[packages/ecryptfs-utils] - updated to 104 (note: new soname) - removed obsolete fgetc,werror patches

qboosh qboosh at pld-linux.org
Sun Dec 7 12:45:15 CET 2014


commit ee8aac860671bc040ea7e33090de95449db2434a
Author: Jakub Bogusz <qboosh at pld-linux.org>
Date:   Sun Dec 7 12:45:38 2014 +0100

    - updated to 104 (note: new soname)
    - removed obsolete fgetc,werror patches

 ecryptfs-utils-75-werror.patch | 291 -----------------------------------------
 ecryptfs-utils-84-fgetc.patch  |  13 --
 ecryptfs-utils.spec            |  29 ++--
 3 files changed, 16 insertions(+), 317 deletions(-)
---
diff --git a/ecryptfs-utils.spec b/ecryptfs-utils.spec
index d42ce5c..b213af2 100644
--- a/ecryptfs-utils.spec
+++ b/ecryptfs-utils.spec
@@ -1,24 +1,28 @@
+#
+# Conditional build:
+%bcond_with	gui	# GTK+ GUI components (non-existing as of 104)
+#
 Summary:	The eCryptfs mount helper and support libraries
 Summary(pl.UTF-8):	Narzędzie pomocnicze i biblioteki do montowania eCryptfs
 Name:		ecryptfs-utils
-Version:	85
-Release:	4
+Version:	104
+Release:	1
 License:	GPL v2+
 Group:		Base
-Source0:	http://launchpad.net/ecryptfs/trunk/%{version}/+download/%{name}_%{version}.orig.tar.gz
-# Source0-md5:	eacf9488681d99651da544a4c261f784
+#Source0Download: https://launchpad.net/ecryptfs/+download
+Source0:	https://launchpad.net/ecryptfs/trunk/%{version}/+download/%{name}_%{version}.orig.tar.gz
+# Source0-md5:	6ae93822bcf0d15470516c30a3deee32
 Patch0:		%{name}-sh.patch
 Patch1:		%{name}-83-fixsalt.patch
 Patch2:		%{name}-83-splitnss.patch
-Patch3:		%{name}-84-fgetc.patch
-Patch4:		%{name}-84-fixsigness.patch
-Patch5:		%{name}-75-werror.patch
-URL:		http://ecryptfs.sourceforge.net/
+Patch3:		%{name}-84-fixsigness.patch
+URL:		http://ecryptfs.org/
 BuildRequires:	autoconf >= 2.59
 BuildRequires:	automake
 BuildRequires:	gettext-devel
-BuildRequires:	glib2-devel
+BuildRequires:	glib2-devel >= 2.0
 BuildRequires:	gpgme-devel
+%{?with_gui:BuildRequires:	gtk+2-devel >= 2.0}
 BuildRequires:	intltool >= 0.41.0
 BuildRequires:	keyutils-devel >= 1.0
 BuildRequires:	libtool
@@ -33,6 +37,7 @@ BuildRequires:	python-modules
 BuildRequires:	rpm-pythonprov
 BuildRequires:	rpmbuild(macros) >= 1.219
 BuildRequires:	swig >= 1.3.31
+BuildRequires:	swig-python >= 1.3.31
 BuildRequires:	trousers-devel
 Requires:	uname(release) >= 2.6.19
 BuildRoot:	%{tmpdir}/%{name}-%{version}-root-%(id -u -n)
@@ -117,8 +122,6 @@ ecryptfs-utils.
 %patch1 -p1
 %patch2 -p1
 %patch3 -p1
-%patch4 -p1
-%patch5 -p1
 
 %build
 %{__libtoolize}
@@ -128,6 +131,7 @@ ecryptfs-utils.
 %{__automake}
 %configure \
 	--enable-gpg \
+	%{?with_gui:--enable-gui} \
 	--enable-nss \
 	--enable-openssl \
 	--enable-pam \
@@ -172,7 +176,7 @@ fi
 %attr(755,root,root) %{_bindir}/ecryptfs-*
 %attr(755,root,root) %{_bindir}/ecryptfsd
 %attr(755,root,root) %{_libdir}/libecryptfs.so.*.*.*
-%attr(755,root,root) %ghost %{_libdir}/libecryptfs.so.0
+%attr(755,root,root) %ghost %{_libdir}/libecryptfs.so.1
 %dir %{_libdir}/ecryptfs
 %attr(755,root,root) %{_libdir}/ecryptfs/libecryptfs_key_mod_gpg.so
 %attr(755,root,root) %{_libdir}/ecryptfs/libecryptfs_key_mod_openssl.so
@@ -202,7 +206,6 @@ fi
 
 %files -n pam-pam_ecryptfs
 %defattr(644,root,root,755)
-%doc doc/ecryptfs-pam-doc.txt
 %attr(755,root,root) /%{_lib}/security/pam_ecryptfs.so
 %{_mandir}/man8/pam_ecryptfs.8*
 
diff --git a/ecryptfs-utils-75-werror.patch b/ecryptfs-utils-75-werror.patch
deleted file mode 100644
index 54fb587..0000000
--- a/ecryptfs-utils-75-werror.patch
+++ /dev/null
@@ -1,291 +0,0 @@
-diff -up ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
---- ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror	2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-85/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c	2011-02-01 11:12:14.813646937 +0100
-@@ -86,7 +86,7 @@ static int ecryptfs_pkcs11h_deserialize(
- 		pkcs11h_data->serialized_id = NULL;
- 	}
- 	else {
--		pkcs11h_data->serialized_id = blob + i;
-+		pkcs11h_data->serialized_id = (char *)blob + i;
- 		i += serialized_id_length;
- 	}
- 	pkcs11h_data->certificate_blob_size = blob[i++] % 256;
-@@ -104,12 +104,11 @@ static int ecryptfs_pkcs11h_deserialize(
- 		pkcs11h_data->passphrase = NULL;
- 	}
- 	else {
--		pkcs11h_data->passphrase = blob + i;
-+		pkcs11h_data->passphrase = (char *)blob + i;
- 		i += passphrase_length;
- 	}
- 
- 	rc = 0;
--out:
- 	return rc;
- }
- 
-@@ -346,14 +345,14 @@ static int ecryptfs_pkcs11h_get_key_sig(
- 	data[i++] = '\02';
- 	data[i++] = (char)(nbits >> 8);
- 	data[i++] = (char)nbits;
--	BN_bn2bin(rsa->n, &(data[i]));
-+	BN_bn2bin(rsa->n, (unsigned char *)&(data[i]));
- 	i += nbytes;
- 	data[i++] = (char)(ebits >> 8);
- 	data[i++] = (char)ebits;
--	BN_bn2bin(rsa->e, &(data[i]));
-+	BN_bn2bin(rsa->e, (unsigned char *)&(data[i]));
- 	i += ebytes;
--	SHA1(data, len + 3, hash);
--	to_hex(sig, hash, ECRYPTFS_SIG_SIZE);
-+	SHA1((unsigned char *)data, len + 3, (unsigned char *)hash);
-+	to_hex((char *)sig, hash, ECRYPTFS_SIG_SIZE);
- 	sig[ECRYPTFS_SIG_SIZE_HEX] = '\0';
- 
- 	rc = 0;
-@@ -411,8 +410,8 @@ static int ecryptfs_pkcs11h_encrypt(char
- 		if (
- 			(rc = RSA_public_encrypt(
- 				from_size,
--				from,
--				to,
-+				(unsigned char *)from,
-+				(unsigned char *)to,
- 				rsa,
- 				RSA_PKCS1_PADDING
- 			)) == -1
-@@ -506,9 +505,9 @@ static int ecryptfs_pkcs11h_decrypt(char
- 		(rv = pkcs11h_certificate_decryptAny (
- 			certificate,
- 			CKM_RSA_PKCS,
--			from,
-+			(unsigned char *)from,
- 			from_size,
--			to,
-+			(unsigned char *)to,
- 			to_size
- 		)) != CKR_OK
- 	) {
-@@ -534,9 +533,9 @@ static int ecryptfs_pkcs11h_decrypt(char
- 		pkcs11h_certificate_decryptAny (
- 			certificate,
- 			CKM_RSA_PKCS,
--			from,
-+			(unsigned char *)from,
- 			from_size,
--			tmp,
-+			(unsigned char *)tmp,
- 			to_size
- 		);
- 
-@@ -851,7 +850,7 @@ static int ecryptfs_pkcs11h_process_key(
- 		rc = MOUNT_ERROR;
- 		goto out;
- 	}
--	if ((rc = ecryptfs_pkcs11h_serialize(subgraph_key_ctx->key_mod->blob,
-+	if ((rc = ecryptfs_pkcs11h_serialize((unsigned char *)subgraph_key_ctx->key_mod->blob,
- 					     &subgraph_key_ctx->key_mod->blob_size, 
- 					     pkcs11h_data))) {
- 		syslog(LOG_ERR, "PKCS#11: Error serializing pkcs11; rc=[%d]\n", rc);
-@@ -930,7 +929,7 @@ static int tf_pkcs11h_global_loglevel(st
- 
- 	rc = DEFAULT_TOK;
- 	node->val = NULL;
--out:
-+// out:
- 	return rc;
- }
- 
-@@ -943,7 +942,7 @@ static int tf_pkcs11h_global_pincache(st
- 
- 	rc = DEFAULT_TOK;
- 	node->val = NULL;
--out:
-+// out:
- 	return rc;
- }
- 
-@@ -1013,7 +1012,7 @@ static int tf_pkcs11h_provider_prot_auth
- 	sscanf (node->val, "%x", &subgraph_provider_ctx->allow_protected_authentication);
- 	rc = DEFAULT_TOK;
- 	node->val = NULL;
--out:
-+
- 	return rc;
- }
- 
-@@ -1027,7 +1026,7 @@ static int tf_pkcs11h_provider_cert_priv
- 	sscanf (node->val, "%x", &subgraph_provider_ctx->certificate_is_private);
- 	rc = DEFAULT_TOK;
- 	node->val = NULL;
--out:
-+
- 	return rc;
- }
- 
-@@ -1042,7 +1041,7 @@ static int tf_pkcs11h_provider_private_m
- 
- 	rc = DEFAULT_TOK;
- 	node->val = NULL;
--out:
-+
- 	return rc;
- }
- 
-@@ -1073,7 +1072,7 @@ static int tf_pkcs11h_provider_end(struc
- 	free(subgraph_provider_ctx);
- 	*foo = NULL;
- 	rc = DEFAULT_TOK;
--out:
-+
- 	return rc;
- }
- 
-@@ -1120,7 +1119,7 @@ static int tf_pkcs11h_key_x509file(struc
- 	X509 *x509 = NULL;
- 	unsigned char *p = NULL;
- 	FILE *fp = NULL;
--	int rc;
-+	int rc = 0;
- 
- 	subgraph_key_ctx = (struct pkcs11h_subgraph_key_ctx *)(*foo);
- 
-diff -up ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c
---- ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c.werror	2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-85/src/libecryptfs/ecryptfs-stat.c	2011-02-01 11:12:14.813646937 +0100
-@@ -146,7 +146,7 @@ int ecryptfs_parse_stat(struct ecryptfs_
- 	if (buf_size < (ECRYPTFS_FILE_SIZE_BYTES
- 			+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
- 			+ 4)) {
--		printf("%s: Invalid metadata size; must have at least [%lu] "
-+		printf("%s: Invalid metadata size; must have at least [%zu] "
- 		       "bytes; there are only [%zu] bytes\n", __FUNCTION__,
- 		       (ECRYPTFS_FILE_SIZE_BYTES
- 			+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
-diff -up ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c.werror	2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-85/src/pam_ecryptfs/pam_ecryptfs.c	2011-02-01 11:12:18.061664154 +0100
-@@ -43,31 +43,6 @@
- 
- #define PRIVATE_DIR "Private"
- 
--static void error(const char *msg)
--{
--	syslog(LOG_ERR, "errno = [%i]; strerror = [%m]\n", errno);
--	switch (errno) {
--	case ENOKEY:
--		syslog(LOG_ERR, "%s: Requested key not available\n", msg);
--		return;
--
--	case EKEYEXPIRED:
--		syslog(LOG_ERR, "%s: Key has expired\n", msg);
--		return;
--
--	case EKEYREVOKED:
--		syslog(LOG_ERR, "%s: Key has been revoked\n", msg);
--		return;
--
--	case EKEYREJECTED:
--		syslog(LOG_ERR, "%s: Key was rejected by service\n", msg);
--		return;
--	default:
--		syslog(LOG_ERR, "%s: Unknown key error\n", msg);
--		return;
--	}
--}
--
- /* returns: 0 for pam automounting not set, 1 for set, <0 for error */
- static int ecryptfs_pam_automount_set(const char *homedir)
- {
-@@ -87,7 +62,7 @@ out:
- 	return rc;
- }
- 
--static int wrap_passphrase_if_necessary(char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
-+static int wrap_passphrase_if_necessary(const char *username, uid_t uid, char *wrapped_pw_filename, char *passphrase, char *salt)
- {
- 	char *unwrapped_pw_filename = NULL;
- 	struct stat s;
-@@ -198,8 +173,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
- 		if ((argc == 1)
- 		    && (memcmp(argv[0], "unwrap\0", 7) == 0)) {
- 			char *wrapped_pw_filename;
--			char *unwrapped_pw_filename;
--			struct stat s;
- 
- 			rc = asprintf(
- 				&wrapped_pw_filename, "%s/.ecryptfs/%s",
-@@ -291,8 +264,6 @@ static int private_dir(pam_handle_t *pam
- 	char *autoumount = "auto-umount";
- 	struct stat s;
- 	pid_t pid;
--	struct utmp *u;
--	int count = 0;
- 
- 	if ((pwd = fetch_pwd(pamh)) == NULL) {
- 		/* fetch_pwd() logged a message */
-@@ -339,7 +310,7 @@ static int private_dir(pam_handle_t *pam
- 			if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
- 				/* User has not recorded their passphrase */
- 				unlink("/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
--				symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
-+				rc=symlink("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", "/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
- 				fd = open("/var/lib/update-notifier/dpkg-run-stamp", O_WRONLY|O_CREAT|O_NONBLOCK, 0666);
- 				close(fd);
- 			}
-@@ -410,7 +381,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
- 	char *old_passphrase = NULL;
- 	char *new_passphrase = NULL;
- 	char *wrapped_pw_filename;
--	char *name = NULL;
-+// 	char *name = NULL;
- 	char salt[ECRYPTFS_SALT_SIZE];
- 	char salt_hex[ECRYPTFS_SALT_SIZE_HEX];
- 	pid_t child_pid, tmp_pid;
-@@ -424,11 +395,11 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
- 		if (pwd) {
- 			uid = pwd->pw_uid;
- 			homedir = pwd->pw_dir;
--			name = pwd->pw_name;
-+// 			name = pwd->pw_name;
- 		}
- 	} else {
- 		syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
--		       "rc = [%ld]\n", username, rc);
-+		       "rc = [%d]\n", username, rc);
- 		goto out;
- 	}
- 	saved_uid = geteuid();
-diff -up ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-85/src/utils/mount.ecryptfs.c
---- ecryptfs-utils-85/src/utils/mount.ecryptfs.c.werror	2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-85/src/utils/mount.ecryptfs.c	2011-02-01 11:12:14.818646964 +0100
-@@ -461,7 +461,7 @@ static int ecryptfs_do_mount(int argc, c
- {
- 	int rc;
- 	int flags = 0;
--	int num_opts = 0;
-+// 	int num_opts = 0;
- 	char *src = NULL, *targ = NULL, *opts = NULL, *new_opts = NULL, *temp;
- 	char *val;
- 
-@@ -472,7 +472,7 @@ static int ecryptfs_do_mount(int argc, c
- 	rc = strip_userland_opts(opts);
- 	if (rc)
- 		goto out;
--	num_opts = ecryptfs_generate_mount_flags(opts, &flags);
-+	ecryptfs_generate_mount_flags(opts, &flags);
- 	if (!(temp = strdup("ecryptfs_unlink_sigs"))) {
- 		rc = -ENOMEM;
- 		goto out;
-diff -up ecryptfs-utils-85/src/utils/test.c.werror ecryptfs-utils-85/src/utils/test.c
---- ecryptfs-utils-85/src/utils/test.c.werror	2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-85/src/utils/test.c	2011-02-01 11:12:14.818646964 +0100
-@@ -281,7 +281,7 @@ int ecryptfs_encrypt_page(int page_cache
- 	struct inode *lower_inode;
- 	struct ecryptfs_crypt_stat *crypt_stat;
- 	int rc = 0;
--	int lower_byte_offset;
-+	int lower_byte_offset = 0;
- 	int orig_byte_offset = 0;
- 	int num_extents_per_page;
- #define ECRYPTFS_PAGE_STATE_UNREAD    0
diff --git a/ecryptfs-utils-84-fgetc.patch b/ecryptfs-utils-84-fgetc.patch
deleted file mode 100644
index 9a6a4b4..0000000
--- a/ecryptfs-utils-84-fgetc.patch
+++ /dev/null
@@ -1,13 +0,0 @@
-diff -up ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c
---- ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c.fgetc	2011-01-11 10:44:20.000000000 +0100
-+++ ecryptfs-utils-84/src/utils/mount.ecryptfs_private.c	2011-01-11 10:44:32.000000000 +0100
-@@ -88,7 +88,8 @@ char *fetch_sig(char *pw_dir, int entry)
- /* Read ecryptfs signature from file and validate
-  * Return signature as a string, or NULL on failure
-  */
--	char *sig_file, c;
-+	char *sig_file;
-+	int c;
- 	FILE *fh;
- 	char *sig;
- 	int i;
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/ecryptfs-utils.git/commitdiff/ee8aac860671bc040ea7e33090de95449db2434a



More information about the pld-cvs-commit mailing list