Date: Monday, November 14, 2022 @ 23:35:04
  Author: kpcyrd
Revision: 1348343

archrelease: copy trunk to community-x86_64

Added:
  ecryptfs-utils/repos/community-x86_64/PKGBUILD
    (from rev 1348342, ecryptfs-utils/trunk/PKGBUILD)
  ecryptfs-utils/repos/community-x86_64/keys/
  ecryptfs-utils/repos/community-x86_64/openssl-1.1.x.patch
    (from rev 1348342, ecryptfs-utils/trunk/openssl-1.1.x.patch)
Deleted:
  ecryptfs-utils/repos/community-x86_64/PKGBUILD
  ecryptfs-utils/repos/community-x86_64/keys/
  ecryptfs-utils/repos/community-x86_64/openssl-1.1.x.patch

---------------------+
 PKGBUILD            |   79 +++++++++++++------------
 openssl-1.1.x.patch |  152 +++++++++++++++++++++++++-------------------------
 2 files changed, 117 insertions(+), 114 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2022-11-14 23:34:43 UTC (rev 1348342)
+++ PKGBUILD    2022-11-14 23:35:04 UTC (rev 1348343)
@@ -1,38 +0,0 @@
-# Maintainer: Timothy Redaelli <[email protected]>
-# Contributor: Richard Murri <[email protected]>
-# Contributor: Michal Krenek <[email protected]>
-
-pkgname=ecryptfs-utils
-pkgver=111
-pkgrel=6
-arch=('x86_64')
-pkgdesc="Enterprise-class stacked cryptographic filesystem for Linux"
-url="https://launchpad.net/ecryptfs";
-license=('GPL')
-makedepends=('intltool' 'gettext')
-depends=('nss' 'pam')
-source=("https://launchpad.net/ecryptfs/trunk/${pkgver}/+download/${pkgname}_${pkgver}.orig.tar.gz";
-        
"${pkgname}_${pkgver}.orig.tar.gz.sig::https://launchpad.net/ecryptfs/trunk/${pkgver}/+download/..-${pkgname}_${pkgver}.orig.tar.gz.asc";
-        "openssl-1.1.x.patch")
-md5sums=('83513228984f671930752c3518cac6fd'
-         'SKIP'
-         'bc69f5adcd397220bb8575252486c69f')
-validpgpkeys=('E2D9E1C5F9F5D59291F4607D95E64373F1529469')
-
-prepare() {
-  cd ${pkgname}-${pkgver}
-  patch -Np0 -i "${srcdir}"/openssl-1.1.x.patch
-}
-
-build() {
-  cd ${pkgname}-${pkgver}
-  ./configure --prefix=/usr --with-pamdir=/usr/lib/security \
-              --disable-pywrap
-  make
-}
-
-package() {
-  cd ${pkgname}-${pkgver}
-  make DESTDIR="${pkgdir}"/ rootsbindir='/usr/bin' install
-  chmod +s "${pkgdir}"/usr/bin/mount.ecryptfs_private
-}

Copied: ecryptfs-utils/repos/community-x86_64/PKGBUILD (from rev 1348342, 
ecryptfs-utils/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2022-11-14 23:35:04 UTC (rev 1348343)
@@ -0,0 +1,41 @@
+# Maintainer: Timothy Redaelli <[email protected]>
+# Contributor: Richard Murri <[email protected]>
+# Contributor: Michal Krenek <[email protected]>
+
+pkgname=ecryptfs-utils
+pkgver=111
+pkgrel=7
+arch=('x86_64')
+pkgdesc="Enterprise-class stacked cryptographic filesystem for Linux"
+url="https://launchpad.net/ecryptfs";
+license=('GPL')
+makedepends=('intltool' 'gettext')
+depends=('nss' 'pam')
+source=("https://launchpad.net/ecryptfs/trunk/${pkgver}/+download/${pkgname}_${pkgver}.orig.tar.gz";
+        
"${pkgname}_${pkgver}.orig.tar.gz.sig::https://launchpad.net/ecryptfs/trunk/${pkgver}/+download/..-${pkgname}_${pkgver}.orig.tar.gz.asc";
+        "openssl-1.1.x.patch")
+md5sums=('83513228984f671930752c3518cac6fd'
+         'SKIP'
+         'bc69f5adcd397220bb8575252486c69f')
+sha256sums=('112cb3e37e81a1ecd8e39516725dec0ce55c5f3df6284e0f4cc0f118750a987f'
+            'SKIP'
+            '73d3689e51e57a03f8de66bfdb4a4c4fcc7f1c233895a7a576df6da7f64366d6')
+validpgpkeys=('E2D9E1C5F9F5D59291F4607D95E64373F1529469')
+
+prepare() {
+  cd ${pkgname}-${pkgver}
+  patch -Np0 -i "${srcdir}"/openssl-1.1.x.patch
+}
+
+build() {
+  cd ${pkgname}-${pkgver}
+  ./configure --prefix=/usr --with-pamdir=/usr/lib/security \
+              --disable-pywrap
+  make
+}
+
+package() {
+  cd ${pkgname}-${pkgver}
+  make DESTDIR="${pkgdir}"/ rootsbindir='/usr/bin' install
+  chmod +s "${pkgdir}"/usr/bin/mount.ecryptfs_private
+}

Deleted: openssl-1.1.x.patch
===================================================================
--- openssl-1.1.x.patch 2022-11-14 23:34:43 UTC (rev 1348342)
+++ openssl-1.1.x.patch 2022-11-14 23:35:04 UTC (rev 1348343)
@@ -1,76 +0,0 @@
-=== modified file 'src/key_mod/ecryptfs_key_mod_openssl.c'
---- src/key_mod/ecryptfs_key_mod_openssl.c     2013-10-25 19:45:09 +0000
-+++ src/key_mod/ecryptfs_key_mod_openssl.c     2017-03-13 20:34:27 +0000
-@@ -50,6 +50,20 @@
- #include "../include/ecryptfs.h"
- #include "../include/decision_graph.h"
- 
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
-+void RSA_get0_key(const RSA *r,
-+                 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
-+{
-+   if (n != NULL)
-+       *n = r->n;
-+   if (e != NULL)
-+       *e = r->e;
-+   if (d != NULL)
-+       *d = r->d;
-+}
-+#endif
-+
-+
- struct openssl_data {
-       char *path;
-       char *passphrase;
-@@ -142,6 +156,7 @@
- {
-       int len, nbits, ebits, i;
-       int nbytes, ebytes;
-+      const BIGNUM *key_n, *key_e;
-       unsigned char *hash;
-       unsigned char *data = NULL;
-       int rc = 0;
-@@ -152,11 +167,13 @@
-               rc = -ENOMEM;
-               goto out;
-       }
--      nbits = BN_num_bits(key->n);
-+      RSA_get0_key(key, &key_n, NULL, NULL);
-+      nbits = BN_num_bits(key_n);
-       nbytes = nbits / 8;
-       if (nbits % 8)
-               nbytes++;
--      ebits = BN_num_bits(key->e);
-+      RSA_get0_key(key, NULL, &key_e, NULL);
-+      ebits = BN_num_bits(key_e);
-       ebytes = ebits / 8;
-       if (ebits % 8)
-               ebytes++;
-@@ -179,11 +196,13 @@
-       data[i++] = '\02';
-       data[i++] = (nbits >> 8);
-       data[i++] = nbits;
--      BN_bn2bin(key->n, &(data[i]));
-+      RSA_get0_key(key, &key_n, NULL, NULL);
-+      BN_bn2bin(key_n, &(data[i]));
-       i += nbytes;
-       data[i++] = (ebits >> 8);
-       data[i++] = ebits;
--      BN_bn2bin(key->e, &(data[i]));
-+      RSA_get0_key(key, NULL, &key_e, NULL);
-+      BN_bn2bin(key_e, &(data[i]));
-       i += ebytes;
-       SHA1(data, len + 3, hash);
-       to_hex(sig, (char *)hash, ECRYPTFS_SIG_SIZE);
-@@ -278,7 +297,9 @@
-       BIO *in = NULL;
-       int rc;
- 
-+      #if OPENSSL_VERSION_NUMBER < 0x10100000L
-       CRYPTO_malloc_init();
-+      #endif
-       ERR_load_crypto_strings();
-       OpenSSL_add_all_algorithms();
-       ENGINE_load_builtin_engines();
-
-

Copied: ecryptfs-utils/repos/community-x86_64/openssl-1.1.x.patch (from rev 
1348342, ecryptfs-utils/trunk/openssl-1.1.x.patch)
===================================================================
--- openssl-1.1.x.patch                         (rev 0)
+++ openssl-1.1.x.patch 2022-11-14 23:35:04 UTC (rev 1348343)
@@ -0,0 +1,76 @@
+=== modified file 'src/key_mod/ecryptfs_key_mod_openssl.c'
+--- src/key_mod/ecryptfs_key_mod_openssl.c     2013-10-25 19:45:09 +0000
++++ src/key_mod/ecryptfs_key_mod_openssl.c     2017-03-13 20:34:27 +0000
+@@ -50,6 +50,20 @@
+ #include "../include/ecryptfs.h"
+ #include "../include/decision_graph.h"
+ 
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
++void RSA_get0_key(const RSA *r,
++                 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
++{
++   if (n != NULL)
++       *n = r->n;
++   if (e != NULL)
++       *e = r->e;
++   if (d != NULL)
++       *d = r->d;
++}
++#endif
++
++
+ struct openssl_data {
+       char *path;
+       char *passphrase;
+@@ -142,6 +156,7 @@
+ {
+       int len, nbits, ebits, i;
+       int nbytes, ebytes;
++      const BIGNUM *key_n, *key_e;
+       unsigned char *hash;
+       unsigned char *data = NULL;
+       int rc = 0;
+@@ -152,11 +167,13 @@
+               rc = -ENOMEM;
+               goto out;
+       }
+-      nbits = BN_num_bits(key->n);
++      RSA_get0_key(key, &key_n, NULL, NULL);
++      nbits = BN_num_bits(key_n);
+       nbytes = nbits / 8;
+       if (nbits % 8)
+               nbytes++;
+-      ebits = BN_num_bits(key->e);
++      RSA_get0_key(key, NULL, &key_e, NULL);
++      ebits = BN_num_bits(key_e);
+       ebytes = ebits / 8;
+       if (ebits % 8)
+               ebytes++;
+@@ -179,11 +196,13 @@
+       data[i++] = '\02';
+       data[i++] = (nbits >> 8);
+       data[i++] = nbits;
+-      BN_bn2bin(key->n, &(data[i]));
++      RSA_get0_key(key, &key_n, NULL, NULL);
++      BN_bn2bin(key_n, &(data[i]));
+       i += nbytes;
+       data[i++] = (ebits >> 8);
+       data[i++] = ebits;
+-      BN_bn2bin(key->e, &(data[i]));
++      RSA_get0_key(key, NULL, &key_e, NULL);
++      BN_bn2bin(key_e, &(data[i]));
+       i += ebytes;
+       SHA1(data, len + 3, hash);
+       to_hex(sig, (char *)hash, ECRYPTFS_SIG_SIZE);
+@@ -278,7 +297,9 @@
+       BIO *in = NULL;
+       int rc;
+ 
++      #if OPENSSL_VERSION_NUMBER < 0x10100000L
+       CRYPTO_malloc_init();
++      #endif
+       ERR_load_crypto_strings();
+       OpenSSL_add_all_algorithms();
+       ENGINE_load_builtin_engines();
+
+

Reply via email to