptfs_manager_LDADD = $(top_builddir)/src/libecryptfs/libecryptfs.la $(KEYUTILS_LIBS) $(LIBGCRYPT_LIBS)
+diff -up ecryptfs-utils-83/src/utils/umount.ecryptfs.c.splitnss ecryptfs-utils-83/src/utils/umount.ecryptfs.c
+--- ecryptfs-utils-83/src/utils/umount.ecryptfs.c.splitnss 2009-10-20 20:49:55.000000000 +0200
++++ ecryptfs-utils-83/src/utils/umount.ecryptfs.c 2010-05-04 11:08:19.893867192 +0200
+@@ -24,7 +24,10 @@
+ #include <stdlib.h>
+ #include <string.h>
+ #include <unistd.h>
+-#include "ecryptfs.h"
++#include <keyutils.h>
++#include <syslog.h>
++
++#include "../libecryptfs/key_management.inc.c"
+
+ static void usage()
+ {
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch:1.1
--- /dev/null Sat Feb 5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-84-fgetc.patch Sat Feb 5 04:15:16 2011
@@ -0,0 +1,13 @@
+diff -up ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c
+--- ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc 2011-01-11 10:44:20.000000000 +0100
++++ ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c 2011-01-11 10:44:32.000000000 +0100
+@@ -88,7 +88,8 @@ char *fetch_sig(char *pw_dir, int entry)
+ /* Read ecryptfs signature from file and validate
+ * Return signature as a string, or NULL on failure
+ */
+- char *sig_file, c;
++ char *sig_file;
++ int c;
+ FILE *fh;
+ char *sig;
+ int i;
================================================================
Index: packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch
diff -u /dev/null packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch:1.1
--- /dev/null Sat Feb 5 04:15:23 2011
+++ packages/ecryptfs-utils/ecryptfs-utils-84-fixsigness.patch Sat Feb 5 04:15:16 2011
@@ -0,0 +1,21 @@
+diff -up ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.fixsigness ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
+--- ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.fixsigness 2011-01-04 14:15:58.711761181 +0100
++++ ecryptfs-utils-84/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c 2011-01-04 14:15:58.744761153 +0100
+@@ -1144,7 +1144,7 @@ static int tf_pkcs11h_key_x509file(struc
+ goto out;
+ }
+
+- if ((subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, NULL)) < 0 ) {
++ if ((ssize_t)(subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, NULL)) < 0 ) {
+ syslog(LOG_ERR, "PKCS#11: Cannot read decode certificate");
+ rc = -EIO;
+ goto out;
+@@ -1165,7 +1165,7 @@ static int tf_pkcs11h_key_x509file(struc
+ */
+ p = subgraph_key_ctx->pkcs11h_data.certificate_blob;
+
+- if ((subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, &p)) < 0) {
++ if ((ssize_t)(subgraph_key_ctx->pkcs11h_data.certificate_blob_size = i2d_X509 (x509, &p)) < 0) {
+ syslog(LOG_ERR, "PKCS#11: Cannot read decode certificate");
+ goto out;
+ }
================================================================
---- CVS-web:
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/ecryptfs-utils/ecryptfs-utils.spec?r1=1.20&r2=1.21&f=u
More information about the pld-cvs-commit
mailing list