summaryrefslogtreecommitdiffstats
path: root/security/gnome-keyring/files
diff options
context:
space:
mode:
authorkwm <kwm@df743ca5-7f9a-e211-a948-0013205c9059>2010-09-04 18:54:57 +0800
committerkwm <kwm@df743ca5-7f9a-e211-a948-0013205c9059>2010-09-04 18:54:57 +0800
commitd983f701c8dd1d017c22a7c8dbed7b49a7cef09a (patch)
tree261b25a58c02806c956c99d7a22e08499505b3f7 /security/gnome-keyring/files
parentd3aaafca3af6f7891dc3d53cb6bc09a21786d74e (diff)
downloadmarcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.gz
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.bz2
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.lz
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.xz
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.zst
marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.zip
Update to 2.31.91.
Depend on security/ca_root_nss for gnome-keyring Root Certificates support. git-svn-id: svn://creme-brulee.marcuscom.com/ports/trunk@14545 df743ca5-7f9a-e211-a948-0013205c9059
Diffstat (limited to 'security/gnome-keyring/files')
-rw-r--r--security/gnome-keyring/files/patch-configure11
-rw-r--r--security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c11
-rw-r--r--security/gnome-keyring/files/patch-egg_egg-asn1x.c13
-rw-r--r--security/gnome-keyring/files/patch-egg_egg-unix-credentials.c44
-rw-r--r--security/gnome-keyring/files/patch-gcr_gcr-certificate.c11
-rw-r--r--security/gnome-keyring/files/patch-pam_gkr-pam-client.c18
-rw-r--r--security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c11
7 files changed, 119 insertions, 0 deletions
diff --git a/security/gnome-keyring/files/patch-configure b/security/gnome-keyring/files/patch-configure
new file mode 100644
index 000000000..cfba75e55
--- /dev/null
+++ b/security/gnome-keyring/files/patch-configure
@@ -0,0 +1,11 @@
+--- configure.orig 2010-09-04 12:33:21.000000000 +0200
++++ configure 2010-09-04 12:33:36.000000000 +0200
+@@ -14762,7 +14762,7 @@
+
+ pam_status="no"
+ if test "$enable_pam" != "no"; then
+- for ac_header in security/pam_modules.h pam/pam_modules.h
++ for ac_header in security/pam_modules.h
+ do :
+ as_ac_Header=`$as_echo "ac_cv_header_$ac_header" | $as_tr_sh`
+ ac_fn_c_check_header_mongrel "$LINENO" "$ac_header" "$as_ac_Header" "$ac_includes_default"
diff --git a/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c b/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c
new file mode 100644
index 000000000..6cdb0ca6a
--- /dev/null
+++ b/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c
@@ -0,0 +1,11 @@
+--- daemon/control/gkd-control-client.c.orig 2009-12-21 18:43:16.000000000 -0500
++++ daemon/control/gkd-control-client.c 2009-12-21 18:44:17.000000000 -0500
+@@ -31,6 +31,8 @@
+ #include <errno.h>
+ #include <fcntl.h>
+
++#include <string.h>
++#include <sys/stat.h>
+ #include <sys/socket.h>
+ #include <sys/types.h>
+ #include <sys/un.h>
diff --git a/security/gnome-keyring/files/patch-egg_egg-asn1x.c b/security/gnome-keyring/files/patch-egg_egg-asn1x.c
new file mode 100644
index 000000000..30828f3f6
--- /dev/null
+++ b/security/gnome-keyring/files/patch-egg_egg-asn1x.c
@@ -0,0 +1,13 @@
+--- egg/egg-asn1x.c.orig 2010-09-04 12:08:41.000000000 +0200
++++ egg/egg-asn1x.c 2010-09-04 12:10:05.000000000 +0200
+@@ -1988,8 +1988,8 @@ anode_write_integer_ulong (gulong value,
+ guchar buf[sizeof (gulong)];
+ gint bytes, i, off;
+
+- for (i = 0; i < sizeof (ulong); ++i) {
+- off = sizeof (ulong) - (i + 1);
++ for (i = 0; i < sizeof (gulong); ++i) {
++ off = sizeof (gulong) - (i + 1);
+ buf[i] = (value >> (off * 8)) & 0xFF;
+ }
+
diff --git a/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c b/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c
new file mode 100644
index 000000000..5ae53f8b0
--- /dev/null
+++ b/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c
@@ -0,0 +1,44 @@
+--- egg/egg-unix-credentials.c.orig 2010-01-13 00:21:23.000000000 -0500
++++ egg/egg-unix-credentials.c 2010-01-13 00:25:46.000000000 -0500
+@@ -27,6 +27,7 @@
+
+ #include <sys/types.h>
+ #include <sys/socket.h>
++#include <sys/param.h>
+ #include <sys/uio.h>
+ #include <sys/un.h>
+ #include <errno.h>
+@@ -37,6 +38,33 @@
+ #include <ucred.h>
+ #endif
+
++#if __FreeBSD_version < 701101
++static char *
++strndup (const char *s, size_t n)
++{
++ size_t nAvail;
++ char *p;
++
++ if (s == NULL)
++ return NULL;
++
++ if (memchr (s, '\0', n) != NULL) {
++ nAvail = strlen(s);
++ if (nAvail > n)
++ nAvail = n;
++ } else{
++ nAvail = n;
++ }
++ p = malloc (nAvail + 1);
++ if (p == NULL)
++ return NULL;
++ memcpy (p, s, nAvail);
++ p[nAvail] = '\0';
++
++ return p;
++}
++#endif
++
+ int
+ egg_unix_credentials_read (int sock, pid_t *pid, uid_t *uid)
+ {
diff --git a/security/gnome-keyring/files/patch-gcr_gcr-certificate.c b/security/gnome-keyring/files/patch-gcr_gcr-certificate.c
new file mode 100644
index 000000000..bdf10bf14
--- /dev/null
+++ b/security/gnome-keyring/files/patch-gcr_gcr-certificate.c
@@ -0,0 +1,11 @@
+--- gcr/gcr-certificate.c.orig 2010-09-04 12:04:30.000000000 +0200
++++ gcr/gcr-certificate.c 2010-09-04 12:04:42.000000000 +0200
+@@ -158,7 +158,7 @@ calculate_key_size (GcrCertificateInfo *
+ const guchar *data, *params;
+ gsize n_data, n_params;
+ guint key_size = 0, n_bits;
+- guchar *key;
++ guchar *key = NULL;
+ GQuark oid;
+
+ data = egg_asn1x_get_raw_element (egg_asn1x_node (info->asn1, "tbsCertificate", "subjectPublicKeyInfo", NULL), &n_data);
diff --git a/security/gnome-keyring/files/patch-pam_gkr-pam-client.c b/security/gnome-keyring/files/patch-pam_gkr-pam-client.c
new file mode 100644
index 000000000..05a0306e6
--- /dev/null
+++ b/security/gnome-keyring/files/patch-pam_gkr-pam-client.c
@@ -0,0 +1,18 @@
+--- pam/gkr-pam-client.c.orig 2008-10-07 12:25:23.000000000 -0400
++++ pam/gkr-pam-client.c 2008-10-07 12:38:36.000000000 -0400
+@@ -96,12 +96,12 @@ check_peer_same_uid (int sock)
+ struct xucred xuc;
+ socklen_t xuc_len = sizeof (xuc);
+
+- if (getsockopt (sock, SOL_SOCKET, LOCAL_PEERCRED, &xuc, &xuc_len) == 0 &&
+- xuc_len == sizeof (xuc)) {
++ if (getsockopt (sock, 0, LOCAL_PEERCRED, &xuc, &xuc_len) == 0 &&
++ xuc.cr_version == XUCRED_VERSION) {
+ uid = xuc.cr_uid;
+ } else {
+ syslog (GKR_LOG_ERR, "could not get gnome-keyring-daemon socket credentials, "
+- "(returned len %d/%d)\n", xuc_len, (int)sizeof (xuc));
++ "(returned version %d/%d)\n", xuc.cr_version, XUCRED_VERSION);
+ return -1;
+ }
+
diff --git a/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c b/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c
new file mode 100644
index 000000000..146d8b69d
--- /dev/null
+++ b/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c
@@ -0,0 +1,11 @@
+--- pkcs11/rpc-layer/gkm-rpc-dispatch.c.orig 2010-09-04 12:06:44.000000000 +0200
++++ pkcs11/rpc-layer/gkm-rpc-dispatch.c 2010-09-04 12:07:12.000000000 +0200
+@@ -784,7 +784,7 @@ rpc_C_Finalize (CallState *cs)
+ {
+ CK_SLOT_ID_PTR slots;
+ CK_ULONG n_slots, i;
+- CK_RV ret;
++ CK_RV ret = CKR_OK;
+
+ debug (("C_Finalize: enter"));
+