diff options
author | kwm <kwm@df743ca5-7f9a-e211-a948-0013205c9059> | 2010-09-04 18:54:57 +0800 |
---|---|---|
committer | kwm <kwm@df743ca5-7f9a-e211-a948-0013205c9059> | 2010-09-04 18:54:57 +0800 |
commit | d983f701c8dd1d017c22a7c8dbed7b49a7cef09a (patch) | |
tree | 261b25a58c02806c956c99d7a22e08499505b3f7 /security/gnome-keyring/files | |
parent | d3aaafca3af6f7891dc3d53cb6bc09a21786d74e (diff) | |
download | marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.gz marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.bz2 marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.lz marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.xz marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.tar.zst marcuscom-ports-d983f701c8dd1d017c22a7c8dbed7b49a7cef09a.zip |
Update to 2.31.91.
Depend on security/ca_root_nss for gnome-keyring Root Certificates support.
git-svn-id: svn://creme-brulee.marcuscom.com/ports/trunk@14545 df743ca5-7f9a-e211-a948-0013205c9059
Diffstat (limited to 'security/gnome-keyring/files')
7 files changed, 119 insertions, 0 deletions
diff --git a/security/gnome-keyring/files/patch-configure b/security/gnome-keyring/files/patch-configure new file mode 100644 index 000000000..cfba75e55 --- /dev/null +++ b/security/gnome-keyring/files/patch-configure @@ -0,0 +1,11 @@ +--- configure.orig 2010-09-04 12:33:21.000000000 +0200 ++++ configure 2010-09-04 12:33:36.000000000 +0200 +@@ -14762,7 +14762,7 @@ + + pam_status="no" + if test "$enable_pam" != "no"; then +- for ac_header in security/pam_modules.h pam/pam_modules.h ++ for ac_header in security/pam_modules.h + do : + as_ac_Header=`$as_echo "ac_cv_header_$ac_header" | $as_tr_sh` + ac_fn_c_check_header_mongrel "$LINENO" "$ac_header" "$as_ac_Header" "$ac_includes_default" diff --git a/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c b/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c new file mode 100644 index 000000000..6cdb0ca6a --- /dev/null +++ b/security/gnome-keyring/files/patch-daemon_control_gkd-control-client.c @@ -0,0 +1,11 @@ +--- daemon/control/gkd-control-client.c.orig 2009-12-21 18:43:16.000000000 -0500 ++++ daemon/control/gkd-control-client.c 2009-12-21 18:44:17.000000000 -0500 +@@ -31,6 +31,8 @@ + #include <errno.h> + #include <fcntl.h> + ++#include <string.h> ++#include <sys/stat.h> + #include <sys/socket.h> + #include <sys/types.h> + #include <sys/un.h> diff --git a/security/gnome-keyring/files/patch-egg_egg-asn1x.c b/security/gnome-keyring/files/patch-egg_egg-asn1x.c new file mode 100644 index 000000000..30828f3f6 --- /dev/null +++ b/security/gnome-keyring/files/patch-egg_egg-asn1x.c @@ -0,0 +1,13 @@ +--- egg/egg-asn1x.c.orig 2010-09-04 12:08:41.000000000 +0200 ++++ egg/egg-asn1x.c 2010-09-04 12:10:05.000000000 +0200 +@@ -1988,8 +1988,8 @@ anode_write_integer_ulong (gulong value, + guchar buf[sizeof (gulong)]; + gint bytes, i, off; + +- for (i = 0; i < sizeof (ulong); ++i) { +- off = sizeof (ulong) - (i + 1); ++ for (i = 0; i < sizeof (gulong); ++i) { ++ off = sizeof (gulong) - (i + 1); + buf[i] = (value >> (off * 8)) & 0xFF; + } + diff --git a/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c b/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c new file mode 100644 index 000000000..5ae53f8b0 --- /dev/null +++ b/security/gnome-keyring/files/patch-egg_egg-unix-credentials.c @@ -0,0 +1,44 @@ +--- egg/egg-unix-credentials.c.orig 2010-01-13 00:21:23.000000000 -0500 ++++ egg/egg-unix-credentials.c 2010-01-13 00:25:46.000000000 -0500 +@@ -27,6 +27,7 @@ + + #include <sys/types.h> + #include <sys/socket.h> ++#include <sys/param.h> + #include <sys/uio.h> + #include <sys/un.h> + #include <errno.h> +@@ -37,6 +38,33 @@ + #include <ucred.h> + #endif + ++#if __FreeBSD_version < 701101 ++static char * ++strndup (const char *s, size_t n) ++{ ++ size_t nAvail; ++ char *p; ++ ++ if (s == NULL) ++ return NULL; ++ ++ if (memchr (s, '\0', n) != NULL) { ++ nAvail = strlen(s); ++ if (nAvail > n) ++ nAvail = n; ++ } else{ ++ nAvail = n; ++ } ++ p = malloc (nAvail + 1); ++ if (p == NULL) ++ return NULL; ++ memcpy (p, s, nAvail); ++ p[nAvail] = '\0'; ++ ++ return p; ++} ++#endif ++ + int + egg_unix_credentials_read (int sock, pid_t *pid, uid_t *uid) + { diff --git a/security/gnome-keyring/files/patch-gcr_gcr-certificate.c b/security/gnome-keyring/files/patch-gcr_gcr-certificate.c new file mode 100644 index 000000000..bdf10bf14 --- /dev/null +++ b/security/gnome-keyring/files/patch-gcr_gcr-certificate.c @@ -0,0 +1,11 @@ +--- gcr/gcr-certificate.c.orig 2010-09-04 12:04:30.000000000 +0200 ++++ gcr/gcr-certificate.c 2010-09-04 12:04:42.000000000 +0200 +@@ -158,7 +158,7 @@ calculate_key_size (GcrCertificateInfo * + const guchar *data, *params; + gsize n_data, n_params; + guint key_size = 0, n_bits; +- guchar *key; ++ guchar *key = NULL; + GQuark oid; + + data = egg_asn1x_get_raw_element (egg_asn1x_node (info->asn1, "tbsCertificate", "subjectPublicKeyInfo", NULL), &n_data); diff --git a/security/gnome-keyring/files/patch-pam_gkr-pam-client.c b/security/gnome-keyring/files/patch-pam_gkr-pam-client.c new file mode 100644 index 000000000..05a0306e6 --- /dev/null +++ b/security/gnome-keyring/files/patch-pam_gkr-pam-client.c @@ -0,0 +1,18 @@ +--- pam/gkr-pam-client.c.orig 2008-10-07 12:25:23.000000000 -0400 ++++ pam/gkr-pam-client.c 2008-10-07 12:38:36.000000000 -0400 +@@ -96,12 +96,12 @@ check_peer_same_uid (int sock) + struct xucred xuc; + socklen_t xuc_len = sizeof (xuc); + +- if (getsockopt (sock, SOL_SOCKET, LOCAL_PEERCRED, &xuc, &xuc_len) == 0 && +- xuc_len == sizeof (xuc)) { ++ if (getsockopt (sock, 0, LOCAL_PEERCRED, &xuc, &xuc_len) == 0 && ++ xuc.cr_version == XUCRED_VERSION) { + uid = xuc.cr_uid; + } else { + syslog (GKR_LOG_ERR, "could not get gnome-keyring-daemon socket credentials, " +- "(returned len %d/%d)\n", xuc_len, (int)sizeof (xuc)); ++ "(returned version %d/%d)\n", xuc.cr_version, XUCRED_VERSION); + return -1; + } + diff --git a/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c b/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c new file mode 100644 index 000000000..146d8b69d --- /dev/null +++ b/security/gnome-keyring/files/patch-pkcs11_rpc-layer_gkm-rpc-dispatch.c @@ -0,0 +1,11 @@ +--- pkcs11/rpc-layer/gkm-rpc-dispatch.c.orig 2010-09-04 12:06:44.000000000 +0200 ++++ pkcs11/rpc-layer/gkm-rpc-dispatch.c 2010-09-04 12:07:12.000000000 +0200 +@@ -784,7 +784,7 @@ rpc_C_Finalize (CallState *cs) + { + CK_SLOT_ID_PTR slots; + CK_ULONG n_slots, i; +- CK_RV ret; ++ CK_RV ret = CKR_OK; + + debug (("C_Finalize: enter")); + |