Merge pull request #117 from marineam/cryptsetup

bump(sys-fs/cryptsetup): sync with upstream
This commit is contained in:
Michael Marineau 2014-07-03 14:28:39 -07:00
commit 636076db95
31 changed files with 3441 additions and 0 deletions

View File

@ -0,0 +1,12 @@
DEFINED_PHASES=compile install postinst setup unpack
DEPEND=>=sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
HOMEPAGE=http://luks.endorphin.org/ http://code.google.com/p/cryptsetup/
IUSE=dynamic nls selinux
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
LICENSE=GPL-2
RDEPEND=>=sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
SLOT=0
SRC_URI=http://luks.endorphin.org/source/cryptsetup-1.0.6.tar.bz2
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 flag-o-matic 65cef1287b9d62b1a0f180765d1e0c69 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=d95e561b1dee1b9e31fbba33bea7c54b

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install postinst prepare setup
DEPEND=>=sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks >=sys-apps/util-linux-2.17.2 !dynamic? ( || ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 ) || ( >=dev-libs/popt-1.16-r1[static-libs] <dev-libs/popt-1.16-r1 ) dev-libs/libgcrypt:0[static-libs] || ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 ) )
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=2
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=dynamic nls selinux
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
LICENSE=GPL-2
RDEPEND=>=sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks >=sys-apps/util-linux-2.17.2
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.1.3.tar.bz2
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=5939a762b2970e56157cce11a7392c29

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=!static? ( >=dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks static? ( >=dev-libs/libgpg-error-1.10[static-libs] >=dev-libs/popt-1.16-r1[static-libs] || ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 ) dev-libs/libgcrypt:0[static-libs] || ( >=sys-fs/lvm2-2.02.88[static-libs] <sys-fs/lvm2-2.02.88 ) virtual/udev[static-libs] )
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=2
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=nls selinux +static
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
LICENSE=GPL-2
RDEPEND=!static? ( >=dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.2.0.tar.bz2
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=3075ed8e7d04a7f6a74595181abbefb4

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !<sys-apps/baselayout-2 !sys-fs/cryptsetup-luks selinux? ( sys-libs/libselinux ) static? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) )
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=4
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=nls selinux static static-libs udev
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
LICENSE=GPL-2
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !<sys-apps/baselayout-2 !sys-fs/cryptsetup-luks selinux? ( sys-libs/libselinux )
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.4.3.tar.bz2
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=d40e6cec4d03b53d4bc5f3f5b9aa1a30

View File

@ -0,0 +1,13 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux dev-libs/libgcrypt:0 sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) selinux? ( sys-libs/libselinux ) static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) )
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=4
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=nls python reencrypt selinux static static-libs udev urandom
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
LICENSE=GPL-2
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux dev-libs/libgcrypt:0 sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) selinux? ( sys-libs/libselinux )
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.5.1.tar.bz2
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 python 305197b0aa1194fa3ef67ca21f6faa7e toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=e485cd810fed4cfb125e51995c65f1cb

View File

@ -0,0 +1,14 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=5
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86
LICENSE=GPL-2+
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.2.tar.bz2
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=9a89f15b4731426d9207d71a551b36db

View File

@ -0,0 +1,14 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=5
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
LICENSE=GPL-2+
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
SLOT=0
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.3.tar.bz2
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=8c0d12e561582e098729cca132078263

View File

@ -0,0 +1,14 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=5
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
LICENSE=GPL-2+
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
SLOT=0
SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.4.tar.xz
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=2cee1b3883a5db817fbcade015586a03

View File

@ -0,0 +1,14 @@
DEFINED_PHASES=configure install postinst prepare setup test
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
EAPI=5
HOMEPAGE=http://code.google.com/p/cryptsetup/
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
LICENSE=GPL-2+
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
SLOT=0
SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.5.tar.xz
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
_md5_=1e4b280955b331259db9e7feecc0c354

View File

@ -0,0 +1,712 @@
# ChangeLog for sys-fs/cryptsetup
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.169 2014/07/01 07:27:44 robbat2 Exp $
*cryptsetup-1.6.5 (01 Jul 2014)
01 Jul 2014; Robin H. Johnson <robbat2@gentoo.org> +cryptsetup-1.6.5.ebuild:
Bump per bug #515838.
*cryptsetup-1.6.4 (03 Mar 2014)
03 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> -cryptsetup-1.1.2.ebuild,
-cryptsetup-1.4.1.ebuild, -cryptsetup-1.4.1-r1.ebuild,
-cryptsetup-1.4.2.ebuild, -cryptsetup-1.6.0.ebuild, -cryptsetup-1.6.1.ebuild,
+cryptsetup-1.6.4.ebuild, -files/1.1.0-libudev.patch,
-files/1.1.0_rc3-static-no-selinux.patch, -files/1.4.1-dmcrypt.rc:
Version bump (bug #503280). Removed old.
01 Mar 2014; Michał Górny <mgorny@gentoo.org> cryptsetup-1.1.2.ebuild,
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild,
cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.1.ebuild, cryptsetup-1.4.2.ebuild,
cryptsetup-1.4.3.ebuild, cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild,
cryptsetup-1.6.1.ebuild, cryptsetup-1.6.2.ebuild, cryptsetup-1.6.3.ebuild:
Update libgcrypt dep to use slot :0.
18 Jan 2014; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for alpha, wrt bug #487652
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for ia64, wrt bug #487652
*cryptsetup-1.6.3 (27 Dec 2013)
27 Dec 2013; Lars Wendler <polynomial-c@gentoo.org> +cryptsetup-1.6.3.ebuild:
Version bump by Manuel Rüger (bug #496126).
23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for sparc, wrt bug #487652
22 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for ppc64, wrt bug #487652
21 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for ppc, wrt bug #487652
01 Dec 2013; Johannes Huber <johu@gentoo.org> cryptsetup-1.6.2.ebuild:
x86 stable, bug #487652
27 Nov 2013; Markus Meier <maekke@gentoo.org> cryptsetup-1.6.2.ebuild:
arm stable, bug #487652
19 Nov 2013; Chema Alonso <nimiux@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for amd64 wrt bug #487652
09 Nov 2013; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.6.2.ebuild:
Stable for HPPA (bug #487652).
05 Sep 2013; Michał Górny <mgorny@gentoo.org> cryptsetup-1.6.1.ebuild:
Clean up PYTHON_COMPAT from old implementations.
*cryptsetup-1.6.2 (14 Aug 2013)
14 Aug 2013; Tim Harder <radhermit@gentoo.org> +cryptsetup-1.6.2.ebuild:
Version bump.
14 Aug 2013; Tim Harder <radhermit@gentoo.org> metadata.xml:
Simplify USE flag descriptions.
06 Aug 2013; Ian Stakenvicius <axs@gentoo.org>
+files/cryptsetup-1.6.1-openssl-static.patch, cryptsetup-1.6.1.ebuild:
fixed compilation error when USE='openssl static', bug 472692; dropped
IUSE=selinux as there is no direct dep, selinux support comes from
libdevmapper via sys-fs/lvm2[selinux]
04 Jun 2013; Diego E. Pettenò <flameeyes@gentoo.org> cryptsetup-1.6.1.ebuild:
Fix broken dependencies.
04 Jun 2013; Tim Harder <radhermit@gentoo.org> cryptsetup-1.6.1.ebuild:
Drop -caps use dep from libgcrypt to fix dep tree (and libgcrypt now has
capabilities disabled by default).
*cryptsetup-1.6.1 (04 Jun 2013)
04 Jun 2013; Tim Harder <radhermit@gentoo.org> +cryptsetup-1.6.1.ebuild,
metadata.xml:
Version bump (bug #464610 by Manuel Rüger), convert to python-single-r1, add
support for choosing a crypto backend (gcrypt, kernel, nettle, or openssl),
remove old postinst warning, and only show postinst logs on new installs.
09 Apr 2013; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Remove sys-fs/device-mapper from || () syntax in favour of sys-fs/lvm2 wrt
#461382
21 Jan 2013; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.3.ebuild,
cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild:
Add USE=udev control #453390 by Piotr Mitas.
21 Jan 2013; Samuli Suominen <ssuominen@gentoo.org> cryptsetup-1.5.1.ebuild,
cryptsetup-1.6.0.ebuild:
Restore virtual/udev dependency wrt #453390 by Piotr Mitas
*cryptsetup-1.6.0 (17 Jan 2013)
*cryptsetup-1.5.1 (17 Jan 2013)
17 Jan 2013; Robin H. Johnson <robbat2@gentoo.org> +cryptsetup-1.5.1.ebuild,
+cryptsetup-1.6.0.ebuild, +files/1.5.1-dmcrypt.rc, metadata.xml:
Bump per bug #421249. Add UUID support per bug #420015.
21 Dec 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.3.ebuild:
Drop udev dep since cryptsetup no longer calls udevsettle at runtime #445660
by Piotr Karbowski.
16 Dec 2012; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.4.3.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #429704
29 Nov 2012; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.0.6-r2.ebuild, cryptsetup-1.1.2.ebuild,
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild,
cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.2.ebuild,
cryptsetup-1.4.3.ebuild:
Use virtual/udev instead of sys-fs/udev wrt #444398
21 Nov 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.3.ebuild:
Stable for x86, tested by Vicente Olivert Riera <peratu@carrosses.com>, wrt
bug #429704
30 Oct 2012; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.4.3.ebuild:
Stable for HPPA (bug #429704).
25 Oct 2012; Anthony G. Basile <blueness@gentoo.org> cryptsetup-1.4.3.ebuild:
stable arm ppc ppc64, bug #429704
22 Oct 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.3.ebuild:
Stable for amd64, wrt bug #429704
21 Oct 2012; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
Update sys-fs/udev dependency because stable udev was revision bumped.
*cryptsetup-1.4.3 (06 Jun 2012)
06 Jun 2012; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.3.ebuild:
Version bump #419829 by Manuel Rüger (mrueg).
21 May 2012; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
Fix sys-fs/udev dependency within || ( ) block from -171-r5 to -171-r6 wrt
#416653, Comment #3 by Mariusz Pękala
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.2.ebuild:
Always depend on library packages as we install a shared lib as pointed out by
Samuli Suominen #414665 by Egor Y. Egorov.
*cryptsetup-1.4.2 (11 May 2012)
11 May 2012; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.2.ebuild,
files/dmcrypt.rc:
Version bump #412795 by Manuel Rüger (mrueg). Replace `read -t` with stty
hacks by Martin Väth #255528.
11 May 2012; Mike Frysinger <vapier@gentoo.org> +files/1.4.1-dmcrypt.rc,
cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild:
Rename stable dmcrypt init.d so updates can land for newer versions.
11 May 2012; Mike Frysinger <vapier@gentoo.org> files/dmcrypt.rc:
Use POSIX compliant for loop #408117 by Maxim Kammerer.
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1-r1.ebuild:
Add write access to /dev/mapper and /dev/loop for tests #408047 by Toralf
Förster.
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1-r1.ebuild:
Unify static lib dependencies and update to EAPI=4.
01 Apr 2012; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.4.1.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #401217
30 Mar 2012; Markus Meier <maekke@gentoo.org> cryptsetup-1.4.1.ebuild:
arm stable, bug #401217
*cryptsetup-1.4.1-r1 (20 Mar 2012)
20 Mar 2012; Samuli Suominen <ssuominen@gentoo.org>
+cryptsetup-1.4.1-r1.ebuild:
Don't enable USE="static" by default anymore because initramfs is required
with latest udev for separate /usr in anycase. This was a workaround for
cross / and /usr linking.
20 Mar 2012; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
Make sure sys-fs/udev has been emerged with USE="static-libs" for
USE="static" wrt #409039 by jannis
14 Mar 2012; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.4.1.ebuild:
Stable for HPPA (bug #401217).
13 Mar 2012; Samuli Suominen <ssuominen@gentoo.org> cryptsetup-1.4.1.ebuild:
ppc/ppc64/x86 stable wrt #401217
11 Mar 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.1.ebuild:
Stable for amd64, wrt bug #401217
27 Feb 2012; Robin H. Johnson <robbat2@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
Stable version is bitten by the util-linux static-libs as well, per
https://forums.gentoo.org/viewtopic-t-914468.html.
20 Nov 2011; Mike Frysinger <vapier@gentoo.org> files/dmcrypt.rc:
Drop dead prompt code.
13 Nov 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1.ebuild:
Fix init.d typo #390381 by Helmut Jarausch.
*cryptsetup-1.4.1 (13 Nov 2011)
13 Nov 2011; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.1.ebuild,
+files/dmcrypt.rc:
Version bump #363521 by Attila Jecs. Rewrite init.d script to only work with
openrc. Tweak init.d for splash support #386563 by Tim Ruffing, and make a
bit more POSIX compliant #255528 by Martin Väth.
19 Sep 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.2.0-r1.ebuild:
Simplify deps a little more, and require static-libs with lvm2 #383417 by
Bernd Lommerzheim.
07 Sep 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.2.0-r1.ebuild:
Pull in util-linux for uuid and require static/static-libs properly #381197
by Vasileios Lourdas, and drop older deps that are no longer in the tree.
07 Aug 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh:
Patch by ekass to skip service-specific openrc configs #377927.
17 Mar 2011; Samuli Suominen <ssuominen@gentoo.org>
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild:
Fix dev-libs/popt USE static-libs depend.
22 Jan 2011; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #350044
21 Jan 2011; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
Stable for HPPA (bug #350044).
18 Jan 2011; Mike Frysinger <vapier@gentoo.org> files/1.0.5-dmcrypt.rc:
Don't require device-mapper -- let the user select which packages they
need for their fs stack #351251 by Jochen Klein.
18 Jan 2011; Kacper Kowalik <xarthisius@gentoo.org>
cryptsetup-1.1.3-r3.ebuild:
ppc64 stable wrt #350044
17 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild:
Require new dev-libs/libgcrypt[static-libs] too #351810.
15 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Require libgpg-error[static-libs] when USE=static #351810 by Peter Volkov.
*cryptsetup-1.1.3-r3 (12 Jan 2011)
12 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r3.ebuild,
files/1.1.3-dm-crypt-stop.sh:
Push out updated addon to fix baselayout-2 support #350399 by Martin
Kolleck.
08 Jan 2011; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.3-r2.ebuild:
arm stable, bug #350044
*cryptsetup-1.1.3-r2 (08 Jan 2011)
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r2.ebuild:
Push out updated addon to fix baselayout-1 support #350399 by Manuel
Danisch.
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh:
Tweak status detection to work with newer cryptsetup output #350345 by
Aaron Lewis.
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Improve tests a bit -- skip when dmcrypt is not available.
07 Jan 2011; Brent Baude <ranger@gentoo.org> cryptsetup-1.1.3-r1.ebuild:
stable ppc, bug 350044
04 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Fix build failures for USE=-static #350463 by Alessandro Guido.
02 Jan 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org>
cryptsetup-1.1.3-r1.ebuild:
x86 stable wrt bug #350044
01 Jan 2011; Markos Chandras <hwoarang@gentoo.org>
cryptsetup-1.1.3-r1.ebuild:
Stable on amd64 wrt bug #350044
*cryptsetup-1.2.0-r1 (30 Dec 2010)
30 Dec 2010; Mike Frysinger <vapier@gentoo.org> -cryptsetup-1.2.0.ebuild,
+cryptsetup-1.2.0-r1.ebuild:
Convert to IUSE=+static and make it work again #350105 by Casey Carter.
*cryptsetup-1.2.0 (29 Dec 2010)
29 Dec 2010; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.2.0.ebuild:
Version bump #349962 by ScytheMan.
29 Oct 2010; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.2.ebuild:
Stable for HPPA (bug #327689).
06 Oct 2010; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh:
Do not warn about global options #329437 by Marcin Mirosław.
*cryptsetup-1.1.3-r1 (30 Sep 2010)
30 Sep 2010; Mike Frysinger <vapier@gentoo.org>
+files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r1.ebuild,
+files/1.1.3-dm-crypt-stop.sh:
Update by Wolfram to let the init.d scripts be multiplexed #338876.
28 Aug 2010; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.2.ebuild:
ia64/s390/sh/sparc stable wrt #327689
28 Aug 2010; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.2.ebuild:
arm stable, bug #327689
13 Aug 2010; Joseph Jezak <josejx@gentoo.org> cryptsetup-1.1.2.ebuild:
Marked ppc/ppc64 stable for bug #327689.
31 Jul 2010; Tobias Klausmann <klausman@gentoo.org>
cryptsetup-1.1.2.ebuild:
Stable on alpha, bug #327689
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
-cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.7.ebuild,
-cryptsetup-1.0.7-r1.ebuild, -cryptsetup-1.1.0.ebuild,
-cryptsetup-1.1.1_rc1.ebuild, -cryptsetup-1.1.1_rc2.ebuild,
-cryptsetup-1.1.1.ebuild:
Cleanup old versions.
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.1.2.ebuild, cryptsetup-1.1.3.ebuild:
Bug #329991: Document that users of plain (non-LUKS) volumes from the 1.0
series MUST specify the cipher/keysize/hash, as the defaults have changed
for security reasons.
27 Jul 2010; Pacho Ramos <pacho@gentoo.org> cryptsetup-1.1.2.ebuild:
amd64 stable, bug 327689
23 Jul 2010; Christian Faulhammer <fauli@gentoo.org>
cryptsetup-1.1.2.ebuild:
stable x86, bug 327689
*cryptsetup-1.1.3 (21 Jul 2010)
21 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.3.ebuild:
Version bump.
*cryptsetup-1.1.2 (17 Jun 2010)
17 Jun 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.2.ebuild:
Bug #323655: version bump
*cryptsetup-1.1.1 (24 May 2010)
24 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1.ebuild:
Version bump.
*cryptsetup-1.1.1_rc2 (14 May 2010)
14 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1_rc2.ebuild:
Bug #318379: version bump. Fixes dm-crypt module loading over rc1.
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.1.1_rc1.ebuild:
Both patches are actually not needed now.
*cryptsetup-1.1.1_rc1 (01 May 2010)
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1_rc1.ebuild:
Bug #318039: version bump.
23 Apr 2010; Robin H. Johnson <robbat2@gentoo.org>
+files/1.1.0-libudev.patch, cryptsetup-1.1.0.ebuild:
Bug #316571: Bring in libudev for devmapper.
*cryptsetup-1.1.0 (14 Feb 2010)
14 Feb 2010; Robin H. Johnson <robbat2@gentoo.org>
+files/1.1.0_rc3-static-no-selinux.patch, +cryptsetup-1.1.0.ebuild:
Version bump per bug #294934.
*cryptsetup-1.0.7-r1 (30 Nov 2009)
30 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.0.7-r1.ebuild:
Bug #276803: old sys-fs/devicemapper not supported anymore. Use the new
lvm2-2.02.56-r1 for safe static linking.
*cryptsetup-1.0.7 (28 Nov 2009)
28 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.0.7.ebuild:
Version bump per bug #277990.
31 Aug 2009; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
arm/ia64/s390/sh/sparc stable wrt #259253
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Install into rcscripts multilib dir #262838 by Thilo Bangert.
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Make sure USE=selinux is respected #274034 by Petteri Räty.
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
files/cryptsetup-1.0.6-udevsettle.patch:
Do not complain if udevadm did not exec for systems that use mdev and such
#276369 by Florian Streibelt.
15 Jul 2009; nixnut <nixnut@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
ppc stable #259253
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Stable on alpha, bug #259253
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org> ChangeLog:
Stable on alpha, bug #259253
26 Jun 2009; Thomas Anderson <gentoofan23@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
stable amd64, bug 259253
19 Jun 2009; Brent Baude <ranger@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
stable ppc64, bug 259253
17 Jun 2009; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
Stable for HPPA (bug #259253).
17 Jun 2009; Christian Faulhammer <fauli@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
stable x86, bug 259253
16 Jun 2009; Jeremy Olexa <darkside@gentoo.org>
files/1.0.6-r2-dm-crypt-start.sh:
Fix dm-crypt-start.sh file for passphrase at startup issue, bug 243216
19 Apr 2009; Doug Goldstein <cardoe@gentoo.org>
-files/1.0.6-dm-crypt-start.sh, -cryptsetup-1.0.5.ebuild,
cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.6.ebuild,
-cryptsetup-1.0.6-r1.ebuild, cryptsetup-1.0.6-r2.ebuild:
clean up old versions. clean up depends
10 Apr 2009; Caleb Tennis <caleb@gentoo.org> cryptsetup-0.1-r3.ebuild,
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
cryptsetup-1.0.6.ebuild, cryptsetup-1.0.6-r1.ebuild,
cryptsetup-1.0.6-r2.ebuild:
Fix device-mapper dep for new lvm2, bug #265599
*cryptsetup-1.0.6-r2 (05 Oct 2008)
05 Oct 2008; Mike Frysinger <vapier@gentoo.org>
+files/1.0.6-dmcrypt.confd, +files/1.0.6-r2-dm-crypt-start.sh,
+cryptsetup-1.0.6-r2.ebuild:
Do not bang directly on /dev/console so we dont break when running under X
or something.
15 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.0.6-r1.ebuild:
Bug #237714, make the udev dep for udevadm slightly wider.
14 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.0.6-r1.ebuild:
Fix changelog removal, and ensure a min version of udev for new revision
since some old versions did not contain the udevadm tool yet.
*cryptsetup-1.0.6-r1 (14 Sep 2008)
14 Sep 2008; Doug Goldstein <cardoe@gentoo.org>
+files/cryptsetup-1.0.6-udevsettle.patch, -cryptsetup-0.1-r2.ebuild,
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
cryptsetup-1.0.6.ebuild, +cryptsetup-1.0.6-r1.ebuild:
fix bug #236481. block udev-126 and higher on older versions that won't
work with it. add udev as a depend since the code calls it always. remove
old version
22 Aug 2008; Doug Goldstein <cardoe@gentoo.org> metadata.xml:
add GLEP 56 USE flag desc from use.local.desc
16 Aug 2008; Torsten Veller <tove@gentoo.org> metadata.xml:
Remove strerror from metadata.xml (#89719)
25 Mar 2008; <ricmm@gentoo.org> cryptsetup-0.1-r2.ebuild,
cryptsetup-0.1-r3.ebuild:
Drop to ~mips due to unstable deps
*cryptsetup-1.0.6 (19 Mar 2008)
19 Mar 2008; Mike Frysinger <vapier@gentoo.org>
+files/1.0.6-dm-crypt-start.sh, +cryptsetup-1.0.6.ebuild:
Version bump #212997 by Alex Elsayed and make startup script much nicer
#202364 by me.
20 Feb 2008; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild:
I hate blank spaces in output for no reason, so switching from using echo to
using an extra \n at the end of the line.
01 Feb 2008; Diego Pettenò <flameeyes@gentoo.org> files/1.0.5-dmcrypt.rc:
Update init script to work with current development version of OpenRC
(checkroot -> root; checkfs -> fsck).
31 Jan 2008; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5-r1.ebuild:
Cleaning up a couple typos/errors in einfo/ewarn output. There's no actual
code changes in this.
06 Nov 2007; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
alpha/ia64/sparc stable wrt #195648
02 Nov 2007; Steve Dibb <beandog@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
amd64 stable, bug 195648
14 Oct 2007; Markus Rothe <corsair@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable on ppc64; bug #195648
13 Oct 2007; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable for HPPA (bug #195648).
13 Oct 2007; nixnut <nixnut@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable on ppc wrt bug 195648
13 Oct 2007; Christian Faulhammer <opfer@gentoo.org>
cryptsetup-1.0.5-r1.ebuild:
stable x86, bug 195648
06 Oct 2007; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.0.5.ebuild,
cryptsetup-1.0.5-r1.ebuild:
Block cryptsetup-luks #194907 by Jakub Moc.
*cryptsetup-1.0.5-r1 (02 Oct 2007)
02 Oct 2007; Benjamin Smee <strerror@gentoo.org>
files/1.0.5-dm-crypt-start.sh, files/1.0.5-dm-crypt-stop.sh,
files/1.0.5-dmcrypt.rc, +cryptsetup-1.0.5-r1.ebuild:
Fixes for bugs #180068 #181503 #164795 and other improvements. Thanks to
Thomas Bettler for a patch
14 Sep 2007; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5.ebuild:
Removed check for USE=build since it did nothing because cryptsetup isn't in
stage1. Removed call to linux-info_pkg_setup to remove requirement on a
configured kernel. This fixes bug #148390 from this end, but changes are
still needed in linux-info.eclass, which is tracked at bug #192556.
15 Aug 2007; Benjamin Smee <strerror@gentoo.org>
files/1.0.5-dm-crypt-start.sh:
Change to 1.0.5-dm-crypt-start.sh to fix misplaced bin
*cryptsetup-1.0.5 (14 Aug 2007)
14 Aug 2007; Benjamin Smee <strerror@gentoo.org>
+files/1.0.5-dm-crypt-start.sh, +files/1.0.5-dm-crypt-stop.sh,
+files/1.0.5-dmcrypt.confd, +files/1.0.5-dmcrypt.rc,
+cryptsetup-1.0.5.ebuild:
Major changes for bug #177100 and others. Thanks to ikelos
07 Jul 2006; Thomas Cort <tcort@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on alpha wrt Bug #124928.
28 Apr 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on amd64. Bug #124928.
27 Apr 2006; Alec Warner <antarus@gentoo.org> Manifest:
Fixing SHA256 digest, pass four
29 Apr 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r3.ebuild:
Marked stable on mips.
10 Mar 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r3.ebuild:
Mark 0.1-r3 stable on ia64. #124928
06 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r3.ebuild:
Stable on sparc wrt #124928
06 Mar 2006; Michele Noberasco <s4t4n@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable for x86, see bug #124928
05 Mar 2006; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r3.ebuild:
stable on ppc64, bug #124928
04 Mar 2006; <nixnut@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on ppc. bug #124928
26 Feb 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r2.ebuild:
Marked stable on mips.
15 Feb 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
Stable on ppc64; bug #118791
08 Feb 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r2.ebuild:
Mark 0.1-r2 stable on alpha
*cryptsetup-0.1-r3 (02 Feb 2006)
02 Feb 2006; Benjamin Smee <strerror@gentoo.org>
+files/cryptsetup-libmapper.patch, +cryptsetup-0.1-r3.ebuild:
Bump for bug #120802
13 Jan 2006; Tobias Scherbaum <dertobi123@gentoo.org>
cryptsetup-0.1-r2.ebuild:
ppc stable, bug #118791
12 Jan 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
Added ~ppc64
12 Jan 2006; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-0.1-r2.ebuild:
Stable on x86 wrt bug #118791.
12 Jan 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r2.ebuild:
Stable on amd64. See bug #118791.
12 Jan 2006; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r2.ebuild:
Stable on sparc wrt #118791
25 Nov 2005; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r1.ebuild:
stable on ppc64
18 Oct 2005; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r1.ebuild:
Mark 0.1-r1 stable on alpha
03 Sep 2005; Daniel Black <dragonheart@gentoo.org>
cryptsetup-0.1-r1.ebuild, cryptsetup-0.1-r2.ebuild:
dependancy fixes
08 Aug 2005; Aaron Walker <ka0ttic@gentoo.org> cryptsetup-0.1-r2.ebuild:
Added ~mips for bug 89528.
*cryptsetup-0.1-r2 (02 Jun 2005)
02 Jun 2005; Benjamin Smee <strerror@gentoo.org>
+cryptsetup-0.1-r2.ebuild:
Now blocks with cryptsetup-luks
29 May 2005; Benjamin Smee <strerror@gentoo.org> cryptsetup-0.1-r1.ebuild:
Removed "die" call as per Spanky's request.
25 May 2005; Herbie Hopkins <herbs@gentoo.org> cryptsetup-0.1-r1.ebuild:
Multilib fixes.
24 May 2005; Benjamin Smee <strerror@gentoo.org> metadata.xml,
cryptsetup-0.1-r1.ebuild:
Fixed the dm-crypt check as per bug 89142
12 Apr 2005; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Stable on sparc
25 Mar 2005; Bryan Østergaard <kloeri@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Add ~alpha keyword, bug 83684.
22 Mar 2005; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Keyworded ~sparc wrt #83684
14 Mar 2005; Rob Holland <tigger@gentoo.org> :
fixed up module check. fixes bug #85102
*cryptsetup-0.1-r1 (02 Mar 2005)
02 Mar 2005; Martin Schlemmer <azarah@gentoo.org> +files/cryptfs.confd,
+files/dm-crypt-start.sh, +files/dm-crypt-stop.sh,
+cryptsetup-0.1-r1.ebuild:
Add cryptfs conf.d file and addon scripts.
01 Mar 2005; Lars Weiler <pylon@gentoo.org> cryptsetup-0.1.ebuild:
Stable on ppc.
13 Oct 2004; Chris Gianelloni <wolf31o2@gentoo.org> cryptsetup-0.1.ebuild:
Stable on amd64, blame jhuebel.
17 Sep 2004; Rob Holland <tigger@gentoo.org> cryptsetup-0.1.ebuild:
Marking stable on x86
27 Jul 2004; Travis Tilley <lv@gentoo.org> cryptsetup-0.1.ebuild:
added ~amd64 keyword
22 Jul 2004; David Holm <dholm@gentoo.org> cryptsetup-0.1.ebuild:
Added to ~ppc.
*cryptsetup-0.1 (21 Jul 2004)
21 Jul 2004; Rob Holland <tigger@gentoo.org> +cryptsetup-0.1.ebuild:
Initial version. Closes bug #44079. Thanks to ripple@ripple.be and
ben@disciplina.net for submitting ebuilds for it

View File

@ -0,0 +1,30 @@
AUX 1.0.5-dm-crypt-stop.sh 1022 SHA256 42015047c708aa73eae615559ff76c9c8948a5d01fba68f64c5432e30ec799a4 SHA512 6a8e55a2458278a48edaa8563ff7a586f521280587f4aacf03ab903fe6c3ae312b1925ee73a1462352d86cdc7097945f7ea842ba633ed527bbfb3a80689b1ae0 WHIRLPOOL c97f3d3485f56cb687acda6c697c4bb97e531d3aacc819ffa7073d9ac99f3e3d237e154064476e5f7ef1fce9b990792ffc992a90e083b5c93c45501f74564c58
AUX 1.0.5-dmcrypt.rc 601 SHA256 0b58b18dc903d0d4a23e5e2df1e6f3c5db64c65b8884e24710e4b7528ea3f8dc SHA512 d18f0192eea97d5051b81b4287b96d5ffb59e2dc3611f93111ff92700916d561c246f956417f438180b9f65313f35fa85ca076872592ef87c984b91d9625c3c6 WHIRLPOOL 66eaefe2ea4ab4d82e2956891efac6e884f7997a36b9cd9527412b3d3713394d5d5144b0ec3807daee3de05dba15a0f9c7a2a1cc9f4919121f6d13ffbb2d582e
AUX 1.0.6-dmcrypt.confd 3309 SHA256 0c30e081c0b8f879964ae49735f10b05a1d92f4f481042851958860945e13271 SHA512 d04ae17d3708ef20ade7afb223d4ef19e1b6812e0be8f9499e37e9c71344568b42030d9dd8f6918a9bfb211a3a94b40a9354e3b32a009cb165e84508d0a5e14b WHIRLPOOL 9496cd3fb3f8e8d84a5d70fd6e9853fdd2fe87df96244cb00fe73fee9a711847d795937b800ff13f98a888a288cfc5b33f564392794413e2a0b8e033165d4f5f
AUX 1.0.6-r2-dm-crypt-start.sh 8092 SHA256 56004bef91b8fad57fe67fec19427dd7c48e01c8e1ba7ff60f8c370295775fdc SHA512 e55949ed23518f9530476973ab632f9d4af9a5a684546baf662caabe4566aeb0164484ed972ab2edf220120609c593b05fc07173da388b3fceb5063acef3aadb WHIRLPOOL 6f67efbf34bfc62b316026106fe89914c8a16f7377a64ff787e81fa80ab32654c88e803e5f0cb4ecaa943d36499d4b72c469cb2bb030c830d064836cc4ecae61
AUX 1.1.3-dm-crypt-start.sh 8651 SHA256 1489ce5480d51beb81cf4f5178468ad4b2f2e4b3f53bc75ee8fe47d3e050a76a SHA512 4cd3e4c28f1c3da4b864c556873c2036854da78d0c3055f06ea8e2d359f16dc7020b4ebc2c0d4024dc557f51e923a919ecf384add07e92525d908efe4073af4d WHIRLPOOL b68eacec508861821c1573dd85b4fb1a5d909ab70ad8445997796cf328cd54c8a2363dfc54ae8da82b4d7e526df6938baab5332bd8cb2d1c095ac15e730541ae
AUX 1.1.3-dm-crypt-stop.sh 1272 SHA256 c81bf0cf8e57b3f83f55c808dba619b0a0f60eef8c3ed406d266be7cecdf96f9 SHA512 ec184e988f3ab36c5f661cc4743edf8ce0798ff69e4e40df854c172eaf0bae264de10160ee098dbfb7814318b2cd875ea18e1b447789c7e08b9549b11db3f175 WHIRLPOOL cb0c1afb4929229dc7bdade5657f053192c72a6011fd0eb05ef1e649f6a31925a57e61913cbea208eb0b3e2547b8bbe37cecb4e343ba84722efe2affadfa12ca
AUX 1.5.1-dmcrypt.rc 9453 SHA256 02faf27470ea0e50b764c923786724847e77dfdf9680a50cc202546cad2bf02f SHA512 660d1a29294e8e01343aea0b92d9159d42891261d41313c3f9e77ed3bd69e648d19d3799a8ad1b00884b6f4c0f48d4e12cb406ca291e64b789e71ba70ab3c29f WHIRLPOOL 3f36f078eb5f8d07d52b2559b2f7ba7280c620bab895b3ab34ee12619a4145ad3f04879f821b91a17805c792f0395ec96070aa218836373a38aa839fe0260505
AUX cryptsetup-1.0.6-udevsettle.patch 561 SHA256 80c4914071769dedc20198425b4ea528ec22264ff4c54516a9e5722a8e671f60 SHA512 74631c2aab95bd32a67dce1ae75ea30acdb167be78503a31ef8afbf178b651917cc65a37bafc5d6d60c1d3545664a2f53bf07885ba3ba86f562b12db17733228 WHIRLPOOL beb109875aa9579f05527d79a12eb0ebfd187853322accb70dc9e2a36e7ca4be881aa7f504f7573a040a64e0df777e70c4fbf31f79f29728c74cffaea8029d74
AUX cryptsetup-1.6.1-openssl-static.patch 472 SHA256 7029ba7870ff183b7dac3c658140c8c01286efd29e9427d1195b5b4e85fe2f4f SHA512 4292ee661b3e1a26b3c9b6fe8f360ed1df1cb416a13162ffa40d6610d5d0431c3dbdb17280fb1aa3aa6eeacb735ead3da4e6cc126d8be74121565b4c9bf6c6a2 WHIRLPOOL f0186cf9317560a480dab53c8c538f35ba5273401f2d37b4be9e3aae06203c43fcd22c4ce17c41cf80a01db5cd22877105ff2be0a8f3effd50cde8c9f42b68df
AUX dmcrypt.rc 9336 SHA256 2cacfbe5b305c0ba9633764e79dfadd160e63ffb089f7347c0bca8c2ba9ec42f SHA512 0019cc0d0bb91c04b04949cdfb0126fdb04541ec4e76117760092e1287d4a4eb091ecbf643fb8e4346f226e6b01d8fe358f0f0e0221f31abc83415b5e235b17a WHIRLPOOL 527fbbebafcdd7e2e3687acdc59fb07e2fa26370508aa0758ca0deb6e12fcab789271b6733cdfd18381ddf55f606152febe6f1e4fdac26d1efd4206b7b219655
DIST cryptsetup-1.0.6.tar.bz2 405713 SHA256 df7fda80cfa01f063caf39140287a47d018dfe056fc71a3ba605e690ff0183fd SHA512 deed2c603bfba3b26eb1cab65d880eb9fd69dc4aabc9e8fa2bf78de0879ecd5ddb03c4c6bd9c0ec166d2d5e87a13bb370e6e46d50f5dd246522e81bf75380e1b WHIRLPOOL 71e9c71387f0d6242303bcb53825595023af387b8a76c48681b74ccd38fa19b225930edddcd1369ea62854e5d95b05447b72ede707bd2a8af110242fcc41536f
DIST cryptsetup-1.1.3.tar.bz2 499276 SHA256 9c8e68a272f6d9cfb6cd65cc0743f4c44a2096c61f74e0602bf40208b5e69c0a SHA512 ecf259f41384d0d10d522c01f12815743e3a245b897a223909bce91b95401b73d1d0bd22cbe73d1d26e44df13c0666d039879404c26b66835d49983be69637ea WHIRLPOOL 8a7ebfc3dc6a2eda339add80682f678186272ecde027006196d3a9ffebd69ddbf76665df75f1f602c22a1309d35af9c1d320d0432acb2dd89f5287dad4b04af0
DIST cryptsetup-1.2.0.tar.bz2 523859 SHA256 411129817ff29e6a957bcbdcd9a2c4c953c1539acd8af912c383262ba901b5ea SHA512 7af9b26581d544e6207ad126e0ee4cf963b013cb1306f05e82fda1703d3fdf35b29e11f56e1fbc3641db9f52874a44057fba5b96597cfa595710cc94619692be WHIRLPOOL eb05a564bbdfac23f0b35409c30fc16b145bbe98bab364ea3e25bbdb54fe16b1238bd537788b2de6dc53271c51f6257b05380706f94e41303453f411fba57b4e
DIST cryptsetup-1.4.3.tar.bz2 798101 SHA256 d5ff2c00f6f791d77fa5636a02ae43ddbb46c6c793bdeafdec5e38fd15f99d0a SHA512 e91ad9cda9549802e9ea5cec02273ee4bc1a040883650e903e91a07c8cce8131b0bda068fa3433d2b5b3b7470cf9481d73670267cd419ce2d7b0f673b3601ba3 WHIRLPOOL e30c3bb9ad24145e425d64069cc84d8c129dc06d775299668dea9ad06c14c95e21b8bb734f94872990c7c1586666bdc6aee79aac5c8a64bacc3aa416d23a2f24
DIST cryptsetup-1.5.1.tar.bz2 958979 SHA256 16d23f78cab35937281a0ae7a8febce0c3a1a0f291cc94e169a7b968b81d2b36 SHA512 f1847d1833f0aba59af334a5b3919ca44b1a6dce152a44ccb76747fed5996ce83bddac9b6550ab8c63d7ca66dd9e0e79ccc2399b7b3860e8090bf776a72a77b0 WHIRLPOOL 2f24c43ba689039ab3548225cda91bea0c65cf2014e7cd57157def111493c3c2037a283cb778c3301c9d7b138f4fc8da21ce5752b9d1379d66fa01ef2481823e
DIST cryptsetup-1.6.2.tar.bz2 1189584 SHA256 15723f0198303d4bcb99d480b7a773918e2d319f0348457988c063bdd03e109a SHA512 59fb835ef8bcd6d0c704a021055032639840ef4bb7be6ade8ff91d347ae74d8e6cba4583d8ced7a4a8c6f09ebc16c4eff3549c13c4327d92fd9234db58e18c10 WHIRLPOOL 3ab24572ea42dfdd0d5176dfa4621520cd0bccda53c3a01676d400a7a841ab9643c979c4942daa774658602bd8cdf659376cbc94c553e2097c5eb3c51a7edb31
DIST cryptsetup-1.6.3.tar.bz2 1263747 SHA256 a2af4731d9442cb70bc84b7cecdd069493055d29ab65ab625c574b0f599938d8 SHA512 f11c58db2643f5a1035be9de699fa7cef7780f83da261dbb0425d233bcf73df6f120b71c23a8a122b1f648c8fe43eea3e15f75aa536184a537f3e5dd00a1f988 WHIRLPOOL 5e9075082c920563aeeb34556415b031c5ce51182c3430c0a679bf9873a11d6e74599fc10b4b26ca79971130dffb330e83d9ecd1365b6e892e588895df7b8a65
DIST cryptsetup-1.6.4.tar.xz 1081492 SHA256 70b8e86eef94bbb4441ad38460d87138130d7aaaafe5d01131c3ba50b9f0dca0 SHA512 0208d856fa59425fcd1216c92f32af2efcf8bbd6f32730ae8e0fe93720d4adceadbff94684d5d3f76bae347669949fa6029ab9832dc3812830a84801f4006669 WHIRLPOOL ffde0b3774663cb897aeab6ce84f5851b6b18ed83fdfec17ebc8ea2ce4fba243fb73c95415b3c052745145b5b2478dde790120dc42c419d0bde73f47435e94a0
DIST cryptsetup-1.6.5.tar.xz 1136892 SHA256 267973f20be43f9d685f7193aa23954b60768c74a1d330243114d4b8bc17ca9a SHA512 c77ac590d28954e7bd430d1069b820a288c4668857a7ced7f81546ea39676f2b536abbcda06f20440e31c205b7ada68bcfa5aab220b102a2b62198a788d9b65e WHIRLPOOL 74a597abbdcc1225bb811597e53737eab2348a328f3ba30e7eb519a0621b06e6c898e320db8e24a16decfd4706b6a2e68b06894dde91124e4c089e952dbff9c1
EBUILD cryptsetup-1.0.6-r2.ebuild 3122 SHA256 e0428878fb5416942255112eb70d7a6fdb13583504fdbcdac641a0457f7b97e9 SHA512 178ba72e4687ca0b388b423626eb3ad12ae694567c2f18faf09830cda1a633c29268df13f9b074a421a31715b6e46853a942e8833381500ca7becf688571ac0d WHIRLPOOL 773a0858a6c479f1020c328ca1bd202f0e316db22f9ee075cf21a40032a4543a2337631352ab6804f05041a4bde7925aee98576fcf5ab064b603357d7be4b3d7
EBUILD cryptsetup-1.1.3-r3.ebuild 3465 SHA256 5ad4b06a3cf68ea96ae8be24789435ab5398af40f510a2916a6b62ae4819c9a8 SHA512 6ab8e527e6df332803e65e3e385f3633153278251cd024dd671b4e71ec0696e5594348edf91441c308161689ed7465caa4a5d25ee73f31f797c796b9dd76d8f5 WHIRLPOOL 1ccbe5f4e085b8acd5ea86ea003f30a14c4d43ae61a69718d86b553029f9e63f612c84b7b2f24b8a0c77ceeb418f62a2dc42ccf17b73dd8fb837d72f8d84dc8b
EBUILD cryptsetup-1.2.0-r1.ebuild 3656 SHA256 5a066c639ceed3b8ddbf82ebc8adb60666917273f5cab992c75418d6cfe030fe SHA512 a22cc0f0457c9f9e323b8c3752b76f1198171e44dc7379f86b5173e74a5d44a9d48c8c74fb61d1627cc895206a88a01a9fc4d7b9f5e689b03545ce9889040121 WHIRLPOOL 28553355a7e1d894a659dfe2447b17ab3240289687f2ca147371061b0daacbe9718d3dee27dc9122237fa42d4265d3ca68a365343a6999035e4f93337cdf459b
EBUILD cryptsetup-1.4.3.ebuild 3557 SHA256 e52546b86cdcae464416c6264d5cf39c12b17c3380417c45095a659d9e460dbc SHA512 069b6e48e6839eb5d547828bffbedcadd13dc9f868b69493e8c5c6095052dbfdb1a30fa5339f626c6ddb73dfc38dd9dd862a2475f6c7dc9db375edd2239d95b1 WHIRLPOOL 693fcf51ec4484b869d69c975f4d7e8e04004ac0ebb649ca418ccd4618d059aa63a3bd5538df8c01fce3e701c024baea91daef3f4d15bafe7cd1ca8f87a1096b
EBUILD cryptsetup-1.5.1.ebuild 3841 SHA256 ee28ec449fe8e1cbf85d134c1f83f93ffc89b5901768302685db0c89b632b2b4 SHA512 6c05ba5ee426211dd91bea0269b300366b73f3b02a1d2d7943d9193ed91932f74031177b71e8bd2d116a9ee7a272b4a5c7a1d9957911ba7ec6e16c90e76c99e6 WHIRLPOOL 9d1896939e355f86ac3c5896e4659028b5ebee3ef72592d7e94a378d122481594ca3172461c7f000ffbbf0888031792be50ad49aea30dbf6c69b42fac675f80b
EBUILD cryptsetup-1.6.2.ebuild 4336 SHA256 d6fcda5bf1ca14e1eb3c44538dc8bd262a6e981360452d4f34c67d26bdf44dc4 SHA512 9f891931cc22554f78bbadcbf30c966feeeda060de4f6d5752e9297b9eacc8dc06fed2315af8719c5c56b26334383631b85d136637a1a12ceffc452280cb6e3f WHIRLPOOL 6b7601283a6ea93c891954d4725a798f5b2f2ef608cd43cfec8c1c0d4d0763d0b710bd2d952ccab4ec1b4ccccc0e8869c57f229c3f7b371327f12cf05728f0c7
EBUILD cryptsetup-1.6.3.ebuild 4289 SHA256 89803dc31a19496a793bcdd257af2066899954cd2c7992c75a95fc939a59e5ad SHA512 f652f1a6ff27f580056963668d069a1dce178bfbbb9795ef5ce3a76876a7f421d431d34f2cc06ab02a56e7cf077adfc5cf8673eec705ce868bf2b3805b9d44dd WHIRLPOOL 5bee95e56b1549af8d2e177a02eefb5a08eab94c82e1d66c593eee951c972ef5c095ece98e1487681d86426ed4bda50ec4d3cc20d54ddd8b733b3f659265c505
EBUILD cryptsetup-1.6.4.ebuild 4398 SHA256 4bdaf08c4bbbab4d537cb6fca4b58a3192ab4605a27713e09154d97fd57d9d17 SHA512 1fbf44658f90a050b9501cc47da08456c9439fe6b51b4eb2ad02225f563ddde3931421cdf86f1312670625f9d30cbeed01b1e36283570f2a4eee7ec679678464 WHIRLPOOL 3fa6210779f7b03cd8be05624750ade452702c6d4aa0e273e12843c3bf126c7472259ea2e252ae9cacfe0ae434afeef9369c22131dd0372bf75b6c216b38125f
EBUILD cryptsetup-1.6.5.ebuild 4393 SHA256 ee46294c37be5e6034d23ab8c05b82f873cbf0e7021c0a5d41b0ffe46420eb76 SHA512 c1000b213d8c1954feb5cd1c2f0bca4a76609beba6cebe626520e0e24a517802d44c1da95b5bcd1c0803989660048122a8434bb982a64c053a4274e3fca9a490 WHIRLPOOL 4ee554e7ba3db16eab302365b9ea50e1ddf3e98daacf343ce80823d69463bdad8062e579a1870ee2071ac2c7f4af11934f4a875915cc36810acf1ca5a924980f
MISC ChangeLog 26171 SHA256 c2383c81dcffe8c6225e4c0fdf071b14d7a86e4211b11c3d9d513bafb6ca02ae SHA512 1f254a101c25d3b80edff4cee3c01514b6a49f283c9bf139ec61e7a8fa270e5ed3622ce1fa1f7aa32c15f71572674181c7255db565a8a4493dc57db8a9061b26 WHIRLPOOL 1d5fac728ec1b76da939009c04746a45412b866bef5c35f5c0fa2fbd8acbb02758d68fa7cbbbf4f29b89497075844394393cbfa5d0168fece8e672460dab89f7
MISC metadata.xml 763 SHA256 494337a4a156da7feba29856957ffe6babede998bbbe2aa76ad68463f7a3ba4d SHA512 4124c6744a491b4b59115fe561408bde963d7527b835e5c554b3b99b460c6b2a9e98abb294f0e3de5af8625e27efecc7b139b8887b5e8b51af93772bd3574b1a WHIRLPOOL 1b76543228dffe7115e547dc068b6db84b06ff0a5f244c5964eb21cba55c9b6ee9637d4a19c38b4b9ebeba55ac7fe4437e97c4be32f26380fec6773b76ef8fce

View File

@ -0,0 +1,101 @@
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild,v 1.17 2013/04/09 10:06:06 ssuominen Exp $
inherit linux-info eutils flag-o-matic multilib
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://luks.endorphin.org/ http://code.google.com/p/cryptsetup/"
SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
IUSE="dynamic nls selinux"
RDEPEND=">=sys-fs/lvm2-2.02.45
>=dev-libs/libgcrypt-1.1.42
>=dev-libs/libgpg-error-1.0-r1
>=dev-libs/popt-1.7
virtual/udev
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
DEPEND="${RDEPEND}"
dm-crypt_check() {
local CONFIG_CHECK="~DM_CRYPT"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
check_extra_config
}
crypto_check() {
local CONFIG_CHECK="~CRYPTO"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
}
cbc_check() {
local CONFIG_CHECK="~CRYPTO_CBC"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
check_extra_config
}
pkg_setup() {
dm-crypt_check
crypto_check
cbc_check
if use dynamic ; then
ewarn "If you need cryptsetup for an initrd or initramfs then you"
ewarn "should NOT use the dynamic USE flag"
epause 5
fi
}
src_unpack() {
unpack ${A}
cd "${S}"
# fix for bug #236481, use udevadm instead of udevsettle
epatch "${FILESDIR}"/${PN}-1.0.6-udevsettle.patch
}
src_compile() {
use selinux || export ac_cv_lib_selinux_is_selinux_enabled=no
econf \
--sbindir=/sbin \
$(use_enable !dynamic static) \
--libdir=/usr/$(get_libdir) \
$(use_enable nls) \
|| die
emake || die
}
src_install() {
emake DESTDIR="${D}" install || die "install failed"
rmdir "${D}"/usr/$(get_libdir)/cryptsetup
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.0.6-r2-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.0.5-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
}

View File

@ -0,0 +1,99 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.1.3-r3.ebuild,v 1.9 2014/03/01 22:49:18 mgorny Exp $
EAPI="2"
inherit linux-info eutils multilib libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
IUSE="dynamic nls selinux"
S=${WORKDIR}/${MY_P}
RDEPEND=">=sys-fs/lvm2-2.02.64
>=dev-libs/libgcrypt-1.1.42:0
>=dev-libs/libgpg-error-1.0-r1
>=dev-libs/popt-1.7
virtual/udev
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks
>=sys-apps/util-linux-2.17.2"
DEPEND="${RDEPEND}
!dynamic? (
|| ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 )
|| ( >=dev-libs/popt-1.16-r1[static-libs] <dev-libs/popt-1.16-r1 )
dev-libs/libgcrypt:0[static-libs]
|| ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 )
)"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
if use dynamic ; then
ewarn "If you need cryptsetup for an initrd or initramfs then you"
ewarn "should NOT use the dynamic USE flag"
epause 5
fi
}
src_prepare() {
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable !dynamic static) \
--libdir=/usr/$(get_libdir) \
$(use_enable nls) \
$(use_enable selinux)
}
src_install() {
emake DESTDIR="${D}" install || die
dodoc TODO ChangeLog # README NEWS # last ones are empty
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View File

@ -0,0 +1,108 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild,v 1.14 2014/03/01 22:49:18 mgorny Exp $
EAPI="2"
inherit linux-info eutils multilib libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
IUSE="nls selinux +static"
S=${WORKDIR}/${MY_P}
RDEPEND="
!static? (
>=dev-libs/libgcrypt-1.1.42:0
dev-libs/libgpg-error
>=dev-libs/popt-1.7
>=sys-apps/util-linux-2.17.2
>=sys-fs/lvm2-2.02.64
)
virtual/udev
>=sys-libs/e2fsprogs-libs-1.41
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
DEPEND="${RDEPEND}
static? (
>=dev-libs/libgpg-error-1.10[static-libs]
>=dev-libs/popt-1.16-r1[static-libs]
|| ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 )
dev-libs/libgcrypt:0[static-libs]
|| ( >=sys-fs/lvm2-2.02.88[static-libs] <sys-fs/lvm2-2.02.88 )
virtual/udev[static-libs]
)"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
}
src_prepare() {
sed -i '/enable_static_cryptsetup=yes/d' configure #350463
sed -i '/^LOOPDEV=/s:=.*:=`losetup -f` || exit 0:' tests/{compat,mode}-test
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
--libdir=/usr/$(get_libdir) \
$(use_enable static static-cryptsetup) \
$(use_enable nls) \
$(use_enable selinux)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
default
}
src_install() {
emake DESTDIR="${D}" install || die
use static && { mv "${D}"/sbin/cryptsetup{.static,} || die ; }
dodoc TODO ChangeLog README NEWS
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View File

@ -0,0 +1,105 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.4.3.ebuild,v 1.10 2014/03/01 22:49:18 mgorny Exp $
EAPI="4"
inherit linux-info libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
IUSE="nls selinux static static-libs udev"
S=${WORKDIR}/${MY_P}
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
>=dev-libs/popt-1.7[static-libs(+)]
>=sys-apps/util-linux-2.17.2[static-libs(+)]
>=dev-libs/libgcrypt-1.1.42:0[static-libs(+)]
>=sys-fs/lvm2-2.02.64[static-libs(+)]
>=sys-libs/e2fsprogs-libs-1.41[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs(+)]}
!<sys-apps/baselayout-2
!sys-fs/cryptsetup-luks
selinux? ( sys-libs/libselinux )"
DEPEND="${RDEPEND}
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable selinux) \
$(use_enable udev)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
use static && { mv "${ED}"/sbin/cryptsetup{.static,} || die ; }
use static-libs || find "${ED}"/usr -name '*.la' -delete
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/dmcrypt.rc dmcrypt
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View File

@ -0,0 +1,114 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.5.1.ebuild,v 1.4 2014/03/01 22:49:18 mgorny Exp $
EAPI="4"
inherit python linux-info libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
IUSE="nls python reencrypt selinux static static-libs udev urandom"
S=${WORKDIR}/${MY_P}
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
dev-libs/popt[static-libs(+)]
sys-apps/util-linux[static-libs(+)]
dev-libs/libgcrypt:0[static-libs(+)]
sys-fs/lvm2[static-libs(+)]
sys-libs/e2fsprogs-libs[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs(+)]}
selinux? ( sys-libs/libselinux )"
DEPEND="${RDEPEND}
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
if use python ; then
python_set_active_version 2
python_pkg_setup
fi
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable python) \
$(use_enable reencrypt cryptsetup-reencrypt) \
$(use_enable selinux) \
$(use_enable udev) \
$(use_enable !urandom dev-random)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
if use static ; then
mv "${ED}"/sbin/cryptsetup{.static,} || die
mv "${ED}"/sbin/veritysetup{.static,} || die
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
fi
use static-libs || find "${ED}"/usr -name '*.la' -delete
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View File

@ -0,0 +1,122 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.2.ebuild,v 1.11 2014/03/01 22:49:18 mgorny Exp $
EAPI=5
PYTHON_COMPAT=( python{2_6,2_7} )
inherit autotools python-single-r1 linux-info libtool eutils
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.bz2"
LICENSE="GPL-2+"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86"
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
# we don't support nss since it doesn't allow cryptsetup to be built statically
# and it's missing ripemd160 support so it can't provide full backward compatibility
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
python? ( ${PYTHON_REQUIRED_USE} )"
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
dev-libs/popt[static-libs(+)]
sys-apps/util-linux[static-libs(+)]
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
openssl? ( dev-libs/openssl[static-libs(+)] )
sys-fs/lvm2[static-libs(+)]
sys-libs/e2fsprogs-libs[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# !static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs\(+\)\]}
python? ( ${PYTHON_DEPS} )"
DEPEND="${RDEPEND}
virtual/pkgconfig
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
use python && python-single-r1_pkg_setup
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
epatch "${FILESDIR}"/${PN}-1.6.1-openssl-static.patch
eautoreconf
}
src_configure() {
if use kernel ; then
ewarn "Note that kernel backend is very slow for this type of operation"
ewarn "and is provided mainly for embedded systems wanting to avoid"
ewarn "userspace crypto libraries."
fi
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable python) \
$(use_enable reencrypt cryptsetup-reencrypt) \
$(use_enable udev) \
$(use_enable !urandom dev-random) \
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
if use static ; then
mv "${ED}"/sbin/cryptsetup{.static,} || die
mv "${ED}"/sbin/veritysetup{.static,} || die
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
fi
prune_libtool_files --modules
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
}
pkg_postinst() {
if [[ -z ${REPLACING_VERSIONS} ]] ; then
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
fi
}

View File

@ -0,0 +1,121 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.3.ebuild,v 1.2 2014/03/01 22:49:18 mgorny Exp $
EAPI=5
PYTHON_COMPAT=( python{2_6,2_7} )
inherit autotools python-single-r1 linux-info libtool eutils
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.bz2"
LICENSE="GPL-2+"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
# we don't support nss since it doesn't allow cryptsetup to be built statically
# and it's missing ripemd160 support so it can't provide full backward compatibility
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
python? ( ${PYTHON_REQUIRED_USE} )"
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
dev-libs/popt[static-libs(+)]
sys-apps/util-linux[static-libs(+)]
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
openssl? ( dev-libs/openssl[static-libs(+)] )
sys-fs/lvm2[static-libs(+)]
sys-libs/e2fsprogs-libs[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# !static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs\(+\)\]}
python? ( ${PYTHON_DEPS} )"
DEPEND="${RDEPEND}
virtual/pkgconfig
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
use python && python-single-r1_pkg_setup
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
eautoreconf
}
src_configure() {
if use kernel ; then
ewarn "Note that kernel backend is very slow for this type of operation"
ewarn "and is provided mainly for embedded systems wanting to avoid"
ewarn "userspace crypto libraries."
fi
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable python) \
$(use_enable reencrypt cryptsetup-reencrypt) \
$(use_enable udev) \
$(use_enable !urandom dev-random) \
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
if use static ; then
mv "${ED}"/sbin/cryptsetup{.static,} || die
mv "${ED}"/sbin/veritysetup{.static,} || die
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
fi
prune_libtool_files --modules
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
}
pkg_postinst() {
if [[ -z ${REPLACING_VERSIONS} ]] ; then
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
fi
}

View File

@ -0,0 +1,122 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.4.ebuild,v 1.1 2014/03/03 09:28:07 polynomial-c Exp $
EAPI=5
PYTHON_COMPAT=( python{2_6,2_7} )
inherit autotools python-single-r1 linux-info libtool eutils versionator
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.xz"
SRC_URI="mirror://kernel/linux/utils/${PN}/v$(get_version_component_range 1-2)/${P}.tar.xz"
LICENSE="GPL-2+"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
# we don't support nss since it doesn't allow cryptsetup to be built statically
# and it's missing ripemd160 support so it can't provide full backward compatibility
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
python? ( ${PYTHON_REQUIRED_USE} )"
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
dev-libs/popt[static-libs(+)]
sys-apps/util-linux[static-libs(+)]
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
openssl? ( dev-libs/openssl[static-libs(+)] )
sys-fs/lvm2[static-libs(+)]
sys-libs/e2fsprogs-libs[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# !static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs\(+\)\]}
python? ( ${PYTHON_DEPS} )"
DEPEND="${RDEPEND}
virtual/pkgconfig
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
use python && python-single-r1_pkg_setup
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
eautoreconf
}
src_configure() {
if use kernel ; then
ewarn "Note that kernel backend is very slow for this type of operation"
ewarn "and is provided mainly for embedded systems wanting to avoid"
ewarn "userspace crypto libraries."
fi
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable python) \
$(use_enable reencrypt cryptsetup-reencrypt) \
$(use_enable udev) \
$(use_enable !urandom dev-random) \
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
if use static ; then
mv "${ED}"/sbin/cryptsetup{.static,} || die
mv "${ED}"/sbin/veritysetup{.static,} || die
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
fi
prune_libtool_files --modules
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
}
pkg_postinst() {
if [[ -z ${REPLACING_VERSIONS} ]] ; then
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
fi
}

View File

@ -0,0 +1,122 @@
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.5.ebuild,v 1.1 2014/07/01 07:27:44 robbat2 Exp $
EAPI=5
PYTHON_COMPAT=( python{2_6,2_7} )
inherit autotools python-single-r1 linux-info libtool eutils versionator
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.xz"
SRC_URI="mirror://kernel/linux/utils/${PN}/v$(get_version_component_range 1-2)/${P}.tar.xz"
LICENSE="GPL-2+"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
# we don't support nss since it doesn't allow cryptsetup to be built statically
# and it's missing ripemd160 support so it can't provide full backward compatibility
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
python? ( ${PYTHON_REQUIRED_USE} )"
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
dev-libs/popt[static-libs(+)]
sys-apps/util-linux[static-libs(+)]
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
openssl? ( dev-libs/openssl[static-libs(+)] )
sys-fs/lvm2[static-libs(+)]
sys-libs/e2fsprogs-libs[static-libs(+)]
udev? ( virtual/udev[static-libs(+)] )"
# We have to always depend on ${LIB_DEPEND} rather than put behind
# !static? () because we provide a shared library which links against
# these other packages. #414665
RDEPEND="static-libs? ( ${LIB_DEPEND} )
${LIB_DEPEND//\[static-libs\(+\)\]}
python? ( ${PYTHON_DEPS} )"
DEPEND="${RDEPEND}
virtual/pkgconfig
static? ( ${LIB_DEPEND} )"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
use python && python-single-r1_pkg_setup
}
src_prepare() {
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
eautoreconf
}
src_configure() {
if use kernel ; then
ewarn "Note that kernel backend is very slow for this type of operation"
ewarn "and is provided mainly for embedded systems wanting to avoid"
ewarn "userspace crypto libraries."
fi
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable static static-cryptsetup) \
$(use_enable static-libs static) \
$(use_enable nls) \
$(use_enable python) \
$(use_enable reencrypt cryptsetup-reencrypt) \
$(use_enable udev) \
$(use_enable !urandom dev-random) \
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
local p
for p in /dev/mapper /dev/loop* ; do
addwrite ${p}
done
default
}
src_install() {
default
if use static ; then
mv "${ED}"/sbin/cryptsetup{.static,} || die
mv "${ED}"/sbin/veritysetup{.static,} || die
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
fi
prune_libtool_files --modules
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
}
pkg_postinst() {
if [[ -z ${REPLACING_VERSIONS} ]] ; then
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
fi
}

View File

@ -0,0 +1,40 @@
# /lib/rcscripts/addons/dm-crypt-stop.sh
# Try to remove any dm-crypt mappings
csetup=/sbin/cryptsetup
if [ -f /etc/conf.d/dmcrypt ] && [ -x "$csetup" ]
then
einfo "Removing dm-crypt mappings"
/bin/egrep "^(target|swap)" /etc/conf.d/dmcrypt | \
while read targetline
do
target=
swap=
eval ${targetline}
[ -n "${swap}" ] && target=${swap}
[ -z "${target}" ] && ewarn "Invalid line in /etc/conf.d/dmcrypt: ${targetline}"
ebegin "Removing dm-crypt mapping for: ${target}"
${csetup} remove ${target}
eend $? "Failed to remove dm-crypt mapping for: ${target}"
done
if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" /etc/conf.d/dmcrypt) ]] ; then
einfo "Taking down any dm-crypt loop devices"
/bin/egrep -e "^(source)" /etc/conf.d/dmcrypt | while read sourceline
do
source=
eval ${sourceline}
if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
ebegin " Taking down ${source}"
/sbin/losetup -d ${source}
eend $? " Failed to remove loop"
fi
done
fi
fi
# vim:ts=4

View File

@ -0,0 +1,26 @@
#!/sbin/runscript
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.0.5-dmcrypt.rc,v 1.4 2011/01/18 20:05:18 vapier Exp $
depend() {
before checkfs fsck
}
start() {
if [ ! -e /lib/librc.so ]; then
eerror "The ${myservice} init script is written for baselayout-2"
eerror "Please do not use it with baselayout-1"
return 1
fi
. /lib/rcscripts/addons/dm-crypt-start.sh
}
stop() {
if [ ! -e /lib/librc.so ]; then
return 0
fi
. /lib/rcscripts/addons/dm-crypt-stop.sh
}

View File

@ -0,0 +1,98 @@
# /etc/conf.d/dmcrypt
# For people who run dmcrypt on top of some other layer (like raid),
# use rc_need to specify that requirement. See the runscript(8) man
# page for more information.
#--------------------
# Instructions
#--------------------
# Note regarding the syntax of this file. This file is *almost* bash,
# but each line is evaluated separately. Separate swaps/targets can be
# specified. The init-script which reads this file assumes that a
# swap= or target= line starts a new section, similar to lilo or grub
# configuration.
# Note when using gpg keys and /usr on a separate partition, you will
# have to copy /usr/bin/gpg to /bin/gpg so that it will work properly
# and ensure that gpg has been compiled statically.
# See http://bugs.gentoo.org/90482 for more information.
# Note that the init-script which reads this file detects whether your
# partition is LUKS or not. No mkfs is run unless you specify a makefs
# option.
# Global options:
#----------------
# Max number of checks to perform (1 per second)
#dmcrypt_max_timeout=120
# Arguments:
#-----------
# target=<name> == Mapping name for partition.
# swap=<name> == Mapping name for swap partition.
# source='<dev>' == Real device for partition.
# key='</path/to/keyfile>[:<mode>]' == Fullpath from / or from inside removable media.
# remdev='<dev>' == Device that will be assigned to removable media.
# gpg_options='<opts>' == Default are --quiet --decrypt
# options='<opts>' == cryptsetup, for LUKS you can only use --readonly
# loop_file='<file>' == Loopback file.
# pre_mount='cmds' == commands to execute before mounting partition.
# post_mount='cmds' == commands to execute after mounting partition.
#-----------
# Supported Modes
# gpg == decrypt and pipe key into cryptsetup.
# Note: new-line character must not be part of key.
# Command to erase \n char: 'cat key | tr -d '\n' > cleanKey'
#--------------------
# dm-crypt examples
#--------------------
## swap
# Swap partitions. These should come first so that no keys make their
# way into unencrypted swap.
# If no options are given, they will default to: -c aes -h sha1 -d /dev/urandom
# If no makefs is given then mkswap will be assumed
#swap=crypt-swap
#source='/dev/hda2'
## /home with passphrase
#target=crypt-home
#source='/dev/hda5'
## /home with regular keyfile
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey'
## /home with gpg protected key
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey:gpg'
## /home with regular keyfile on removable media(such as usb-stick)
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey'
#remdev='/dev/sda1'
##/home with gpg protected key on removable media(such as usb-stick)
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey:gpg'
#remdev='/dev/sda1'
##/tmp with regular keyfile
#target=crypt-tmp
#source='/dev/hda6'
#key='/full/path/to/tmpkey'
#pre_mount='/sbin/mkreiserfs -f -f ${dev}'
#post_mount='chown root:root ${mount_point}; chmod 1777 ${mount_point}'
## Loopback file example
#mount='crypt-loop-home'
#source='/dev/loop0'
#loop_file='/mnt/crypt/home'

View File

@ -0,0 +1,294 @@
# /lib/rcscripts/addons/dm-crypt-start.sh
# For backwards compatability with baselayout < 1.13.0
dm_crypt_execute_checkfs() {
dm_crypt_execute_dmcrypt
}
dm_crypt_execute_volumes() {
dm_crypt_execute_dmcrypt
}
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
# some colors
local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
if [ -n "$target" ]; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "$swap" ]; then
einfo "Checking swap is not LUKS"
cryptsetup isLuks ${source} 2>/dev/null
foo="$?"
if [ "${foo}" -eq 0 ]; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ -z "$source" ] && [ ! -e "$source" ]; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [[ -n ${loop_file} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
/sbin/losetup ${source} ${loop_file}
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="$target" arg3="$source" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
if /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "$key" ]; then
read_abort() {
local ans
local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
shift
echo -n -e "${prompt}"
if ! read -n 1 $* ans ; then
local back=${prompt//?/\\b}
echo -n -e "${back}"
else
echo
fi
case $ans in
[yY]|[yY][eE][sS]) return 0;;
*) return 1;;
esac
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
key=${key/:*/}
case "$mode" in
gpg|reg)
# handle key on removable device
if [ -n "$remdev" ]; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ]; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
((++i))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "$key" ]; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin "dm-crypt map ${target}"
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
if [ "$mode" == "gpg" ]; then
: ${gpg_options:='-q -d'}
# gpg available ?
if type -p gpg >/dev/null ; then
for (( i = 0 ; i < 3 ; i++ ))
do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
[ "$ret" -eq 0 ] && break
done
eend "${ret}" "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "$mode" == "reg" ]; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
fi
fi
if [ -d "$mntrem" ]; then
umount -n ${mntrem} 2>/dev/null >/dev/null
rmdir ${mntrem} 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [[ ${ret} != 0 ]] ; then
cryptfs_status=1
else
if [[ -n ${pre_mount} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Running pre_mount commands for ${target}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "$target" ] && [ -z "$post_mount" ] && return
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [[ -z ${mount_point} ]] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [[ -n ${post_mount} ]] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Determine string lengths
strlen() {
if [ -z "$1" ]
then
echo "usage: strlen <variable_name>"
die
fi
eval echo "\${#${1}}"
}
# Lookup optional bootparams
parse_opt() {
case "$1" in
*\=*)
local key_name="`echo "$1" | cut -f1 -d=`"
local key_len=`strlen key_name`
local value_start=$((key_len+2))
echo "$1" | cut -c ${value_start}-
;;
esac
}
local cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
CMDLINE="`cat /proc/cmdline`"
for x in ${CMDLINE}
do
case "${x}" in
key_timeout\=*)
KEY_TIMEOUT=`parse_opt "${x}"`
if [ ${KEY_TIMEOUT} -gt 0 ]; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
if [[ -f /etc/conf.d/dmcrypt ]] && [[ -x /sbin/cryptsetup ]] ; then
ebegin "Setting up dm-crypt mappings"
# Fix for baselayout-1.12.10 (bug 174256)
[ -z ${SVCNAME} ] && SVCNAME="${myservice}"
while read -u 3 targetline ; do
# skip comments and blank lines
[[ ${targetline}\# == \#* ]] && continue
# check for the start of a new target/swap
case ${targetline} in
target=*|swap=*)
# If we have a target queued up, then execute it
dm_crypt_execute_${SVCNAME}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [[ -z ${target} && -z ${swap} ]] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
*)
ewarn "Skipping invalid line in /etc/conf.d/dmcrypt: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_${SVCNAME}
eval "${targetline}"
done 3< /etc/conf.d/dmcrypt
# If we have a target queued up, then execute it
dm_crypt_execute_${SVCNAME}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
fi
# vim:ts=4

View File

@ -0,0 +1,309 @@
# /lib/rcscripts/addons/dm-crypt-start.sh
# For backwards compatibility with baselayout < 1.13.0 #174256
: ${SVCNAME:=${myservice}}
# We might be hooked into init.d scripts (ala baselayout-1), or we might
# be a standalone dmcrypt script. We support multiple dmcrypt instances,
# but they must start with "dmcrypt." to be detected that way. It keeps
# our lives much simpler with this multiplexed arrangement.
execute_hook="dm_crypt_execute_dmcrypt"
conf_file="dmcrypt"
case ${SVCNAME} in
localmount) execute_hook="dm_crypt_execute_localmount" ;;
dmcrypt.*) conf_file="${SVCNAME}" ;;
esac
conf_file="/etc/conf.d/${conf_file}"
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
# some colors
local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
if [ -n "$target" ]; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "$swap" ]; then
einfo "Checking swap is not LUKS"
cryptsetup isLuks ${source} 2>/dev/null
foo="$?"
if [ "${foo}" -eq 0 ]; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ -z "$source" ] && [ ! -e "$source" ]; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [[ -n ${loop_file} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
/sbin/losetup ${source} ${loop_file}
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="$target" arg3="$source" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
# Older versions reported:
# ${target} is active:
# Newer versions report:
# ${target} is active[ and is in use.]
if cryptsetup status ${target} | egrep -q ' is active' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "$key" ]; then
read_abort() {
local ans
local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
shift
echo -n -e "${prompt}"
if ! read -n 1 $* ans ; then
local back=${prompt//?/\\b}
echo -n -e "${back}"
else
echo
fi
case $ans in
[yY]|[yY][eE][sS]) return 0;;
*) return 1;;
esac
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
key=${key/:*/}
case "$mode" in
gpg|reg)
# handle key on removable device
if [ -n "$remdev" ]; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ]; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
((++i))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "$key" ]; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin "dm-crypt map ${target}"
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
if [ "$mode" == "gpg" ]; then
: ${gpg_options:='-q -d'}
# gpg available ?
if type -p gpg >/dev/null ; then
for (( i = 0 ; i < 3 ; i++ ))
do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
[ "$ret" -eq 0 ] && break
done
eend "${ret}" "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "$mode" == "reg" ]; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
fi
fi
if [ -d "$mntrem" ]; then
umount -n ${mntrem} 2>/dev/null >/dev/null
rmdir ${mntrem} 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [[ ${ret} != 0 ]] ; then
cryptfs_status=1
else
if [[ -n ${pre_mount} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Running pre_mount commands for ${target}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "$target" ] && [ -z "$post_mount" ] && return
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [[ -z ${mount_point} ]] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [[ -n ${post_mount} ]] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Determine string lengths
strlen() {
if [ -z "$1" ]
then
echo "usage: strlen <variable_name>"
die
fi
eval echo "\${#${1}}"
}
# Lookup optional bootparams
parse_opt() {
case "$1" in
*\=*)
local key_name="`echo "$1" | cut -f1 -d=`"
local key_len=`strlen key_name`
local value_start=$((key_len+2))
echo "$1" | cut -c ${value_start}-
;;
esac
}
local cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
CMDLINE="`cat /proc/cmdline`"
for x in ${CMDLINE}
do
case "${x}" in
key_timeout\=*)
KEY_TIMEOUT=`parse_opt "${x}"`
if [ ${KEY_TIMEOUT} -gt 0 ]; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
if [[ -f ${conf_file} ]] && [[ -x /sbin/cryptsetup ]] ; then
ebegin "Setting up dm-crypt mappings"
while read -u 3 targetline ; do
# skip comments and blank lines
[[ ${targetline}\# == \#* ]] && continue
# skip service-specific openrc configs #377927
[[ ${targetline} == rc_* ]] && continue
# check for the start of a new target/swap
case ${targetline} in
target=*|swap=*)
# If we have a target queued up, then execute it
${execute_hook}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [[ -z ${target} && -z ${swap} ]] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
dmcrypt_max_timeout=*)
# ignore global options
continue
;;
*)
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_xxx
eval "${targetline}"
done 3< ${conf_file}
# If we have a target queued up, then execute it
${execute_hook}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
fi
# vim:ts=4

View File

@ -0,0 +1,51 @@
# /lib/rcscripts/addons/dm-crypt-stop.sh
# For backwards compatibility with baselayout < 1.13.0 #174256
: ${SVCNAME:=${myservice}}
# See notes in dm-crypt-start.sh
execute_hook="dm_crypt_execute_dmcrypt"
conf_file="dmcrypt"
case ${SVCNAME} in
dmcrypt.*) conf_file="${SVCNAME}" ;;
esac
conf_file="/etc/conf.d/${conf_file}"
# Try to remove any dm-crypt mappings
csetup=/sbin/cryptsetup
if [ -f ${conf_file} ] && [ -x "$csetup" ]
then
einfo "Removing dm-crypt mappings"
/bin/egrep "^(target|swap)" ${conf_file} | \
while read targetline
do
target=
swap=
eval ${targetline}
[ -n "${swap}" ] && target=${swap}
[ -z "${target}" ] && ewarn "Invalid line in ${conf_file}: ${targetline}"
ebegin "Removing dm-crypt mapping for: ${target}"
${csetup} remove ${target}
eend $? "Failed to remove dm-crypt mapping for: ${target}"
done
if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" ${conf_file}) ]] ; then
einfo "Taking down any dm-crypt loop devices"
/bin/egrep -e "^(source)" ${conf_file} | while read sourceline
do
source=
eval ${sourceline}
if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
ebegin " Taking down ${source}"
/sbin/losetup -d ${source}
eend $? " Failed to remove loop"
fi
done
fi
fi
# vim:ts=4

View File

@ -0,0 +1,350 @@
#!/sbin/runscript
# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc,v 1.1 2013/01/17 23:35:08 robbat2 Exp $
depend() {
before checkfs fsck
}
# We support multiple dmcrypt instances based on $SVCNAME
execute_hook="dm_crypt_execute_dmcrypt"
# XXX: Should we drop this ?
# execute_hook="dm_crypt_execute_localmount"
conf_file="/etc/conf.d/${SVCNAME}"
# Get splash helpers if available.
if [ -e /sbin/splash-functions.sh ] ; then
. /sbin/splash-functions.sh
fi
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
if [ -n "${target}" ] ; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "${swap}" ] ; then
if cryptsetup isLuks ${source} 2>/dev/null ; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ "x${source#UUID}" != "x${source}" ]; then
source=${source#UUID=}
source="$(blkid -U ${source})"
fi
if [ -z "${source}" ] && [ ! -e "${source}" ] ; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [ -n "${loop_file}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
losetup ${source} ${loop_file}
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="${target}" arg3="${source}" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; }
# Older versions reported:
# ${target} is active:
# Newer versions report:
# ${target} is active[ and is in use.]
if cryptsetup status ${target} | egrep -q ' is active' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "${key}" ] ; then
read_abort() {
# some colors
local ans savetty resettty
[ -z "${NORMAL}" ] && eval $(eval_ecolors)
einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) "
shift
# This is ugly as s**t. But POSIX doesn't provide `read -t`, so
# we end up having to implement our own crap with stty/etc...
savetty=$(stty -g)
resettty='stty ${savetty}; trap - EXIT HUP INT TERM'
trap 'eval "${resettty}"' EXIT HUP INT TERM
stty -icanon
[ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))"
ans=$(dd count=1 bs=1 2>/dev/null) || ans=''
eval "${resettty}"
if [ -z "${ans}" ] ; then
printf '\r'
else
echo
fi
case ${ans} in
[yY]) return 0;;
*) return 1;;
esac
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg
key=${key/:*/}
case "${mode}" in
gpg|reg)
# handle key on removable device
if [ -n "${remdev}" ] ; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ] ; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
: $((i += 1))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "${key}" ] ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}"
if [ "${mode}" = "gpg" ] ; then
: ${gpg_options:='-q -d'}
# gpg available ?
if type -p gpg >/dev/null ; then
for i in 0 1 2 ; do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret=$?
[ ${ret} -eq 0 ] && break
done
eend ${ret} "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "${mode}" = "reg" ] ; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret=$?
eend ${ret} "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret=$?
eend ${ret} "failure running cryptsetup"
fi
fi
if [ -d "${mntrem}" ] ; then
umount -n ${mntrem} 2>/dev/null >/dev/null
rmdir ${mntrem} 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [ ${ret} -ne 0 ] ; then
cryptfs_status=1
else
if [ -n "${pre_mount}" ] ; then
dev="/dev/mapper/${target}"
ebegin " pre_mount: ${pre_mount}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "${target}" ] && [ -z "${post_mount}" ] && return
if ! cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [ -z "${mount_point}" ] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [ -n "${post_mount}" ] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Lookup optional bootparams
get_bootparam_val() {
# We're given something like:
# foo=bar=cow
# Return the "bar=cow" part.
case $1 in
*\=*)
local key=$(echo "$1" | cut -f1 -d=)
echo "$1" | cut -c $(( ${#key} + 2 ))
;;
esac
}
start() {
local header=true cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
local x
for x in $(cat /proc/cmdline) ; do
case "${x}" in
key_timeout\=*)
local KEY_TIMEOUT=$(get_bootparam_val "${x}")
if [ ${KEY_TIMEOUT} -gt 0 ] ; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
while read -u 3 targetline ; do
case ${targetline} in
# skip comments and blank lines
""|"#"*) continue ;;
# skip service-specific openrc configs #377927
rc_*) continue ;;
esac
${header} && ebegin "Setting up dm-crypt mappings"
header=false
# check for the start of a new target/swap
case ${targetline} in
target=*|swap=*)
# If we have a target queued up, then execute it
${execute_hook}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [ -z "${target}${swap}" ] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
dmcrypt_max_timeout=*)
# ignore global options
continue
;;
*)
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_xxx
eval "${targetline}"
done 3< ${conf_file}
# If we have a target queued up, then execute it
${execute_hook}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
}
stop() {
local line header
# Break down all mappings
header=true
egrep "^(target|swap)=" ${conf_file} | \
while read line ; do
${header} && einfo "Removing dm-crypt mappings"
header=false
target= swap=
eval ${line}
[ -n "${swap}" ] && target=${swap}
if [ -z "${target}" ] ; then
ewarn "invalid line in ${conf_file}: ${line}"
continue
fi
ebegin " ${target}"
cryptsetup remove ${target}
eend $?
done
# Break down loop devices
header=true
grep '^source=./dev/loop' ${conf_file} | \
while read line ; do
${header} && einfo "Detaching dm-crypt loop devices"
header=false
source=
eval ${line}
ebegin " ${source}"
losetup -d "${source}"
eend $?
done
return 0
}

View File

@ -0,0 +1,21 @@
2008-09-13 Doug Goldstein <cardoe@gentoo.org>
* switch to udevadm settle since udevsettle has been deprecated
and finally removed with udev 126.
--- cryptsetup-1.0.6/lib/libdevmapper.c
+++ cryptsetup-1.0.6/lib/libdevmapper.c
@@ -18,11 +18,11 @@
#define CRYPT_TARGET "crypt"
-#define UDEVSETTLE "/sbin/udevsettle"
+#define UDEVSETTLE "/sbin/udevadm settle"
-static void run_udevsettle(void)
+static int run_udevsettle(void)
{
- system(UDEVSETTLE);
+ return system(UDEVSETTLE);
}
static void set_dm_error(int level, const char *file, int line,

View File

@ -0,0 +1,13 @@
--- a/configure.ac 2013-03-24 05:02:02.000000000 -0400
+++ b/configure.ac 2013-08-06 15:57:57.844461481 -0400
@@ -149,8 +149,8 @@
if test x$enable_static_cryptsetup = xyes; then
saved_PKG_CONFIG=$PKG_CONFIG
PKG_CONFIG="$PKG_CONFIG --static"
- PKG_CHECK_MODULES([OPENSSL], [openssl])
- CRYPTO_STATIC_LIBS=$OPENSSL_LIBS
+ PKG_CHECK_MODULES([OPENSSL_STATIC], [openssl])
+ CRYPTO_STATIC_LIBS=$OPENSSL_STATIC_LIBS
PKG_CONFIG=$saved_PKG_CONFIG
fi
NO_FIPS([])

View File

@ -0,0 +1,346 @@
#!/sbin/runscript
# Copyright 1999-2012 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/dmcrypt.rc,v 1.4 2012/05/11 08:33:01 vapier Exp $
depend() {
before checkfs fsck
}
# We support multiple dmcrypt instances based on $SVCNAME
execute_hook="dm_crypt_execute_dmcrypt"
# XXX: Should we drop this ?
# execute_hook="dm_crypt_execute_localmount"
conf_file="/etc/conf.d/${SVCNAME}"
# Get splash helpers if available.
if [ -e /sbin/splash-functions.sh ] ; then
. /sbin/splash-functions.sh
fi
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
if [ -n "${target}" ] ; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "${swap}" ] ; then
if cryptsetup isLuks ${source} 2>/dev/null ; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ -z "${source}" ] && [ ! -e "${source}" ] ; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [ -n "${loop_file}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
losetup ${source} ${loop_file}
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="${target}" arg3="${source}" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; }
# Older versions reported:
# ${target} is active:
# Newer versions report:
# ${target} is active[ and is in use.]
if cryptsetup status ${target} | egrep -q ' is active' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "${key}" ] ; then
read_abort() {
# some colors
local ans savetty resettty
[ -z "${NORMAL}" ] && eval $(eval_ecolors)
einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) "
shift
# This is ugly as s**t. But POSIX doesn't provide `read -t`, so
# we end up having to implement our own crap with stty/etc...
savetty=$(stty -g)
resettty='stty ${savetty}; trap - EXIT HUP INT TERM'
trap 'eval "${resettty}"' EXIT HUP INT TERM
stty -icanon
[ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))"
ans=$(dd count=1 bs=1 2>/dev/null) || ans=''
eval "${resettty}"
if [ -z "${ans}" ] ; then
printf '\r'
else
echo
fi
case ${ans} in
[yY]) return 0;;
*) return 1;;
esac
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg
key=${key/:*/}
case "${mode}" in
gpg|reg)
# handle key on removable device
if [ -n "${remdev}" ] ; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ] ; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
: $((i += 1))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "${key}" ] ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}"
if [ "${mode}" = "gpg" ] ; then
: ${gpg_options:='-q -d'}
# gpg available ?
if type -p gpg >/dev/null ; then
for i in 0 1 2 ; do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret=$?
[ ${ret} -eq 0 ] && break
done
eend ${ret} "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "${mode}" = "reg" ] ; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret=$?
eend ${ret} "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret=$?
eend ${ret} "failure running cryptsetup"
fi
fi
if [ -d "${mntrem}" ] ; then
umount -n ${mntrem} 2>/dev/null >/dev/null
rmdir ${mntrem} 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [ ${ret} -ne 0 ] ; then
cryptfs_status=1
else
if [ -n "${pre_mount}" ] ; then
dev="/dev/mapper/${target}"
ebegin " pre_mount: ${pre_mount}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "${target}" ] && [ -z "${post_mount}" ] && return
if ! cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [ -z "${mount_point}" ] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [ -n "${post_mount}" ] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Lookup optional bootparams
get_bootparam_val() {
# We're given something like:
# foo=bar=cow
# Return the "bar=cow" part.
case $1 in
*\=*)
local key=$(echo "$1" | cut -f1 -d=)
echo "$1" | cut -c $(( ${#key} + 2 ))
;;
esac
}
start() {
local header=true cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
local x
for x in $(cat /proc/cmdline) ; do
case "${x}" in
key_timeout\=*)
local KEY_TIMEOUT=$(get_bootparam_val "${x}")
if [ ${KEY_TIMEOUT} -gt 0 ] ; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
while read -u 3 targetline ; do
case ${targetline} in
# skip comments and blank lines
""|"#"*) continue ;;
# skip service-specific openrc configs #377927
rc_*) continue ;;
esac
${header} && ebegin "Setting up dm-crypt mappings"
header=false
# check for the start of a new target/swap
case ${targetline} in
target=*|swap=*)
# If we have a target queued up, then execute it
${execute_hook}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [ -z "${target}${swap}" ] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
dmcrypt_max_timeout=*)
# ignore global options
continue
;;
*)
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_xxx
eval "${targetline}"
done 3< ${conf_file}
# If we have a target queued up, then execute it
${execute_hook}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
}
stop() {
local line header
# Break down all mappings
header=true
egrep "^(target|swap)=" ${conf_file} | \
while read line ; do
${header} && einfo "Removing dm-crypt mappings"
header=false
target= swap=
eval ${line}
[ -n "${swap}" ] && target=${swap}
if [ -z "${target}" ] ; then
ewarn "invalid line in ${conf_file}: ${line}"
continue
fi
ebegin " ${target}"
cryptsetup remove ${target}
eend $?
done
# Break down loop devices
header=true
grep '^source=./dev/loop' ${conf_file} | \
while read line ; do
${header} && einfo "Detaching dm-crypt loop devices"
header=false
source=
eval ${line}
ebegin " ${source}"
losetup -d "${source}"
eend $?
done
return 0
}

View File

@ -0,0 +1,17 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>base-system</herd>
<use>
<flag name="dynamic">Build cryptsetup dynamically</flag>
<flag name="gcrypt">Use <pkg>dev-libs/libgcrypt</pkg> crypto backend</flag>
<flag name="kernel">Use kernel crypto backend (mainly for embedded systems)</flag>
<flag name="nettle">Use <pkg>dev-libs/nettle</pkg> crypto backend</flag>
<flag name="openssl">Use <pkg>dev-libs/openssl</pkg> crypto backend</flag>
<flag name="urandom">Use /dev/urandom instead of /dev/random</flag>
<flag name="reencrypt">Build cryptsetup-reencrypt</flag>
</use>
<upstream>
<remote-id type="google-code">cryptsetup</remote-id>
</upstream>
</pkgmetadata>