mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-20 05:51:18 +02:00
Merge pull request #117 from marineam/cryptsetup
bump(sys-fs/cryptsetup): sync with upstream
This commit is contained in:
commit
636076db95
12
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.0.6-r2
vendored
Normal file
12
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.0.6-r2
vendored
Normal file
@ -0,0 +1,12 @@
|
||||
DEFINED_PHASES=compile install postinst setup unpack
|
||||
DEPEND=>=sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
HOMEPAGE=http://luks.endorphin.org/ http://code.google.com/p/cryptsetup/
|
||||
IUSE=dynamic nls selinux
|
||||
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=>=sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
|
||||
SLOT=0
|
||||
SRC_URI=http://luks.endorphin.org/source/cryptsetup-1.0.6.tar.bz2
|
||||
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 flag-o-matic 65cef1287b9d62b1a0f180765d1e0c69 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=d95e561b1dee1b9e31fbba33bea7c54b
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.1.3-r3
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.1.3-r3
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup
|
||||
DEPEND=>=sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks >=sys-apps/util-linux-2.17.2 !dynamic? ( || ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 ) || ( >=dev-libs/popt-1.16-r1[static-libs] <dev-libs/popt-1.16-r1 ) dev-libs/libgcrypt:0[static-libs] || ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 ) )
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=2
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=dynamic nls selinux
|
||||
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=>=sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 ) selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks >=sys-apps/util-linux-2.17.2
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.1.3.tar.bz2
|
||||
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=5939a762b2970e56157cce11a7392c29
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.2.0-r1
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.2.0-r1
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=!static? ( >=dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks static? ( >=dev-libs/libgpg-error-1.10[static-libs] >=dev-libs/popt-1.16-r1[static-libs] || ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 ) dev-libs/libgcrypt:0[static-libs] || ( >=sys-fs/lvm2-2.02.88[static-libs] <sys-fs/lvm2-2.02.88 ) virtual/udev[static-libs] )
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=2
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=nls selinux +static
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=!static? ( >=dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.2.0.tar.bz2
|
||||
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=3075ed8e7d04a7f6a74595181abbefb4
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.4.3
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.4.3
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !<sys-apps/baselayout-2 !sys-fs/cryptsetup-luks selinux? ( sys-libs/libselinux ) static? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) )
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=4
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=nls selinux static static-libs udev
|
||||
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !<sys-apps/baselayout-2 !sys-fs/cryptsetup-luks selinux? ( sys-libs/libselinux )
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.4.3.tar.bz2
|
||||
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=d40e6cec4d03b53d4bc5f3f5b9aa1a30
|
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.5.1
vendored
Normal file
13
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.5.1
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux dev-libs/libgcrypt:0 sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) selinux? ( sys-libs/libselinux ) static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) )
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=4
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=nls python reencrypt selinux static static-libs udev urandom
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
|
||||
LICENSE=GPL-2
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] dev-libs/libgcrypt:0[static-libs(+)] sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux dev-libs/libgcrypt:0 sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) selinux? ( sys-libs/libselinux )
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.5.1.tar.bz2
|
||||
_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 python 305197b0aa1194fa3ef67ca21f6faa7e toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=e485cd810fed4cfb125e51995c65f1cb
|
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.2
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.2
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=5
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
|
||||
KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86
|
||||
LICENSE=GPL-2+
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
|
||||
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.2.tar.bz2
|
||||
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=9a89f15b4731426d9207d71a551b36db
|
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.3
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.3
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=5
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
|
||||
LICENSE=GPL-2+
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
|
||||
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
|
||||
SLOT=0
|
||||
SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.3.tar.bz2
|
||||
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=8c0d12e561582e098729cca132078263
|
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.4
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.4
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=5
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
|
||||
LICENSE=GPL-2+
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
|
||||
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.4.tar.xz
|
||||
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=2cee1b3883a5db817fbcade015586a03
|
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.5
vendored
Normal file
14
sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.5
vendored
Normal file
@ -0,0 +1,14 @@
|
||||
DEFINED_PHASES=configure install postinst prepare setup test
|
||||
DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool
|
||||
DESCRIPTION=Tool to setup encrypted devices with dm-crypt
|
||||
EAPI=5
|
||||
HOMEPAGE=http://code.google.com/p/cryptsetup/
|
||||
IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7
|
||||
KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86
|
||||
LICENSE=GPL-2+
|
||||
RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] )
|
||||
REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) )
|
||||
SLOT=0
|
||||
SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.5.tar.xz
|
||||
_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4
|
||||
_md5_=1e4b280955b331259db9e7feecc0c354
|
712
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/ChangeLog
vendored
Normal file
712
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/ChangeLog
vendored
Normal file
@ -0,0 +1,712 @@
|
||||
# ChangeLog for sys-fs/cryptsetup
|
||||
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.169 2014/07/01 07:27:44 robbat2 Exp $
|
||||
|
||||
*cryptsetup-1.6.5 (01 Jul 2014)
|
||||
|
||||
01 Jul 2014; Robin H. Johnson <robbat2@gentoo.org> +cryptsetup-1.6.5.ebuild:
|
||||
Bump per bug #515838.
|
||||
|
||||
*cryptsetup-1.6.4 (03 Mar 2014)
|
||||
|
||||
03 Mar 2014; Lars Wendler <polynomial-c@gentoo.org> -cryptsetup-1.1.2.ebuild,
|
||||
-cryptsetup-1.4.1.ebuild, -cryptsetup-1.4.1-r1.ebuild,
|
||||
-cryptsetup-1.4.2.ebuild, -cryptsetup-1.6.0.ebuild, -cryptsetup-1.6.1.ebuild,
|
||||
+cryptsetup-1.6.4.ebuild, -files/1.1.0-libudev.patch,
|
||||
-files/1.1.0_rc3-static-no-selinux.patch, -files/1.4.1-dmcrypt.rc:
|
||||
Version bump (bug #503280). Removed old.
|
||||
|
||||
01 Mar 2014; Michał Górny <mgorny@gentoo.org> cryptsetup-1.1.2.ebuild,
|
||||
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild,
|
||||
cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.1.ebuild, cryptsetup-1.4.2.ebuild,
|
||||
cryptsetup-1.4.3.ebuild, cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild,
|
||||
cryptsetup-1.6.1.ebuild, cryptsetup-1.6.2.ebuild, cryptsetup-1.6.3.ebuild:
|
||||
Update libgcrypt dep to use slot :0.
|
||||
|
||||
18 Jan 2014; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for alpha, wrt bug #487652
|
||||
|
||||
15 Jan 2014; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for ia64, wrt bug #487652
|
||||
|
||||
*cryptsetup-1.6.3 (27 Dec 2013)
|
||||
|
||||
27 Dec 2013; Lars Wendler <polynomial-c@gentoo.org> +cryptsetup-1.6.3.ebuild:
|
||||
Version bump by Manuel Rüger (bug #496126).
|
||||
|
||||
23 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for sparc, wrt bug #487652
|
||||
|
||||
22 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for ppc64, wrt bug #487652
|
||||
|
||||
21 Dec 2013; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for ppc, wrt bug #487652
|
||||
|
||||
01 Dec 2013; Johannes Huber <johu@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
x86 stable, bug #487652
|
||||
|
||||
27 Nov 2013; Markus Meier <maekke@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
arm stable, bug #487652
|
||||
|
||||
19 Nov 2013; Chema Alonso <nimiux@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for amd64 wrt bug #487652
|
||||
|
||||
09 Nov 2013; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.6.2.ebuild:
|
||||
Stable for HPPA (bug #487652).
|
||||
|
||||
05 Sep 2013; Michał Górny <mgorny@gentoo.org> cryptsetup-1.6.1.ebuild:
|
||||
Clean up PYTHON_COMPAT from old implementations.
|
||||
|
||||
*cryptsetup-1.6.2 (14 Aug 2013)
|
||||
|
||||
14 Aug 2013; Tim Harder <radhermit@gentoo.org> +cryptsetup-1.6.2.ebuild:
|
||||
Version bump.
|
||||
|
||||
14 Aug 2013; Tim Harder <radhermit@gentoo.org> metadata.xml:
|
||||
Simplify USE flag descriptions.
|
||||
|
||||
06 Aug 2013; Ian Stakenvicius <axs@gentoo.org>
|
||||
+files/cryptsetup-1.6.1-openssl-static.patch, cryptsetup-1.6.1.ebuild:
|
||||
fixed compilation error when USE='openssl static', bug 472692; dropped
|
||||
IUSE=selinux as there is no direct dep, selinux support comes from
|
||||
libdevmapper via sys-fs/lvm2[selinux]
|
||||
|
||||
04 Jun 2013; Diego E. Pettenò <flameeyes@gentoo.org> cryptsetup-1.6.1.ebuild:
|
||||
Fix broken dependencies.
|
||||
|
||||
04 Jun 2013; Tim Harder <radhermit@gentoo.org> cryptsetup-1.6.1.ebuild:
|
||||
Drop -caps use dep from libgcrypt to fix dep tree (and libgcrypt now has
|
||||
capabilities disabled by default).
|
||||
|
||||
*cryptsetup-1.6.1 (04 Jun 2013)
|
||||
|
||||
04 Jun 2013; Tim Harder <radhermit@gentoo.org> +cryptsetup-1.6.1.ebuild,
|
||||
metadata.xml:
|
||||
Version bump (bug #464610 by Manuel Rüger), convert to python-single-r1, add
|
||||
support for choosing a crypto backend (gcrypt, kernel, nettle, or openssl),
|
||||
remove old postinst warning, and only show postinst logs on new installs.
|
||||
|
||||
09 Apr 2013; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
Remove sys-fs/device-mapper from || () syntax in favour of sys-fs/lvm2 wrt
|
||||
#461382
|
||||
|
||||
21 Jan 2013; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.3.ebuild,
|
||||
cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild:
|
||||
Add USE=udev control #453390 by Piotr Mitas.
|
||||
|
||||
21 Jan 2013; Samuli Suominen <ssuominen@gentoo.org> cryptsetup-1.5.1.ebuild,
|
||||
cryptsetup-1.6.0.ebuild:
|
||||
Restore virtual/udev dependency wrt #453390 by Piotr Mitas
|
||||
|
||||
*cryptsetup-1.6.0 (17 Jan 2013)
|
||||
*cryptsetup-1.5.1 (17 Jan 2013)
|
||||
|
||||
17 Jan 2013; Robin H. Johnson <robbat2@gentoo.org> +cryptsetup-1.5.1.ebuild,
|
||||
+cryptsetup-1.6.0.ebuild, +files/1.5.1-dmcrypt.rc, metadata.xml:
|
||||
Bump per bug #421249. Add UUID support per bug #420015.
|
||||
|
||||
21 Dec 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
Drop udev dep since cryptsetup no longer calls udevsettle at runtime #445660
|
||||
by Piotr Karbowski.
|
||||
|
||||
16 Dec 2012; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
alpha/ia64/s390/sh/sparc stable wrt #429704
|
||||
|
||||
29 Nov 2012; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild, cryptsetup-1.1.2.ebuild,
|
||||
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild,
|
||||
cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.2.ebuild,
|
||||
cryptsetup-1.4.3.ebuild:
|
||||
Use virtual/udev instead of sys-fs/udev wrt #444398
|
||||
|
||||
21 Nov 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
Stable for x86, tested by Vicente Olivert Riera <peratu@carrosses.com>, wrt
|
||||
bug #429704
|
||||
|
||||
30 Oct 2012; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
Stable for HPPA (bug #429704).
|
||||
|
||||
25 Oct 2012; Anthony G. Basile <blueness@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
stable arm ppc ppc64, bug #429704
|
||||
|
||||
22 Oct 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.3.ebuild:
|
||||
Stable for amd64, wrt bug #429704
|
||||
|
||||
21 Oct 2012; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
|
||||
Update sys-fs/udev dependency because stable udev was revision bumped.
|
||||
|
||||
*cryptsetup-1.4.3 (06 Jun 2012)
|
||||
|
||||
06 Jun 2012; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.3.ebuild:
|
||||
Version bump #419829 by Manuel Rüger (mrueg).
|
||||
|
||||
21 May 2012; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
|
||||
Fix sys-fs/udev dependency within || ( ) block from -171-r5 to -171-r6 wrt
|
||||
#416653, Comment #3 by Mariusz Pękala
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.2.ebuild:
|
||||
Always depend on library packages as we install a shared lib as pointed out by
|
||||
Samuli Suominen #414665 by Egor Y. Egorov.
|
||||
|
||||
*cryptsetup-1.4.2 (11 May 2012)
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.2.ebuild,
|
||||
files/dmcrypt.rc:
|
||||
Version bump #412795 by Manuel Rüger (mrueg). Replace `read -t` with stty
|
||||
hacks by Martin Väth #255528.
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> +files/1.4.1-dmcrypt.rc,
|
||||
cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild:
|
||||
Rename stable dmcrypt init.d so updates can land for newer versions.
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> files/dmcrypt.rc:
|
||||
Use POSIX compliant for loop #408117 by Maxim Kammerer.
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1-r1.ebuild:
|
||||
Add write access to /dev/mapper and /dev/loop for tests #408047 by Toralf
|
||||
Förster.
|
||||
|
||||
11 May 2012; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1-r1.ebuild:
|
||||
Unify static lib dependencies and update to EAPI=4.
|
||||
|
||||
01 Apr 2012; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
alpha/ia64/s390/sh/sparc stable wrt #401217
|
||||
|
||||
30 Mar 2012; Markus Meier <maekke@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
arm stable, bug #401217
|
||||
|
||||
*cryptsetup-1.4.1-r1 (20 Mar 2012)
|
||||
|
||||
20 Mar 2012; Samuli Suominen <ssuominen@gentoo.org>
|
||||
+cryptsetup-1.4.1-r1.ebuild:
|
||||
Don't enable USE="static" by default anymore because initramfs is required
|
||||
with latest udev for separate /usr in anycase. This was a workaround for
|
||||
cross / and /usr linking.
|
||||
|
||||
20 Mar 2012; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild:
|
||||
Make sure sys-fs/udev has been emerged with USE="static-libs" for
|
||||
USE="static" wrt #409039 by jannis
|
||||
|
||||
14 Mar 2012; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
Stable for HPPA (bug #401217).
|
||||
|
||||
13 Mar 2012; Samuli Suominen <ssuominen@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
ppc/ppc64/x86 stable wrt #401217
|
||||
|
||||
11 Mar 2012; Agostino Sarubbo <ago@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
Stable for amd64, wrt bug #401217
|
||||
|
||||
27 Feb 2012; Robin H. Johnson <robbat2@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
|
||||
Stable version is bitten by the util-linux static-libs as well, per
|
||||
https://forums.gentoo.org/viewtopic-t-914468.html.
|
||||
|
||||
20 Nov 2011; Mike Frysinger <vapier@gentoo.org> files/dmcrypt.rc:
|
||||
Drop dead prompt code.
|
||||
|
||||
13 Nov 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.4.1.ebuild:
|
||||
Fix init.d typo #390381 by Helmut Jarausch.
|
||||
|
||||
*cryptsetup-1.4.1 (13 Nov 2011)
|
||||
|
||||
13 Nov 2011; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.4.1.ebuild,
|
||||
+files/dmcrypt.rc:
|
||||
Version bump #363521 by Attila Jecs. Rewrite init.d script to only work with
|
||||
openrc. Tweak init.d for splash support #386563 by Tim Ruffing, and make a
|
||||
bit more POSIX compliant #255528 by Martin Väth.
|
||||
|
||||
19 Sep 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.2.0-r1.ebuild:
|
||||
Simplify deps a little more, and require static-libs with lvm2 #383417 by
|
||||
Bernd Lommerzheim.
|
||||
|
||||
07 Sep 2011; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.2.0-r1.ebuild:
|
||||
Pull in util-linux for uuid and require static/static-libs properly #381197
|
||||
by Vasileios Lourdas, and drop older deps that are no longer in the tree.
|
||||
|
||||
07 Aug 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
files/1.1.3-dm-crypt-start.sh:
|
||||
Patch by ekass to skip service-specific openrc configs #377927.
|
||||
|
||||
17 Mar 2011; Samuli Suominen <ssuominen@gentoo.org>
|
||||
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild:
|
||||
Fix dev-libs/popt USE static-libs depend.
|
||||
|
||||
22 Jan 2011; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
|
||||
alpha/ia64/s390/sh/sparc stable wrt #350044
|
||||
|
||||
21 Jan 2011; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
|
||||
Stable for HPPA (bug #350044).
|
||||
|
||||
18 Jan 2011; Mike Frysinger <vapier@gentoo.org> files/1.0.5-dmcrypt.rc:
|
||||
Don't require device-mapper -- let the user select which packages they
|
||||
need for their fs stack #351251 by Jochen Klein.
|
||||
|
||||
18 Jan 2011; Kacper Kowalik <xarthisius@gentoo.org>
|
||||
cryptsetup-1.1.3-r3.ebuild:
|
||||
ppc64 stable wrt #350044
|
||||
|
||||
17 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild:
|
||||
Require new dev-libs/libgcrypt[static-libs] too #351810.
|
||||
|
||||
15 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild:
|
||||
Require libgpg-error[static-libs] when USE=static #351810 by Peter Volkov.
|
||||
|
||||
*cryptsetup-1.1.3-r3 (12 Jan 2011)
|
||||
|
||||
12 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r3.ebuild,
|
||||
files/1.1.3-dm-crypt-stop.sh:
|
||||
Push out updated addon to fix baselayout-2 support #350399 by Martin
|
||||
Kolleck.
|
||||
|
||||
08 Jan 2011; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.3-r2.ebuild:
|
||||
arm stable, bug #350044
|
||||
|
||||
*cryptsetup-1.1.3-r2 (08 Jan 2011)
|
||||
|
||||
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r2.ebuild:
|
||||
Push out updated addon to fix baselayout-1 support #350399 by Manuel
|
||||
Danisch.
|
||||
|
||||
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
files/1.1.3-dm-crypt-start.sh:
|
||||
Tweak status detection to work with newer cryptsetup output #350345 by
|
||||
Aaron Lewis.
|
||||
|
||||
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild:
|
||||
Improve tests a bit -- skip when dmcrypt is not available.
|
||||
|
||||
07 Jan 2011; Brent Baude <ranger@gentoo.org> cryptsetup-1.1.3-r1.ebuild:
|
||||
stable ppc, bug 350044
|
||||
|
||||
04 Jan 2011; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.2.0-r1.ebuild:
|
||||
Fix build failures for USE=-static #350463 by Alessandro Guido.
|
||||
|
||||
02 Jan 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org>
|
||||
cryptsetup-1.1.3-r1.ebuild:
|
||||
x86 stable wrt bug #350044
|
||||
|
||||
01 Jan 2011; Markos Chandras <hwoarang@gentoo.org>
|
||||
cryptsetup-1.1.3-r1.ebuild:
|
||||
Stable on amd64 wrt bug #350044
|
||||
|
||||
*cryptsetup-1.2.0-r1 (30 Dec 2010)
|
||||
|
||||
30 Dec 2010; Mike Frysinger <vapier@gentoo.org> -cryptsetup-1.2.0.ebuild,
|
||||
+cryptsetup-1.2.0-r1.ebuild:
|
||||
Convert to IUSE=+static and make it work again #350105 by Casey Carter.
|
||||
|
||||
*cryptsetup-1.2.0 (29 Dec 2010)
|
||||
|
||||
29 Dec 2010; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.2.0.ebuild:
|
||||
Version bump #349962 by ScytheMan.
|
||||
|
||||
29 Oct 2010; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.2.ebuild:
|
||||
Stable for HPPA (bug #327689).
|
||||
|
||||
06 Oct 2010; Mike Frysinger <vapier@gentoo.org>
|
||||
files/1.1.3-dm-crypt-start.sh:
|
||||
Do not warn about global options #329437 by Marcin Mirosław.
|
||||
|
||||
*cryptsetup-1.1.3-r1 (30 Sep 2010)
|
||||
|
||||
30 Sep 2010; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r1.ebuild,
|
||||
+files/1.1.3-dm-crypt-stop.sh:
|
||||
Update by Wolfram to let the init.d scripts be multiplexed #338876.
|
||||
|
||||
28 Aug 2010; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.2.ebuild:
|
||||
ia64/s390/sh/sparc stable wrt #327689
|
||||
|
||||
28 Aug 2010; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.2.ebuild:
|
||||
arm stable, bug #327689
|
||||
|
||||
13 Aug 2010; Joseph Jezak <josejx@gentoo.org> cryptsetup-1.1.2.ebuild:
|
||||
Marked ppc/ppc64 stable for bug #327689.
|
||||
|
||||
31 Jul 2010; Tobias Klausmann <klausman@gentoo.org>
|
||||
cryptsetup-1.1.2.ebuild:
|
||||
Stable on alpha, bug #327689
|
||||
|
||||
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
-cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.7.ebuild,
|
||||
-cryptsetup-1.0.7-r1.ebuild, -cryptsetup-1.1.0.ebuild,
|
||||
-cryptsetup-1.1.1_rc1.ebuild, -cryptsetup-1.1.1_rc2.ebuild,
|
||||
-cryptsetup-1.1.1.ebuild:
|
||||
Cleanup old versions.
|
||||
|
||||
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
cryptsetup-1.1.2.ebuild, cryptsetup-1.1.3.ebuild:
|
||||
Bug #329991: Document that users of plain (non-LUKS) volumes from the 1.0
|
||||
series MUST specify the cipher/keysize/hash, as the defaults have changed
|
||||
for security reasons.
|
||||
|
||||
27 Jul 2010; Pacho Ramos <pacho@gentoo.org> cryptsetup-1.1.2.ebuild:
|
||||
amd64 stable, bug 327689
|
||||
|
||||
23 Jul 2010; Christian Faulhammer <fauli@gentoo.org>
|
||||
cryptsetup-1.1.2.ebuild:
|
||||
stable x86, bug 327689
|
||||
|
||||
*cryptsetup-1.1.3 (21 Jul 2010)
|
||||
|
||||
21 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.1.3.ebuild:
|
||||
Version bump.
|
||||
|
||||
*cryptsetup-1.1.2 (17 Jun 2010)
|
||||
|
||||
17 Jun 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.1.2.ebuild:
|
||||
Bug #323655: version bump
|
||||
|
||||
*cryptsetup-1.1.1 (24 May 2010)
|
||||
|
||||
24 May 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.1.1.ebuild:
|
||||
Version bump.
|
||||
|
||||
*cryptsetup-1.1.1_rc2 (14 May 2010)
|
||||
|
||||
14 May 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.1.1_rc2.ebuild:
|
||||
Bug #318379: version bump. Fixes dm-crypt module loading over rc1.
|
||||
|
||||
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
cryptsetup-1.1.1_rc1.ebuild:
|
||||
Both patches are actually not needed now.
|
||||
|
||||
*cryptsetup-1.1.1_rc1 (01 May 2010)
|
||||
|
||||
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.1.1_rc1.ebuild:
|
||||
Bug #318039: version bump.
|
||||
|
||||
23 Apr 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+files/1.1.0-libudev.patch, cryptsetup-1.1.0.ebuild:
|
||||
Bug #316571: Bring in libudev for devmapper.
|
||||
|
||||
*cryptsetup-1.1.0 (14 Feb 2010)
|
||||
|
||||
14 Feb 2010; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+files/1.1.0_rc3-static-no-selinux.patch, +cryptsetup-1.1.0.ebuild:
|
||||
Version bump per bug #294934.
|
||||
|
||||
*cryptsetup-1.0.7-r1 (30 Nov 2009)
|
||||
|
||||
30 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.0.7-r1.ebuild:
|
||||
Bug #276803: old sys-fs/devicemapper not supported anymore. Use the new
|
||||
lvm2-2.02.56-r1 for safe static linking.
|
||||
|
||||
*cryptsetup-1.0.7 (28 Nov 2009)
|
||||
|
||||
28 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
|
||||
+cryptsetup-1.0.7.ebuild:
|
||||
Version bump per bug #277990.
|
||||
|
||||
31 Aug 2009; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
|
||||
arm/ia64/s390/sh/sparc stable wrt #259253
|
||||
|
||||
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
Install into rcscripts multilib dir #262838 by Thilo Bangert.
|
||||
|
||||
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
Make sure USE=selinux is respected #274034 by Petteri Räty.
|
||||
|
||||
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
|
||||
files/cryptsetup-1.0.6-udevsettle.patch:
|
||||
Do not complain if udevadm did not exec for systems that use mdev and such
|
||||
#276369 by Florian Streibelt.
|
||||
|
||||
15 Jul 2009; nixnut <nixnut@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
|
||||
ppc stable #259253
|
||||
|
||||
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
Stable on alpha, bug #259253
|
||||
|
||||
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org> ChangeLog:
|
||||
Stable on alpha, bug #259253
|
||||
|
||||
26 Jun 2009; Thomas Anderson <gentoofan23@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
stable amd64, bug 259253
|
||||
|
||||
19 Jun 2009; Brent Baude <ranger@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
|
||||
stable ppc64, bug 259253
|
||||
|
||||
17 Jun 2009; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
|
||||
Stable for HPPA (bug #259253).
|
||||
|
||||
17 Jun 2009; Christian Faulhammer <fauli@gentoo.org>
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
stable x86, bug 259253
|
||||
|
||||
16 Jun 2009; Jeremy Olexa <darkside@gentoo.org>
|
||||
files/1.0.6-r2-dm-crypt-start.sh:
|
||||
Fix dm-crypt-start.sh file for passphrase at startup issue, bug 243216
|
||||
|
||||
19 Apr 2009; Doug Goldstein <cardoe@gentoo.org>
|
||||
-files/1.0.6-dm-crypt-start.sh, -cryptsetup-1.0.5.ebuild,
|
||||
cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.6.ebuild,
|
||||
-cryptsetup-1.0.6-r1.ebuild, cryptsetup-1.0.6-r2.ebuild:
|
||||
clean up old versions. clean up depends
|
||||
|
||||
10 Apr 2009; Caleb Tennis <caleb@gentoo.org> cryptsetup-0.1-r3.ebuild,
|
||||
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
|
||||
cryptsetup-1.0.6.ebuild, cryptsetup-1.0.6-r1.ebuild,
|
||||
cryptsetup-1.0.6-r2.ebuild:
|
||||
Fix device-mapper dep for new lvm2, bug #265599
|
||||
|
||||
*cryptsetup-1.0.6-r2 (05 Oct 2008)
|
||||
|
||||
05 Oct 2008; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/1.0.6-dmcrypt.confd, +files/1.0.6-r2-dm-crypt-start.sh,
|
||||
+cryptsetup-1.0.6-r2.ebuild:
|
||||
Do not bang directly on /dev/console so we dont break when running under X
|
||||
or something.
|
||||
|
||||
15 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
|
||||
cryptsetup-1.0.6-r1.ebuild:
|
||||
Bug #237714, make the udev dep for udevadm slightly wider.
|
||||
|
||||
14 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
|
||||
cryptsetup-1.0.6-r1.ebuild:
|
||||
Fix changelog removal, and ensure a min version of udev for new revision
|
||||
since some old versions did not contain the udevadm tool yet.
|
||||
|
||||
*cryptsetup-1.0.6-r1 (14 Sep 2008)
|
||||
|
||||
14 Sep 2008; Doug Goldstein <cardoe@gentoo.org>
|
||||
+files/cryptsetup-1.0.6-udevsettle.patch, -cryptsetup-0.1-r2.ebuild,
|
||||
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
|
||||
cryptsetup-1.0.6.ebuild, +cryptsetup-1.0.6-r1.ebuild:
|
||||
fix bug #236481. block udev-126 and higher on older versions that won't
|
||||
work with it. add udev as a depend since the code calls it always. remove
|
||||
old version
|
||||
|
||||
22 Aug 2008; Doug Goldstein <cardoe@gentoo.org> metadata.xml:
|
||||
add GLEP 56 USE flag desc from use.local.desc
|
||||
|
||||
16 Aug 2008; Torsten Veller <tove@gentoo.org> metadata.xml:
|
||||
Remove strerror from metadata.xml (#89719)
|
||||
|
||||
25 Mar 2008; <ricmm@gentoo.org> cryptsetup-0.1-r2.ebuild,
|
||||
cryptsetup-0.1-r3.ebuild:
|
||||
Drop to ~mips due to unstable deps
|
||||
|
||||
*cryptsetup-1.0.6 (19 Mar 2008)
|
||||
|
||||
19 Mar 2008; Mike Frysinger <vapier@gentoo.org>
|
||||
+files/1.0.6-dm-crypt-start.sh, +cryptsetup-1.0.6.ebuild:
|
||||
Version bump #212997 by Alex Elsayed and make startup script much nicer
|
||||
#202364 by me.
|
||||
|
||||
20 Feb 2008; Chris Gianelloni <wolf31o2@gentoo.org>
|
||||
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild:
|
||||
I hate blank spaces in output for no reason, so switching from using echo to
|
||||
using an extra \n at the end of the line.
|
||||
|
||||
01 Feb 2008; Diego Pettenò <flameeyes@gentoo.org> files/1.0.5-dmcrypt.rc:
|
||||
Update init script to work with current development version of OpenRC
|
||||
(checkroot -> root; checkfs -> fsck).
|
||||
|
||||
31 Jan 2008; Chris Gianelloni <wolf31o2@gentoo.org>
|
||||
cryptsetup-1.0.5-r1.ebuild:
|
||||
Cleaning up a couple typos/errors in einfo/ewarn output. There's no actual
|
||||
code changes in this.
|
||||
|
||||
06 Nov 2007; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
|
||||
alpha/ia64/sparc stable wrt #195648
|
||||
|
||||
02 Nov 2007; Steve Dibb <beandog@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
|
||||
amd64 stable, bug 195648
|
||||
|
||||
14 Oct 2007; Markus Rothe <corsair@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
|
||||
Stable on ppc64; bug #195648
|
||||
|
||||
13 Oct 2007; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
|
||||
Stable for HPPA (bug #195648).
|
||||
|
||||
13 Oct 2007; nixnut <nixnut@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
|
||||
Stable on ppc wrt bug 195648
|
||||
|
||||
13 Oct 2007; Christian Faulhammer <opfer@gentoo.org>
|
||||
cryptsetup-1.0.5-r1.ebuild:
|
||||
stable x86, bug 195648
|
||||
|
||||
06 Oct 2007; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.0.5.ebuild,
|
||||
cryptsetup-1.0.5-r1.ebuild:
|
||||
Block cryptsetup-luks #194907 by Jakub Moc.
|
||||
|
||||
*cryptsetup-1.0.5-r1 (02 Oct 2007)
|
||||
|
||||
02 Oct 2007; Benjamin Smee <strerror@gentoo.org>
|
||||
files/1.0.5-dm-crypt-start.sh, files/1.0.5-dm-crypt-stop.sh,
|
||||
files/1.0.5-dmcrypt.rc, +cryptsetup-1.0.5-r1.ebuild:
|
||||
Fixes for bugs #180068 #181503 #164795 and other improvements. Thanks to
|
||||
Thomas Bettler for a patch
|
||||
|
||||
14 Sep 2007; Chris Gianelloni <wolf31o2@gentoo.org>
|
||||
cryptsetup-1.0.5.ebuild:
|
||||
Removed check for USE=build since it did nothing because cryptsetup isn't in
|
||||
stage1. Removed call to linux-info_pkg_setup to remove requirement on a
|
||||
configured kernel. This fixes bug #148390 from this end, but changes are
|
||||
still needed in linux-info.eclass, which is tracked at bug #192556.
|
||||
|
||||
15 Aug 2007; Benjamin Smee <strerror@gentoo.org>
|
||||
files/1.0.5-dm-crypt-start.sh:
|
||||
Change to 1.0.5-dm-crypt-start.sh to fix misplaced bin
|
||||
|
||||
*cryptsetup-1.0.5 (14 Aug 2007)
|
||||
|
||||
14 Aug 2007; Benjamin Smee <strerror@gentoo.org>
|
||||
+files/1.0.5-dm-crypt-start.sh, +files/1.0.5-dm-crypt-stop.sh,
|
||||
+files/1.0.5-dmcrypt.confd, +files/1.0.5-dmcrypt.rc,
|
||||
+cryptsetup-1.0.5.ebuild:
|
||||
Major changes for bug #177100 and others. Thanks to ikelos
|
||||
|
||||
07 Jul 2006; Thomas Cort <tcort@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Stable on alpha wrt Bug #124928.
|
||||
|
||||
28 Apr 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Stable on amd64. Bug #124928.
|
||||
|
||||
27 Apr 2006; Alec Warner <antarus@gentoo.org> Manifest:
|
||||
Fixing SHA256 digest, pass four
|
||||
|
||||
29 Apr 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Marked stable on mips.
|
||||
|
||||
10 Mar 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Mark 0.1-r3 stable on ia64. #124928
|
||||
|
||||
06 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org>
|
||||
cryptsetup-0.1-r3.ebuild:
|
||||
Stable on sparc wrt #124928
|
||||
|
||||
06 Mar 2006; Michele Noberasco <s4t4n@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Stable for x86, see bug #124928
|
||||
|
||||
05 Mar 2006; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
stable on ppc64, bug #124928
|
||||
|
||||
04 Mar 2006; <nixnut@gentoo.org> cryptsetup-0.1-r3.ebuild:
|
||||
Stable on ppc. bug #124928
|
||||
|
||||
26 Feb 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Marked stable on mips.
|
||||
|
||||
15 Feb 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Stable on ppc64; bug #118791
|
||||
|
||||
08 Feb 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Mark 0.1-r2 stable on alpha
|
||||
|
||||
*cryptsetup-0.1-r3 (02 Feb 2006)
|
||||
|
||||
02 Feb 2006; Benjamin Smee <strerror@gentoo.org>
|
||||
+files/cryptsetup-libmapper.patch, +cryptsetup-0.1-r3.ebuild:
|
||||
Bump for bug #120802
|
||||
|
||||
13 Jan 2006; Tobias Scherbaum <dertobi123@gentoo.org>
|
||||
cryptsetup-0.1-r2.ebuild:
|
||||
ppc stable, bug #118791
|
||||
|
||||
12 Jan 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Added ~ppc64
|
||||
|
||||
12 Jan 2006; Chris Gianelloni <wolf31o2@gentoo.org>
|
||||
cryptsetup-0.1-r2.ebuild:
|
||||
Stable on x86 wrt bug #118791.
|
||||
|
||||
12 Jan 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Stable on amd64. See bug #118791.
|
||||
|
||||
12 Jan 2006; Gustavo Zacarias <gustavoz@gentoo.org>
|
||||
cryptsetup-0.1-r2.ebuild:
|
||||
Stable on sparc wrt #118791
|
||||
|
||||
25 Nov 2005; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r1.ebuild:
|
||||
stable on ppc64
|
||||
|
||||
18 Oct 2005; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r1.ebuild:
|
||||
Mark 0.1-r1 stable on alpha
|
||||
|
||||
03 Sep 2005; Daniel Black <dragonheart@gentoo.org>
|
||||
cryptsetup-0.1-r1.ebuild, cryptsetup-0.1-r2.ebuild:
|
||||
dependancy fixes
|
||||
|
||||
08 Aug 2005; Aaron Walker <ka0ttic@gentoo.org> cryptsetup-0.1-r2.ebuild:
|
||||
Added ~mips for bug 89528.
|
||||
|
||||
*cryptsetup-0.1-r2 (02 Jun 2005)
|
||||
|
||||
02 Jun 2005; Benjamin Smee <strerror@gentoo.org>
|
||||
+cryptsetup-0.1-r2.ebuild:
|
||||
Now blocks with cryptsetup-luks
|
||||
|
||||
29 May 2005; Benjamin Smee <strerror@gentoo.org> cryptsetup-0.1-r1.ebuild:
|
||||
Removed "die" call as per Spanky's request.
|
||||
|
||||
25 May 2005; Herbie Hopkins <herbs@gentoo.org> cryptsetup-0.1-r1.ebuild:
|
||||
Multilib fixes.
|
||||
|
||||
24 May 2005; Benjamin Smee <strerror@gentoo.org> metadata.xml,
|
||||
cryptsetup-0.1-r1.ebuild:
|
||||
Fixed the dm-crypt check as per bug 89142
|
||||
|
||||
12 Apr 2005; Gustavo Zacarias <gustavoz@gentoo.org>
|
||||
cryptsetup-0.1-r1.ebuild:
|
||||
Stable on sparc
|
||||
|
||||
25 Mar 2005; Bryan Østergaard <kloeri@gentoo.org>
|
||||
cryptsetup-0.1-r1.ebuild:
|
||||
Add ~alpha keyword, bug 83684.
|
||||
|
||||
22 Mar 2005; Gustavo Zacarias <gustavoz@gentoo.org>
|
||||
cryptsetup-0.1-r1.ebuild:
|
||||
Keyworded ~sparc wrt #83684
|
||||
|
||||
14 Mar 2005; Rob Holland <tigger@gentoo.org> :
|
||||
fixed up module check. fixes bug #85102
|
||||
|
||||
*cryptsetup-0.1-r1 (02 Mar 2005)
|
||||
|
||||
02 Mar 2005; Martin Schlemmer <azarah@gentoo.org> +files/cryptfs.confd,
|
||||
+files/dm-crypt-start.sh, +files/dm-crypt-stop.sh,
|
||||
+cryptsetup-0.1-r1.ebuild:
|
||||
Add cryptfs conf.d file and addon scripts.
|
||||
|
||||
01 Mar 2005; Lars Weiler <pylon@gentoo.org> cryptsetup-0.1.ebuild:
|
||||
Stable on ppc.
|
||||
|
||||
13 Oct 2004; Chris Gianelloni <wolf31o2@gentoo.org> cryptsetup-0.1.ebuild:
|
||||
Stable on amd64, blame jhuebel.
|
||||
|
||||
17 Sep 2004; Rob Holland <tigger@gentoo.org> cryptsetup-0.1.ebuild:
|
||||
Marking stable on x86
|
||||
|
||||
27 Jul 2004; Travis Tilley <lv@gentoo.org> cryptsetup-0.1.ebuild:
|
||||
added ~amd64 keyword
|
||||
|
||||
22 Jul 2004; David Holm <dholm@gentoo.org> cryptsetup-0.1.ebuild:
|
||||
Added to ~ppc.
|
||||
|
||||
*cryptsetup-0.1 (21 Jul 2004)
|
||||
|
||||
21 Jul 2004; Rob Holland <tigger@gentoo.org> +cryptsetup-0.1.ebuild:
|
||||
Initial version. Closes bug #44079. Thanks to ripple@ripple.be and
|
||||
ben@disciplina.net for submitting ebuilds for it
|
30
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/Manifest
vendored
Normal file
30
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/Manifest
vendored
Normal file
@ -0,0 +1,30 @@
|
||||
AUX 1.0.5-dm-crypt-stop.sh 1022 SHA256 42015047c708aa73eae615559ff76c9c8948a5d01fba68f64c5432e30ec799a4 SHA512 6a8e55a2458278a48edaa8563ff7a586f521280587f4aacf03ab903fe6c3ae312b1925ee73a1462352d86cdc7097945f7ea842ba633ed527bbfb3a80689b1ae0 WHIRLPOOL c97f3d3485f56cb687acda6c697c4bb97e531d3aacc819ffa7073d9ac99f3e3d237e154064476e5f7ef1fce9b990792ffc992a90e083b5c93c45501f74564c58
|
||||
AUX 1.0.5-dmcrypt.rc 601 SHA256 0b58b18dc903d0d4a23e5e2df1e6f3c5db64c65b8884e24710e4b7528ea3f8dc SHA512 d18f0192eea97d5051b81b4287b96d5ffb59e2dc3611f93111ff92700916d561c246f956417f438180b9f65313f35fa85ca076872592ef87c984b91d9625c3c6 WHIRLPOOL 66eaefe2ea4ab4d82e2956891efac6e884f7997a36b9cd9527412b3d3713394d5d5144b0ec3807daee3de05dba15a0f9c7a2a1cc9f4919121f6d13ffbb2d582e
|
||||
AUX 1.0.6-dmcrypt.confd 3309 SHA256 0c30e081c0b8f879964ae49735f10b05a1d92f4f481042851958860945e13271 SHA512 d04ae17d3708ef20ade7afb223d4ef19e1b6812e0be8f9499e37e9c71344568b42030d9dd8f6918a9bfb211a3a94b40a9354e3b32a009cb165e84508d0a5e14b WHIRLPOOL 9496cd3fb3f8e8d84a5d70fd6e9853fdd2fe87df96244cb00fe73fee9a711847d795937b800ff13f98a888a288cfc5b33f564392794413e2a0b8e033165d4f5f
|
||||
AUX 1.0.6-r2-dm-crypt-start.sh 8092 SHA256 56004bef91b8fad57fe67fec19427dd7c48e01c8e1ba7ff60f8c370295775fdc SHA512 e55949ed23518f9530476973ab632f9d4af9a5a684546baf662caabe4566aeb0164484ed972ab2edf220120609c593b05fc07173da388b3fceb5063acef3aadb WHIRLPOOL 6f67efbf34bfc62b316026106fe89914c8a16f7377a64ff787e81fa80ab32654c88e803e5f0cb4ecaa943d36499d4b72c469cb2bb030c830d064836cc4ecae61
|
||||
AUX 1.1.3-dm-crypt-start.sh 8651 SHA256 1489ce5480d51beb81cf4f5178468ad4b2f2e4b3f53bc75ee8fe47d3e050a76a SHA512 4cd3e4c28f1c3da4b864c556873c2036854da78d0c3055f06ea8e2d359f16dc7020b4ebc2c0d4024dc557f51e923a919ecf384add07e92525d908efe4073af4d WHIRLPOOL b68eacec508861821c1573dd85b4fb1a5d909ab70ad8445997796cf328cd54c8a2363dfc54ae8da82b4d7e526df6938baab5332bd8cb2d1c095ac15e730541ae
|
||||
AUX 1.1.3-dm-crypt-stop.sh 1272 SHA256 c81bf0cf8e57b3f83f55c808dba619b0a0f60eef8c3ed406d266be7cecdf96f9 SHA512 ec184e988f3ab36c5f661cc4743edf8ce0798ff69e4e40df854c172eaf0bae264de10160ee098dbfb7814318b2cd875ea18e1b447789c7e08b9549b11db3f175 WHIRLPOOL cb0c1afb4929229dc7bdade5657f053192c72a6011fd0eb05ef1e649f6a31925a57e61913cbea208eb0b3e2547b8bbe37cecb4e343ba84722efe2affadfa12ca
|
||||
AUX 1.5.1-dmcrypt.rc 9453 SHA256 02faf27470ea0e50b764c923786724847e77dfdf9680a50cc202546cad2bf02f SHA512 660d1a29294e8e01343aea0b92d9159d42891261d41313c3f9e77ed3bd69e648d19d3799a8ad1b00884b6f4c0f48d4e12cb406ca291e64b789e71ba70ab3c29f WHIRLPOOL 3f36f078eb5f8d07d52b2559b2f7ba7280c620bab895b3ab34ee12619a4145ad3f04879f821b91a17805c792f0395ec96070aa218836373a38aa839fe0260505
|
||||
AUX cryptsetup-1.0.6-udevsettle.patch 561 SHA256 80c4914071769dedc20198425b4ea528ec22264ff4c54516a9e5722a8e671f60 SHA512 74631c2aab95bd32a67dce1ae75ea30acdb167be78503a31ef8afbf178b651917cc65a37bafc5d6d60c1d3545664a2f53bf07885ba3ba86f562b12db17733228 WHIRLPOOL beb109875aa9579f05527d79a12eb0ebfd187853322accb70dc9e2a36e7ca4be881aa7f504f7573a040a64e0df777e70c4fbf31f79f29728c74cffaea8029d74
|
||||
AUX cryptsetup-1.6.1-openssl-static.patch 472 SHA256 7029ba7870ff183b7dac3c658140c8c01286efd29e9427d1195b5b4e85fe2f4f SHA512 4292ee661b3e1a26b3c9b6fe8f360ed1df1cb416a13162ffa40d6610d5d0431c3dbdb17280fb1aa3aa6eeacb735ead3da4e6cc126d8be74121565b4c9bf6c6a2 WHIRLPOOL f0186cf9317560a480dab53c8c538f35ba5273401f2d37b4be9e3aae06203c43fcd22c4ce17c41cf80a01db5cd22877105ff2be0a8f3effd50cde8c9f42b68df
|
||||
AUX dmcrypt.rc 9336 SHA256 2cacfbe5b305c0ba9633764e79dfadd160e63ffb089f7347c0bca8c2ba9ec42f SHA512 0019cc0d0bb91c04b04949cdfb0126fdb04541ec4e76117760092e1287d4a4eb091ecbf643fb8e4346f226e6b01d8fe358f0f0e0221f31abc83415b5e235b17a WHIRLPOOL 527fbbebafcdd7e2e3687acdc59fb07e2fa26370508aa0758ca0deb6e12fcab789271b6733cdfd18381ddf55f606152febe6f1e4fdac26d1efd4206b7b219655
|
||||
DIST cryptsetup-1.0.6.tar.bz2 405713 SHA256 df7fda80cfa01f063caf39140287a47d018dfe056fc71a3ba605e690ff0183fd SHA512 deed2c603bfba3b26eb1cab65d880eb9fd69dc4aabc9e8fa2bf78de0879ecd5ddb03c4c6bd9c0ec166d2d5e87a13bb370e6e46d50f5dd246522e81bf75380e1b WHIRLPOOL 71e9c71387f0d6242303bcb53825595023af387b8a76c48681b74ccd38fa19b225930edddcd1369ea62854e5d95b05447b72ede707bd2a8af110242fcc41536f
|
||||
DIST cryptsetup-1.1.3.tar.bz2 499276 SHA256 9c8e68a272f6d9cfb6cd65cc0743f4c44a2096c61f74e0602bf40208b5e69c0a SHA512 ecf259f41384d0d10d522c01f12815743e3a245b897a223909bce91b95401b73d1d0bd22cbe73d1d26e44df13c0666d039879404c26b66835d49983be69637ea WHIRLPOOL 8a7ebfc3dc6a2eda339add80682f678186272ecde027006196d3a9ffebd69ddbf76665df75f1f602c22a1309d35af9c1d320d0432acb2dd89f5287dad4b04af0
|
||||
DIST cryptsetup-1.2.0.tar.bz2 523859 SHA256 411129817ff29e6a957bcbdcd9a2c4c953c1539acd8af912c383262ba901b5ea SHA512 7af9b26581d544e6207ad126e0ee4cf963b013cb1306f05e82fda1703d3fdf35b29e11f56e1fbc3641db9f52874a44057fba5b96597cfa595710cc94619692be WHIRLPOOL eb05a564bbdfac23f0b35409c30fc16b145bbe98bab364ea3e25bbdb54fe16b1238bd537788b2de6dc53271c51f6257b05380706f94e41303453f411fba57b4e
|
||||
DIST cryptsetup-1.4.3.tar.bz2 798101 SHA256 d5ff2c00f6f791d77fa5636a02ae43ddbb46c6c793bdeafdec5e38fd15f99d0a SHA512 e91ad9cda9549802e9ea5cec02273ee4bc1a040883650e903e91a07c8cce8131b0bda068fa3433d2b5b3b7470cf9481d73670267cd419ce2d7b0f673b3601ba3 WHIRLPOOL e30c3bb9ad24145e425d64069cc84d8c129dc06d775299668dea9ad06c14c95e21b8bb734f94872990c7c1586666bdc6aee79aac5c8a64bacc3aa416d23a2f24
|
||||
DIST cryptsetup-1.5.1.tar.bz2 958979 SHA256 16d23f78cab35937281a0ae7a8febce0c3a1a0f291cc94e169a7b968b81d2b36 SHA512 f1847d1833f0aba59af334a5b3919ca44b1a6dce152a44ccb76747fed5996ce83bddac9b6550ab8c63d7ca66dd9e0e79ccc2399b7b3860e8090bf776a72a77b0 WHIRLPOOL 2f24c43ba689039ab3548225cda91bea0c65cf2014e7cd57157def111493c3c2037a283cb778c3301c9d7b138f4fc8da21ce5752b9d1379d66fa01ef2481823e
|
||||
DIST cryptsetup-1.6.2.tar.bz2 1189584 SHA256 15723f0198303d4bcb99d480b7a773918e2d319f0348457988c063bdd03e109a SHA512 59fb835ef8bcd6d0c704a021055032639840ef4bb7be6ade8ff91d347ae74d8e6cba4583d8ced7a4a8c6f09ebc16c4eff3549c13c4327d92fd9234db58e18c10 WHIRLPOOL 3ab24572ea42dfdd0d5176dfa4621520cd0bccda53c3a01676d400a7a841ab9643c979c4942daa774658602bd8cdf659376cbc94c553e2097c5eb3c51a7edb31
|
||||
DIST cryptsetup-1.6.3.tar.bz2 1263747 SHA256 a2af4731d9442cb70bc84b7cecdd069493055d29ab65ab625c574b0f599938d8 SHA512 f11c58db2643f5a1035be9de699fa7cef7780f83da261dbb0425d233bcf73df6f120b71c23a8a122b1f648c8fe43eea3e15f75aa536184a537f3e5dd00a1f988 WHIRLPOOL 5e9075082c920563aeeb34556415b031c5ce51182c3430c0a679bf9873a11d6e74599fc10b4b26ca79971130dffb330e83d9ecd1365b6e892e588895df7b8a65
|
||||
DIST cryptsetup-1.6.4.tar.xz 1081492 SHA256 70b8e86eef94bbb4441ad38460d87138130d7aaaafe5d01131c3ba50b9f0dca0 SHA512 0208d856fa59425fcd1216c92f32af2efcf8bbd6f32730ae8e0fe93720d4adceadbff94684d5d3f76bae347669949fa6029ab9832dc3812830a84801f4006669 WHIRLPOOL ffde0b3774663cb897aeab6ce84f5851b6b18ed83fdfec17ebc8ea2ce4fba243fb73c95415b3c052745145b5b2478dde790120dc42c419d0bde73f47435e94a0
|
||||
DIST cryptsetup-1.6.5.tar.xz 1136892 SHA256 267973f20be43f9d685f7193aa23954b60768c74a1d330243114d4b8bc17ca9a SHA512 c77ac590d28954e7bd430d1069b820a288c4668857a7ced7f81546ea39676f2b536abbcda06f20440e31c205b7ada68bcfa5aab220b102a2b62198a788d9b65e WHIRLPOOL 74a597abbdcc1225bb811597e53737eab2348a328f3ba30e7eb519a0621b06e6c898e320db8e24a16decfd4706b6a2e68b06894dde91124e4c089e952dbff9c1
|
||||
EBUILD cryptsetup-1.0.6-r2.ebuild 3122 SHA256 e0428878fb5416942255112eb70d7a6fdb13583504fdbcdac641a0457f7b97e9 SHA512 178ba72e4687ca0b388b423626eb3ad12ae694567c2f18faf09830cda1a633c29268df13f9b074a421a31715b6e46853a942e8833381500ca7becf688571ac0d WHIRLPOOL 773a0858a6c479f1020c328ca1bd202f0e316db22f9ee075cf21a40032a4543a2337631352ab6804f05041a4bde7925aee98576fcf5ab064b603357d7be4b3d7
|
||||
EBUILD cryptsetup-1.1.3-r3.ebuild 3465 SHA256 5ad4b06a3cf68ea96ae8be24789435ab5398af40f510a2916a6b62ae4819c9a8 SHA512 6ab8e527e6df332803e65e3e385f3633153278251cd024dd671b4e71ec0696e5594348edf91441c308161689ed7465caa4a5d25ee73f31f797c796b9dd76d8f5 WHIRLPOOL 1ccbe5f4e085b8acd5ea86ea003f30a14c4d43ae61a69718d86b553029f9e63f612c84b7b2f24b8a0c77ceeb418f62a2dc42ccf17b73dd8fb837d72f8d84dc8b
|
||||
EBUILD cryptsetup-1.2.0-r1.ebuild 3656 SHA256 5a066c639ceed3b8ddbf82ebc8adb60666917273f5cab992c75418d6cfe030fe SHA512 a22cc0f0457c9f9e323b8c3752b76f1198171e44dc7379f86b5173e74a5d44a9d48c8c74fb61d1627cc895206a88a01a9fc4d7b9f5e689b03545ce9889040121 WHIRLPOOL 28553355a7e1d894a659dfe2447b17ab3240289687f2ca147371061b0daacbe9718d3dee27dc9122237fa42d4265d3ca68a365343a6999035e4f93337cdf459b
|
||||
EBUILD cryptsetup-1.4.3.ebuild 3557 SHA256 e52546b86cdcae464416c6264d5cf39c12b17c3380417c45095a659d9e460dbc SHA512 069b6e48e6839eb5d547828bffbedcadd13dc9f868b69493e8c5c6095052dbfdb1a30fa5339f626c6ddb73dfc38dd9dd862a2475f6c7dc9db375edd2239d95b1 WHIRLPOOL 693fcf51ec4484b869d69c975f4d7e8e04004ac0ebb649ca418ccd4618d059aa63a3bd5538df8c01fce3e701c024baea91daef3f4d15bafe7cd1ca8f87a1096b
|
||||
EBUILD cryptsetup-1.5.1.ebuild 3841 SHA256 ee28ec449fe8e1cbf85d134c1f83f93ffc89b5901768302685db0c89b632b2b4 SHA512 6c05ba5ee426211dd91bea0269b300366b73f3b02a1d2d7943d9193ed91932f74031177b71e8bd2d116a9ee7a272b4a5c7a1d9957911ba7ec6e16c90e76c99e6 WHIRLPOOL 9d1896939e355f86ac3c5896e4659028b5ebee3ef72592d7e94a378d122481594ca3172461c7f000ffbbf0888031792be50ad49aea30dbf6c69b42fac675f80b
|
||||
EBUILD cryptsetup-1.6.2.ebuild 4336 SHA256 d6fcda5bf1ca14e1eb3c44538dc8bd262a6e981360452d4f34c67d26bdf44dc4 SHA512 9f891931cc22554f78bbadcbf30c966feeeda060de4f6d5752e9297b9eacc8dc06fed2315af8719c5c56b26334383631b85d136637a1a12ceffc452280cb6e3f WHIRLPOOL 6b7601283a6ea93c891954d4725a798f5b2f2ef608cd43cfec8c1c0d4d0763d0b710bd2d952ccab4ec1b4ccccc0e8869c57f229c3f7b371327f12cf05728f0c7
|
||||
EBUILD cryptsetup-1.6.3.ebuild 4289 SHA256 89803dc31a19496a793bcdd257af2066899954cd2c7992c75a95fc939a59e5ad SHA512 f652f1a6ff27f580056963668d069a1dce178bfbbb9795ef5ce3a76876a7f421d431d34f2cc06ab02a56e7cf077adfc5cf8673eec705ce868bf2b3805b9d44dd WHIRLPOOL 5bee95e56b1549af8d2e177a02eefb5a08eab94c82e1d66c593eee951c972ef5c095ece98e1487681d86426ed4bda50ec4d3cc20d54ddd8b733b3f659265c505
|
||||
EBUILD cryptsetup-1.6.4.ebuild 4398 SHA256 4bdaf08c4bbbab4d537cb6fca4b58a3192ab4605a27713e09154d97fd57d9d17 SHA512 1fbf44658f90a050b9501cc47da08456c9439fe6b51b4eb2ad02225f563ddde3931421cdf86f1312670625f9d30cbeed01b1e36283570f2a4eee7ec679678464 WHIRLPOOL 3fa6210779f7b03cd8be05624750ade452702c6d4aa0e273e12843c3bf126c7472259ea2e252ae9cacfe0ae434afeef9369c22131dd0372bf75b6c216b38125f
|
||||
EBUILD cryptsetup-1.6.5.ebuild 4393 SHA256 ee46294c37be5e6034d23ab8c05b82f873cbf0e7021c0a5d41b0ffe46420eb76 SHA512 c1000b213d8c1954feb5cd1c2f0bca4a76609beba6cebe626520e0e24a517802d44c1da95b5bcd1c0803989660048122a8434bb982a64c053a4274e3fca9a490 WHIRLPOOL 4ee554e7ba3db16eab302365b9ea50e1ddf3e98daacf343ce80823d69463bdad8062e579a1870ee2071ac2c7f4af11934f4a875915cc36810acf1ca5a924980f
|
||||
MISC ChangeLog 26171 SHA256 c2383c81dcffe8c6225e4c0fdf071b14d7a86e4211b11c3d9d513bafb6ca02ae SHA512 1f254a101c25d3b80edff4cee3c01514b6a49f283c9bf139ec61e7a8fa270e5ed3622ce1fa1f7aa32c15f71572674181c7255db565a8a4493dc57db8a9061b26 WHIRLPOOL 1d5fac728ec1b76da939009c04746a45412b866bef5c35f5c0fa2fbd8acbb02758d68fa7cbbbf4f29b89497075844394393cbfa5d0168fece8e672460dab89f7
|
||||
MISC metadata.xml 763 SHA256 494337a4a156da7feba29856957ffe6babede998bbbe2aa76ad68463f7a3ba4d SHA512 4124c6744a491b4b59115fe561408bde963d7527b835e5c554b3b99b460c6b2a9e98abb294f0e3de5af8625e27efecc7b139b8887b5e8b51af93772bd3574b1a WHIRLPOOL 1b76543228dffe7115e547dc068b6db84b06ff0a5f244c5964eb21cba55c9b6ee9637d4a19c38b4b9ebeba55ac7fe4437e97c4be32f26380fec6773b76ef8fce
|
101
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild
vendored
Normal file
101
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild
vendored
Normal file
@ -0,0 +1,101 @@
|
||||
# Copyright 1999-2013 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild,v 1.17 2013/04/09 10:06:06 ssuominen Exp $
|
||||
|
||||
inherit linux-info eutils flag-o-matic multilib
|
||||
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://luks.endorphin.org/ http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
|
||||
IUSE="dynamic nls selinux"
|
||||
|
||||
RDEPEND=">=sys-fs/lvm2-2.02.45
|
||||
>=dev-libs/libgcrypt-1.1.42
|
||||
>=dev-libs/libgpg-error-1.0-r1
|
||||
>=dev-libs/popt-1.7
|
||||
virtual/udev
|
||||
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
|
||||
selinux? ( sys-libs/libselinux )
|
||||
!sys-fs/cryptsetup-luks"
|
||||
DEPEND="${RDEPEND}"
|
||||
|
||||
dm-crypt_check() {
|
||||
local CONFIG_CHECK="~DM_CRYPT"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
}
|
||||
|
||||
crypto_check() {
|
||||
local CONFIG_CHECK="~CRYPTO"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
}
|
||||
|
||||
cbc_check() {
|
||||
local CONFIG_CHECK="~CRYPTO_CBC"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
check_extra_config
|
||||
}
|
||||
|
||||
pkg_setup() {
|
||||
dm-crypt_check
|
||||
crypto_check
|
||||
cbc_check
|
||||
|
||||
if use dynamic ; then
|
||||
ewarn "If you need cryptsetup for an initrd or initramfs then you"
|
||||
ewarn "should NOT use the dynamic USE flag"
|
||||
epause 5
|
||||
fi
|
||||
}
|
||||
|
||||
src_unpack() {
|
||||
unpack ${A}
|
||||
cd "${S}"
|
||||
|
||||
# fix for bug #236481, use udevadm instead of udevsettle
|
||||
epatch "${FILESDIR}"/${PN}-1.0.6-udevsettle.patch
|
||||
}
|
||||
|
||||
src_compile() {
|
||||
use selinux || export ac_cv_lib_selinux_is_selinux_enabled=no
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
$(use_enable !dynamic static) \
|
||||
--libdir=/usr/$(get_libdir) \
|
||||
$(use_enable nls) \
|
||||
|| die
|
||||
emake || die
|
||||
}
|
||||
|
||||
src_install() {
|
||||
emake DESTDIR="${D}" install || die "install failed"
|
||||
rmdir "${D}"/usr/$(get_libdir)/cryptsetup
|
||||
insinto /$(get_libdir)/rcscripts/addons
|
||||
newins "${FILESDIR}"/1.0.6-r2-dm-crypt-start.sh dm-crypt-start.sh || die
|
||||
newins "${FILESDIR}"/1.0.5-dm-crypt-stop.sh dm-crypt-stop.sh || die
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
|
||||
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
ewarn "This ebuild introduces a new set of scripts and configuration"
|
||||
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
|
||||
ewarn "then you *MUST* copy your old file to:"
|
||||
ewarn "/etc/conf.d/dmcrypt"
|
||||
ewarn "Or your encrypted partitions will *NOT* work."
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
}
|
99
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.1.3-r3.ebuild
vendored
Normal file
99
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.1.3-r3.ebuild
vendored
Normal file
@ -0,0 +1,99 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.1.3-r3.ebuild,v 1.9 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI="2"
|
||||
|
||||
inherit linux-info eutils multilib libtool
|
||||
|
||||
MY_P=${P/_rc/-rc}
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
|
||||
IUSE="dynamic nls selinux"
|
||||
|
||||
S=${WORKDIR}/${MY_P}
|
||||
|
||||
RDEPEND=">=sys-fs/lvm2-2.02.64
|
||||
>=dev-libs/libgcrypt-1.1.42:0
|
||||
>=dev-libs/libgpg-error-1.0-r1
|
||||
>=dev-libs/popt-1.7
|
||||
virtual/udev
|
||||
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
|
||||
selinux? ( sys-libs/libselinux )
|
||||
!sys-fs/cryptsetup-luks
|
||||
>=sys-apps/util-linux-2.17.2"
|
||||
DEPEND="${RDEPEND}
|
||||
!dynamic? (
|
||||
|| ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 )
|
||||
|| ( >=dev-libs/popt-1.16-r1[static-libs] <dev-libs/popt-1.16-r1 )
|
||||
dev-libs/libgcrypt:0[static-libs]
|
||||
|| ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 )
|
||||
)"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
|
||||
if use dynamic ; then
|
||||
ewarn "If you need cryptsetup for an initrd or initramfs then you"
|
||||
ewarn "should NOT use the dynamic USE flag"
|
||||
epause 5
|
||||
fi
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
elibtoolize
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable !dynamic static) \
|
||||
--libdir=/usr/$(get_libdir) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable selinux)
|
||||
}
|
||||
|
||||
src_install() {
|
||||
emake DESTDIR="${D}" install || die
|
||||
dodoc TODO ChangeLog # README NEWS # last ones are empty
|
||||
|
||||
insinto /$(get_libdir)/rcscripts/addons
|
||||
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
|
||||
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
|
||||
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
ewarn "This ebuild introduces a new set of scripts and configuration"
|
||||
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
|
||||
ewarn "then you *MUST* copy your old file to:"
|
||||
ewarn "/etc/conf.d/dmcrypt"
|
||||
ewarn "Or your encrypted partitions will *NOT* work."
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
|
||||
}
|
108
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild
vendored
Normal file
108
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild
vendored
Normal file
@ -0,0 +1,108 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild,v 1.14 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI="2"
|
||||
|
||||
inherit linux-info eutils multilib libtool
|
||||
|
||||
MY_P=${P/_rc/-rc}
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||
IUSE="nls selinux +static"
|
||||
|
||||
S=${WORKDIR}/${MY_P}
|
||||
|
||||
RDEPEND="
|
||||
!static? (
|
||||
>=dev-libs/libgcrypt-1.1.42:0
|
||||
dev-libs/libgpg-error
|
||||
>=dev-libs/popt-1.7
|
||||
>=sys-apps/util-linux-2.17.2
|
||||
>=sys-fs/lvm2-2.02.64
|
||||
)
|
||||
virtual/udev
|
||||
>=sys-libs/e2fsprogs-libs-1.41
|
||||
selinux? ( sys-libs/libselinux )
|
||||
!sys-fs/cryptsetup-luks"
|
||||
DEPEND="${RDEPEND}
|
||||
static? (
|
||||
>=dev-libs/libgpg-error-1.10[static-libs]
|
||||
>=dev-libs/popt-1.16-r1[static-libs]
|
||||
|| ( >=sys-apps/util-linux-2.20[static-libs] <sys-apps/util-linux-2.20 )
|
||||
dev-libs/libgcrypt:0[static-libs]
|
||||
|| ( >=sys-fs/lvm2-2.02.88[static-libs] <sys-fs/lvm2-2.02.88 )
|
||||
virtual/udev[static-libs]
|
||||
)"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/enable_static_cryptsetup=yes/d' configure #350463
|
||||
sed -i '/^LOOPDEV=/s:=.*:=`losetup -f` || exit 0:' tests/{compat,mode}-test
|
||||
elibtoolize
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
--libdir=/usr/$(get_libdir) \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable selinux)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
emake DESTDIR="${D}" install || die
|
||||
use static && { mv "${D}"/sbin/cryptsetup{.static,} || die ; }
|
||||
dodoc TODO ChangeLog README NEWS
|
||||
|
||||
insinto /$(get_libdir)/rcscripts/addons
|
||||
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
|
||||
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
|
||||
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
ewarn "This ebuild introduces a new set of scripts and configuration"
|
||||
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
|
||||
ewarn "then you *MUST* copy your old file to:"
|
||||
ewarn "/etc/conf.d/dmcrypt"
|
||||
ewarn "Or your encrypted partitions will *NOT* work."
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
}
|
105
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.4.3.ebuild
vendored
Normal file
105
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.4.3.ebuild
vendored
Normal file
@ -0,0 +1,105 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.4.3.ebuild,v 1.10 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI="4"
|
||||
|
||||
inherit linux-info libtool
|
||||
|
||||
MY_P=${P/_rc/-rc}
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
|
||||
IUSE="nls selinux static static-libs udev"
|
||||
|
||||
S=${WORKDIR}/${MY_P}
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
>=dev-libs/popt-1.7[static-libs(+)]
|
||||
>=sys-apps/util-linux-2.17.2[static-libs(+)]
|
||||
>=dev-libs/libgcrypt-1.1.42:0[static-libs(+)]
|
||||
>=sys-fs/lvm2-2.02.64[static-libs(+)]
|
||||
>=sys-libs/e2fsprogs-libs-1.41[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs(+)]}
|
||||
!<sys-apps/baselayout-2
|
||||
!sys-fs/cryptsetup-luks
|
||||
selinux? ( sys-libs/libselinux )"
|
||||
DEPEND="${RDEPEND}
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test
|
||||
elibtoolize
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable selinux) \
|
||||
$(use_enable udev)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
use static && { mv "${ED}"/sbin/cryptsetup{.static,} || die ; }
|
||||
use static-libs || find "${ED}"/usr -name '*.la' -delete
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
ewarn "This ebuild introduces a new set of scripts and configuration"
|
||||
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
|
||||
ewarn "then you *MUST* copy your old file to:"
|
||||
ewarn "/etc/conf.d/dmcrypt"
|
||||
ewarn "Or your encrypted partitions will *NOT* work."
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
}
|
114
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.5.1.ebuild
vendored
Normal file
114
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.5.1.ebuild
vendored
Normal file
@ -0,0 +1,114 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.5.1.ebuild,v 1.4 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI="4"
|
||||
|
||||
inherit python linux-info libtool
|
||||
|
||||
MY_P=${P/_rc/-rc}
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||
IUSE="nls python reencrypt selinux static static-libs udev urandom"
|
||||
|
||||
S=${WORKDIR}/${MY_P}
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
dev-libs/popt[static-libs(+)]
|
||||
sys-apps/util-linux[static-libs(+)]
|
||||
dev-libs/libgcrypt:0[static-libs(+)]
|
||||
sys-fs/lvm2[static-libs(+)]
|
||||
sys-libs/e2fsprogs-libs[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs(+)]}
|
||||
selinux? ( sys-libs/libselinux )"
|
||||
DEPEND="${RDEPEND}
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
if use python ; then
|
||||
python_set_active_version 2
|
||||
python_pkg_setup
|
||||
fi
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
|
||||
elibtoolize
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable python) \
|
||||
$(use_enable reencrypt cryptsetup-reencrypt) \
|
||||
$(use_enable selinux) \
|
||||
$(use_enable udev) \
|
||||
$(use_enable !urandom dev-random)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
if use static ; then
|
||||
mv "${ED}"/sbin/cryptsetup{.static,} || die
|
||||
mv "${ED}"/sbin/veritysetup{.static,} || die
|
||||
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
|
||||
fi
|
||||
use static-libs || find "${ED}"/usr -name '*.la' -delete
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
ewarn "This ebuild introduces a new set of scripts and configuration"
|
||||
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
|
||||
ewarn "then you *MUST* copy your old file to:"
|
||||
ewarn "/etc/conf.d/dmcrypt"
|
||||
ewarn "Or your encrypted partitions will *NOT* work."
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
}
|
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.2.ebuild
vendored
Normal file
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.2.ebuild
vendored
Normal file
@ -0,0 +1,122 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.2.ebuild,v 1.11 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI=5
|
||||
PYTHON_COMPAT=( python{2_6,2_7} )
|
||||
|
||||
inherit autotools python-single-r1 linux-info libtool eutils
|
||||
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2+"
|
||||
SLOT="0"
|
||||
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86"
|
||||
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
|
||||
# we don't support nss since it doesn't allow cryptsetup to be built statically
|
||||
# and it's missing ripemd160 support so it can't provide full backward compatibility
|
||||
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
|
||||
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
|
||||
python? ( ${PYTHON_REQUIRED_USE} )"
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
dev-libs/popt[static-libs(+)]
|
||||
sys-apps/util-linux[static-libs(+)]
|
||||
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
|
||||
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
|
||||
openssl? ( dev-libs/openssl[static-libs(+)] )
|
||||
sys-fs/lvm2[static-libs(+)]
|
||||
sys-libs/e2fsprogs-libs[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# !static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs\(+\)\]}
|
||||
python? ( ${PYTHON_DEPS} )"
|
||||
DEPEND="${RDEPEND}
|
||||
virtual/pkgconfig
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
|
||||
use python && python-single-r1_pkg_setup
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
|
||||
epatch "${FILESDIR}"/${PN}-1.6.1-openssl-static.patch
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
if use kernel ; then
|
||||
ewarn "Note that kernel backend is very slow for this type of operation"
|
||||
ewarn "and is provided mainly for embedded systems wanting to avoid"
|
||||
ewarn "userspace crypto libraries."
|
||||
fi
|
||||
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable python) \
|
||||
$(use_enable reencrypt cryptsetup-reencrypt) \
|
||||
$(use_enable udev) \
|
||||
$(use_enable !urandom dev-random) \
|
||||
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
if use static ; then
|
||||
mv "${ED}"/sbin/cryptsetup{.static,} || die
|
||||
mv "${ED}"/sbin/veritysetup{.static,} || die
|
||||
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
|
||||
fi
|
||||
prune_libtool_files --modules
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
if [[ -z ${REPLACING_VERSIONS} ]] ; then
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
fi
|
||||
}
|
121
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.3.ebuild
vendored
Normal file
121
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.3.ebuild
vendored
Normal file
@ -0,0 +1,121 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.3.ebuild,v 1.2 2014/03/01 22:49:18 mgorny Exp $
|
||||
|
||||
EAPI=5
|
||||
PYTHON_COMPAT=( python{2_6,2_7} )
|
||||
|
||||
inherit autotools python-single-r1 linux-info libtool eutils
|
||||
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.bz2"
|
||||
|
||||
LICENSE="GPL-2+"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
|
||||
# we don't support nss since it doesn't allow cryptsetup to be built statically
|
||||
# and it's missing ripemd160 support so it can't provide full backward compatibility
|
||||
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
|
||||
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
|
||||
python? ( ${PYTHON_REQUIRED_USE} )"
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
dev-libs/popt[static-libs(+)]
|
||||
sys-apps/util-linux[static-libs(+)]
|
||||
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
|
||||
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
|
||||
openssl? ( dev-libs/openssl[static-libs(+)] )
|
||||
sys-fs/lvm2[static-libs(+)]
|
||||
sys-libs/e2fsprogs-libs[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# !static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs\(+\)\]}
|
||||
python? ( ${PYTHON_DEPS} )"
|
||||
DEPEND="${RDEPEND}
|
||||
virtual/pkgconfig
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
|
||||
use python && python-single-r1_pkg_setup
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
if use kernel ; then
|
||||
ewarn "Note that kernel backend is very slow for this type of operation"
|
||||
ewarn "and is provided mainly for embedded systems wanting to avoid"
|
||||
ewarn "userspace crypto libraries."
|
||||
fi
|
||||
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable python) \
|
||||
$(use_enable reencrypt cryptsetup-reencrypt) \
|
||||
$(use_enable udev) \
|
||||
$(use_enable !urandom dev-random) \
|
||||
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
if use static ; then
|
||||
mv "${ED}"/sbin/cryptsetup{.static,} || die
|
||||
mv "${ED}"/sbin/veritysetup{.static,} || die
|
||||
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
|
||||
fi
|
||||
prune_libtool_files --modules
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
if [[ -z ${REPLACING_VERSIONS} ]] ; then
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
fi
|
||||
}
|
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.4.ebuild
vendored
Normal file
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.4.ebuild
vendored
Normal file
@ -0,0 +1,122 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.4.ebuild,v 1.1 2014/03/03 09:28:07 polynomial-c Exp $
|
||||
|
||||
EAPI=5
|
||||
PYTHON_COMPAT=( python{2_6,2_7} )
|
||||
|
||||
inherit autotools python-single-r1 linux-info libtool eutils versionator
|
||||
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.xz"
|
||||
SRC_URI="mirror://kernel/linux/utils/${PN}/v$(get_version_component_range 1-2)/${P}.tar.xz"
|
||||
|
||||
LICENSE="GPL-2+"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
|
||||
# we don't support nss since it doesn't allow cryptsetup to be built statically
|
||||
# and it's missing ripemd160 support so it can't provide full backward compatibility
|
||||
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
|
||||
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
|
||||
python? ( ${PYTHON_REQUIRED_USE} )"
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
dev-libs/popt[static-libs(+)]
|
||||
sys-apps/util-linux[static-libs(+)]
|
||||
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
|
||||
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
|
||||
openssl? ( dev-libs/openssl[static-libs(+)] )
|
||||
sys-fs/lvm2[static-libs(+)]
|
||||
sys-libs/e2fsprogs-libs[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# !static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs\(+\)\]}
|
||||
python? ( ${PYTHON_DEPS} )"
|
||||
DEPEND="${RDEPEND}
|
||||
virtual/pkgconfig
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
|
||||
use python && python-single-r1_pkg_setup
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
if use kernel ; then
|
||||
ewarn "Note that kernel backend is very slow for this type of operation"
|
||||
ewarn "and is provided mainly for embedded systems wanting to avoid"
|
||||
ewarn "userspace crypto libraries."
|
||||
fi
|
||||
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable python) \
|
||||
$(use_enable reencrypt cryptsetup-reencrypt) \
|
||||
$(use_enable udev) \
|
||||
$(use_enable !urandom dev-random) \
|
||||
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
if use static ; then
|
||||
mv "${ED}"/sbin/cryptsetup{.static,} || die
|
||||
mv "${ED}"/sbin/veritysetup{.static,} || die
|
||||
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
|
||||
fi
|
||||
prune_libtool_files --modules
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
if [[ -z ${REPLACING_VERSIONS} ]] ; then
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
fi
|
||||
}
|
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.5.ebuild
vendored
Normal file
122
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.6.5.ebuild
vendored
Normal file
@ -0,0 +1,122 @@
|
||||
# Copyright 1999-2014 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.6.5.ebuild,v 1.1 2014/07/01 07:27:44 robbat2 Exp $
|
||||
|
||||
EAPI=5
|
||||
PYTHON_COMPAT=( python{2_6,2_7} )
|
||||
|
||||
inherit autotools python-single-r1 linux-info libtool eutils versionator
|
||||
|
||||
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
|
||||
HOMEPAGE="http://code.google.com/p/cryptsetup/"
|
||||
SRC_URI="http://cryptsetup.googlecode.com/files/${P}.tar.xz"
|
||||
SRC_URI="mirror://kernel/linux/utils/${PN}/v$(get_version_component_range 1-2)/${P}.tar.xz"
|
||||
|
||||
LICENSE="GPL-2+"
|
||||
SLOT="0"
|
||||
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||
CRYPTO_BACKENDS="+gcrypt kernel nettle openssl"
|
||||
# we don't support nss since it doesn't allow cryptsetup to be built statically
|
||||
# and it's missing ripemd160 support so it can't provide full backward compatibility
|
||||
IUSE="${CRYPTO_BACKENDS} nls python reencrypt static static-libs udev urandom"
|
||||
REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
|
||||
python? ( ${PYTHON_REQUIRED_USE} )"
|
||||
|
||||
LIB_DEPEND="dev-libs/libgpg-error[static-libs(+)]
|
||||
dev-libs/popt[static-libs(+)]
|
||||
sys-apps/util-linux[static-libs(+)]
|
||||
gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] )
|
||||
nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
|
||||
openssl? ( dev-libs/openssl[static-libs(+)] )
|
||||
sys-fs/lvm2[static-libs(+)]
|
||||
sys-libs/e2fsprogs-libs[static-libs(+)]
|
||||
udev? ( virtual/udev[static-libs(+)] )"
|
||||
# We have to always depend on ${LIB_DEPEND} rather than put behind
|
||||
# !static? () because we provide a shared library which links against
|
||||
# these other packages. #414665
|
||||
RDEPEND="static-libs? ( ${LIB_DEPEND} )
|
||||
${LIB_DEPEND//\[static-libs\(+\)\]}
|
||||
python? ( ${PYTHON_DEPS} )"
|
||||
DEPEND="${RDEPEND}
|
||||
virtual/pkgconfig
|
||||
static? ( ${LIB_DEPEND} )"
|
||||
|
||||
pkg_setup() {
|
||||
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
|
||||
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
|
||||
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
|
||||
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
|
||||
check_extra_config
|
||||
|
||||
use python && python-single-r1_pkg_setup
|
||||
}
|
||||
|
||||
src_prepare() {
|
||||
sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
|
||||
eautoreconf
|
||||
}
|
||||
|
||||
src_configure() {
|
||||
if use kernel ; then
|
||||
ewarn "Note that kernel backend is very slow for this type of operation"
|
||||
ewarn "and is provided mainly for embedded systems wanting to avoid"
|
||||
ewarn "userspace crypto libraries."
|
||||
fi
|
||||
|
||||
econf \
|
||||
--sbindir=/sbin \
|
||||
--enable-shared \
|
||||
$(use_enable static static-cryptsetup) \
|
||||
$(use_enable static-libs static) \
|
||||
$(use_enable nls) \
|
||||
$(use_enable python) \
|
||||
$(use_enable reencrypt cryptsetup-reencrypt) \
|
||||
$(use_enable udev) \
|
||||
$(use_enable !urandom dev-random) \
|
||||
--with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/}; do use ${x} && echo ${x} ; done)
|
||||
}
|
||||
|
||||
src_test() {
|
||||
if [[ ! -e /dev/mapper/control ]] ; then
|
||||
ewarn "No /dev/mapper/control found -- skipping tests"
|
||||
return 0
|
||||
fi
|
||||
local p
|
||||
for p in /dev/mapper /dev/loop* ; do
|
||||
addwrite ${p}
|
||||
done
|
||||
default
|
||||
}
|
||||
|
||||
src_install() {
|
||||
default
|
||||
if use static ; then
|
||||
mv "${ED}"/sbin/cryptsetup{.static,} || die
|
||||
mv "${ED}"/sbin/veritysetup{.static,} || die
|
||||
use reencrypt && { mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die ; }
|
||||
fi
|
||||
prune_libtool_files --modules
|
||||
|
||||
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt
|
||||
newinitd "${FILESDIR}"/1.5.1-dmcrypt.rc dmcrypt
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
if [[ -z ${REPLACING_VERSIONS} ]] ; then
|
||||
elog "Please see the example for configuring a LUKS mountpoint"
|
||||
elog "in /etc/conf.d/dmcrypt"
|
||||
elog
|
||||
elog "If you are using baselayout-2 then please do:"
|
||||
elog "rc-update add dmcrypt boot"
|
||||
elog "This version introduces a command line arguement 'key_timeout'."
|
||||
elog "If you want the search for the removable key device to timeout"
|
||||
elog "after 10 seconds add the following to your bootloader config:"
|
||||
elog "key_timeout=10"
|
||||
elog "A timeout of 0 will mean it will wait indefinitely."
|
||||
elog
|
||||
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
|
||||
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
|
||||
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
|
||||
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
|
||||
fi
|
||||
}
|
40
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.5-dm-crypt-stop.sh
vendored
Normal file
40
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.5-dm-crypt-stop.sh
vendored
Normal file
@ -0,0 +1,40 @@
|
||||
# /lib/rcscripts/addons/dm-crypt-stop.sh
|
||||
|
||||
# Try to remove any dm-crypt mappings
|
||||
csetup=/sbin/cryptsetup
|
||||
if [ -f /etc/conf.d/dmcrypt ] && [ -x "$csetup" ]
|
||||
then
|
||||
einfo "Removing dm-crypt mappings"
|
||||
|
||||
/bin/egrep "^(target|swap)" /etc/conf.d/dmcrypt | \
|
||||
while read targetline
|
||||
do
|
||||
target=
|
||||
swap=
|
||||
|
||||
eval ${targetline}
|
||||
|
||||
[ -n "${swap}" ] && target=${swap}
|
||||
[ -z "${target}" ] && ewarn "Invalid line in /etc/conf.d/dmcrypt: ${targetline}"
|
||||
|
||||
ebegin "Removing dm-crypt mapping for: ${target}"
|
||||
${csetup} remove ${target}
|
||||
eend $? "Failed to remove dm-crypt mapping for: ${target}"
|
||||
done
|
||||
|
||||
if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" /etc/conf.d/dmcrypt) ]] ; then
|
||||
einfo "Taking down any dm-crypt loop devices"
|
||||
/bin/egrep -e "^(source)" /etc/conf.d/dmcrypt | while read sourceline
|
||||
do
|
||||
source=
|
||||
eval ${sourceline}
|
||||
if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
|
||||
ebegin " Taking down ${source}"
|
||||
/sbin/losetup -d ${source}
|
||||
eend $? " Failed to remove loop"
|
||||
fi
|
||||
done
|
||||
fi
|
||||
fi
|
||||
|
||||
# vim:ts=4
|
26
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.5-dmcrypt.rc
vendored
Normal file
26
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.5-dmcrypt.rc
vendored
Normal file
@ -0,0 +1,26 @@
|
||||
#!/sbin/runscript
|
||||
# Copyright 1999-2011 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.0.5-dmcrypt.rc,v 1.4 2011/01/18 20:05:18 vapier Exp $
|
||||
|
||||
depend() {
|
||||
before checkfs fsck
|
||||
}
|
||||
|
||||
start() {
|
||||
if [ ! -e /lib/librc.so ]; then
|
||||
eerror "The ${myservice} init script is written for baselayout-2"
|
||||
eerror "Please do not use it with baselayout-1"
|
||||
return 1
|
||||
fi
|
||||
|
||||
. /lib/rcscripts/addons/dm-crypt-start.sh
|
||||
}
|
||||
|
||||
stop() {
|
||||
if [ ! -e /lib/librc.so ]; then
|
||||
return 0
|
||||
fi
|
||||
|
||||
. /lib/rcscripts/addons/dm-crypt-stop.sh
|
||||
}
|
98
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-dmcrypt.confd
vendored
Normal file
98
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-dmcrypt.confd
vendored
Normal file
@ -0,0 +1,98 @@
|
||||
# /etc/conf.d/dmcrypt
|
||||
|
||||
# For people who run dmcrypt on top of some other layer (like raid),
|
||||
# use rc_need to specify that requirement. See the runscript(8) man
|
||||
# page for more information.
|
||||
|
||||
#--------------------
|
||||
# Instructions
|
||||
#--------------------
|
||||
|
||||
# Note regarding the syntax of this file. This file is *almost* bash,
|
||||
# but each line is evaluated separately. Separate swaps/targets can be
|
||||
# specified. The init-script which reads this file assumes that a
|
||||
# swap= or target= line starts a new section, similar to lilo or grub
|
||||
# configuration.
|
||||
|
||||
# Note when using gpg keys and /usr on a separate partition, you will
|
||||
# have to copy /usr/bin/gpg to /bin/gpg so that it will work properly
|
||||
# and ensure that gpg has been compiled statically.
|
||||
# See http://bugs.gentoo.org/90482 for more information.
|
||||
|
||||
# Note that the init-script which reads this file detects whether your
|
||||
# partition is LUKS or not. No mkfs is run unless you specify a makefs
|
||||
# option.
|
||||
|
||||
# Global options:
|
||||
#----------------
|
||||
|
||||
# Max number of checks to perform (1 per second)
|
||||
#dmcrypt_max_timeout=120
|
||||
|
||||
# Arguments:
|
||||
#-----------
|
||||
# target=<name> == Mapping name for partition.
|
||||
# swap=<name> == Mapping name for swap partition.
|
||||
# source='<dev>' == Real device for partition.
|
||||
# key='</path/to/keyfile>[:<mode>]' == Fullpath from / or from inside removable media.
|
||||
# remdev='<dev>' == Device that will be assigned to removable media.
|
||||
# gpg_options='<opts>' == Default are --quiet --decrypt
|
||||
# options='<opts>' == cryptsetup, for LUKS you can only use --readonly
|
||||
# loop_file='<file>' == Loopback file.
|
||||
# pre_mount='cmds' == commands to execute before mounting partition.
|
||||
# post_mount='cmds' == commands to execute after mounting partition.
|
||||
#-----------
|
||||
# Supported Modes
|
||||
# gpg == decrypt and pipe key into cryptsetup.
|
||||
# Note: new-line character must not be part of key.
|
||||
# Command to erase \n char: 'cat key | tr -d '\n' > cleanKey'
|
||||
|
||||
#--------------------
|
||||
# dm-crypt examples
|
||||
#--------------------
|
||||
|
||||
## swap
|
||||
# Swap partitions. These should come first so that no keys make their
|
||||
# way into unencrypted swap.
|
||||
# If no options are given, they will default to: -c aes -h sha1 -d /dev/urandom
|
||||
# If no makefs is given then mkswap will be assumed
|
||||
#swap=crypt-swap
|
||||
#source='/dev/hda2'
|
||||
|
||||
## /home with passphrase
|
||||
#target=crypt-home
|
||||
#source='/dev/hda5'
|
||||
|
||||
## /home with regular keyfile
|
||||
#target=crypt-home
|
||||
#source='/dev/hda5'
|
||||
#key='/full/path/to/homekey'
|
||||
|
||||
## /home with gpg protected key
|
||||
#target=crypt-home
|
||||
#source='/dev/hda5'
|
||||
#key='/full/path/to/homekey:gpg'
|
||||
|
||||
## /home with regular keyfile on removable media(such as usb-stick)
|
||||
#target=crypt-home
|
||||
#source='/dev/hda5'
|
||||
#key='/full/path/to/homekey'
|
||||
#remdev='/dev/sda1'
|
||||
|
||||
##/home with gpg protected key on removable media(such as usb-stick)
|
||||
#target=crypt-home
|
||||
#source='/dev/hda5'
|
||||
#key='/full/path/to/homekey:gpg'
|
||||
#remdev='/dev/sda1'
|
||||
|
||||
##/tmp with regular keyfile
|
||||
#target=crypt-tmp
|
||||
#source='/dev/hda6'
|
||||
#key='/full/path/to/tmpkey'
|
||||
#pre_mount='/sbin/mkreiserfs -f -f ${dev}'
|
||||
#post_mount='chown root:root ${mount_point}; chmod 1777 ${mount_point}'
|
||||
|
||||
## Loopback file example
|
||||
#mount='crypt-loop-home'
|
||||
#source='/dev/loop0'
|
||||
#loop_file='/mnt/crypt/home'
|
294
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-r2-dm-crypt-start.sh
vendored
Normal file
294
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-r2-dm-crypt-start.sh
vendored
Normal file
@ -0,0 +1,294 @@
|
||||
# /lib/rcscripts/addons/dm-crypt-start.sh
|
||||
|
||||
# For backwards compatability with baselayout < 1.13.0
|
||||
dm_crypt_execute_checkfs() {
|
||||
dm_crypt_execute_dmcrypt
|
||||
}
|
||||
|
||||
dm_crypt_execute_volumes() {
|
||||
dm_crypt_execute_dmcrypt
|
||||
}
|
||||
|
||||
# Setup mappings for an individual target/swap
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_dmcrypt() {
|
||||
local dev ret mode foo
|
||||
# some colors
|
||||
local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
|
||||
|
||||
if [ -n "$target" ]; then
|
||||
# let user set options, otherwise leave empty
|
||||
: ${options:=' '}
|
||||
elif [ -n "$swap" ]; then
|
||||
einfo "Checking swap is not LUKS"
|
||||
cryptsetup isLuks ${source} 2>/dev/null
|
||||
foo="$?"
|
||||
if [ "${foo}" -eq 0 ]; then
|
||||
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
|
||||
return
|
||||
fi
|
||||
target=${swap}
|
||||
# swap contents do not need to be preserved between boots, luks not required.
|
||||
# suspend2 users should have initramfs's init handling their swap partition either way.
|
||||
: ${options:='-c aes -h sha1 -d /dev/urandom'}
|
||||
: ${pre_mount:='mkswap ${dev}'}
|
||||
else
|
||||
return
|
||||
fi
|
||||
if [ -z "$source" ] && [ ! -e "$source" ]; then
|
||||
ewarn "source \"${source}\" for ${target} missing, skipping..."
|
||||
return
|
||||
fi
|
||||
|
||||
if [[ -n ${loop_file} ]] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Setting up loop device ${source}"
|
||||
/sbin/losetup ${source} ${loop_file}
|
||||
fi
|
||||
|
||||
# cryptsetup:
|
||||
# luksOpen <device> <name> # <device> is $source
|
||||
# create <name> <device> # <name> is $target
|
||||
local arg1="create" arg2="$target" arg3="$source" luks=0
|
||||
|
||||
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
|
||||
|
||||
if /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
|
||||
einfo "dm-crypt mapping ${target} is already configured"
|
||||
return
|
||||
fi
|
||||
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
# Handle keys
|
||||
if [ -n "$key" ]; then
|
||||
read_abort() {
|
||||
local ans
|
||||
local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
|
||||
shift
|
||||
echo -n -e "${prompt}"
|
||||
if ! read -n 1 $* ans ; then
|
||||
local back=${prompt//?/\\b}
|
||||
echo -n -e "${back}"
|
||||
else
|
||||
echo
|
||||
fi
|
||||
case $ans in
|
||||
[yY]|[yY][eE][sS]) return 0;;
|
||||
*) return 1;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Notes: sed not used to avoid case where /usr partition is encrypted.
|
||||
mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
|
||||
key=${key/:*/}
|
||||
case "$mode" in
|
||||
gpg|reg)
|
||||
# handle key on removable device
|
||||
if [ -n "$remdev" ]; then
|
||||
# temp directory to mount removable device
|
||||
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
|
||||
if [ ! -d "${mntrem}" ] ; then
|
||||
if ! mkdir -p "${mntrem}" ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
|
||||
return
|
||||
fi
|
||||
fi
|
||||
i=0
|
||||
einfo "Please insert removable device for ${target}"
|
||||
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
|
||||
foo=""
|
||||
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
|
||||
# keyfile exists?
|
||||
if [ ! -e "${mntrem}${key}" ]; then
|
||||
umount -n "${mntrem}"
|
||||
rmdir "${mntrem}"
|
||||
einfo "Cannot find ${key} on removable media."
|
||||
read_abort "Abort" ${read_timeout:--t 1} && return
|
||||
else
|
||||
key="${mntrem}${key}"
|
||||
break
|
||||
fi
|
||||
else
|
||||
[ -e "${remdev}" ] \
|
||||
&& foo="mount failed" \
|
||||
|| foo="mount source not found"
|
||||
fi
|
||||
((++i))
|
||||
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
|
||||
done
|
||||
else # keyfile ! on removable device
|
||||
if [ ! -e "$key" ]; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: keyfile ${key} does not exist."
|
||||
return
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: mode ${mode} is invalid."
|
||||
return
|
||||
;;
|
||||
esac
|
||||
else
|
||||
mode=none
|
||||
fi
|
||||
ebegin "dm-crypt map ${target}"
|
||||
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
|
||||
if [ "$mode" == "gpg" ]; then
|
||||
: ${gpg_options:='-q -d'}
|
||||
# gpg available ?
|
||||
if type -p gpg >/dev/null ; then
|
||||
for (( i = 0 ; i < 3 ; i++ ))
|
||||
do
|
||||
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
|
||||
# save stdin stdout stderr "values"
|
||||
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
[ "$ret" -eq 0 ] && break
|
||||
done
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
else
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: cannot find gpg application."
|
||||
einfo "You have to install app-crypt/gnupg first."
|
||||
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
|
||||
fi
|
||||
else
|
||||
if [ "$mode" == "reg" ]; then
|
||||
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
else
|
||||
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
fi
|
||||
fi
|
||||
if [ -d "$mntrem" ]; then
|
||||
umount -n ${mntrem} 2>/dev/null >/dev/null
|
||||
rmdir ${mntrem} 2>/dev/null >/dev/null
|
||||
fi
|
||||
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
if [[ ${ret} != 0 ]] ; then
|
||||
cryptfs_status=1
|
||||
else
|
||||
if [[ -n ${pre_mount} ]] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Running pre_mount commands for ${target}"
|
||||
eval "${pre_mount}" > /dev/null
|
||||
ewend $? || cryptfs_status=1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
# Run any post_mount commands for an individual mount
|
||||
#
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_localmount() {
|
||||
local mount_point
|
||||
|
||||
[ -z "$target" ] && [ -z "$post_mount" ] && return
|
||||
|
||||
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
|
||||
ewarn "Skipping unmapped target ${target}"
|
||||
cryptfs_status=1
|
||||
return
|
||||
fi
|
||||
|
||||
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
|
||||
if [[ -z ${mount_point} ]] ; then
|
||||
ewarn "Failed to find mount point for ${target}, skipping"
|
||||
cryptfs_status=1
|
||||
fi
|
||||
|
||||
if [[ -n ${post_mount} ]] ; then
|
||||
ebegin "Running post_mount commands for target ${target}"
|
||||
eval "${post_mount}" >/dev/null
|
||||
eend $? || cryptfs_status=1
|
||||
fi
|
||||
}
|
||||
|
||||
# Determine string lengths
|
||||
strlen() {
|
||||
if [ -z "$1" ]
|
||||
then
|
||||
echo "usage: strlen <variable_name>"
|
||||
die
|
||||
fi
|
||||
eval echo "\${#${1}}"
|
||||
}
|
||||
|
||||
# Lookup optional bootparams
|
||||
parse_opt() {
|
||||
case "$1" in
|
||||
*\=*)
|
||||
local key_name="`echo "$1" | cut -f1 -d=`"
|
||||
local key_len=`strlen key_name`
|
||||
local value_start=$((key_len+2))
|
||||
echo "$1" | cut -c ${value_start}-
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
local cryptfs_status=0
|
||||
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
|
||||
|
||||
CMDLINE="`cat /proc/cmdline`"
|
||||
for x in ${CMDLINE}
|
||||
do
|
||||
case "${x}" in
|
||||
key_timeout\=*)
|
||||
KEY_TIMEOUT=`parse_opt "${x}"`
|
||||
if [ ${KEY_TIMEOUT} -gt 0 ]; then
|
||||
read_timeout="-t ${KEY_TIMEOUT}"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
if [[ -f /etc/conf.d/dmcrypt ]] && [[ -x /sbin/cryptsetup ]] ; then
|
||||
ebegin "Setting up dm-crypt mappings"
|
||||
|
||||
# Fix for baselayout-1.12.10 (bug 174256)
|
||||
[ -z ${SVCNAME} ] && SVCNAME="${myservice}"
|
||||
|
||||
while read -u 3 targetline ; do
|
||||
# skip comments and blank lines
|
||||
[[ ${targetline}\# == \#* ]] && continue
|
||||
|
||||
# check for the start of a new target/swap
|
||||
case ${targetline} in
|
||||
target=*|swap=*)
|
||||
# If we have a target queued up, then execute it
|
||||
dm_crypt_execute_${SVCNAME}
|
||||
|
||||
# Prepare for the next target/swap by resetting variables
|
||||
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
|
||||
;;
|
||||
|
||||
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
|
||||
if [[ -z ${target} && -z ${swap} ]] ; then
|
||||
ewarn "Ignoring setting outside target/swap section: ${targetline}"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
|
||||
*)
|
||||
ewarn "Skipping invalid line in /etc/conf.d/dmcrypt: ${targetline}"
|
||||
;;
|
||||
esac
|
||||
|
||||
# Queue this setting for the next call to dm_crypt_execute_${SVCNAME}
|
||||
eval "${targetline}"
|
||||
done 3< /etc/conf.d/dmcrypt
|
||||
|
||||
# If we have a target queued up, then execute it
|
||||
dm_crypt_execute_${SVCNAME}
|
||||
|
||||
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
|
||||
fi
|
||||
|
||||
# vim:ts=4
|
309
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-start.sh
vendored
Normal file
309
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-start.sh
vendored
Normal file
@ -0,0 +1,309 @@
|
||||
# /lib/rcscripts/addons/dm-crypt-start.sh
|
||||
|
||||
# For backwards compatibility with baselayout < 1.13.0 #174256
|
||||
: ${SVCNAME:=${myservice}}
|
||||
|
||||
# We might be hooked into init.d scripts (ala baselayout-1), or we might
|
||||
# be a standalone dmcrypt script. We support multiple dmcrypt instances,
|
||||
# but they must start with "dmcrypt." to be detected that way. It keeps
|
||||
# our lives much simpler with this multiplexed arrangement.
|
||||
execute_hook="dm_crypt_execute_dmcrypt"
|
||||
conf_file="dmcrypt"
|
||||
case ${SVCNAME} in
|
||||
localmount) execute_hook="dm_crypt_execute_localmount" ;;
|
||||
dmcrypt.*) conf_file="${SVCNAME}" ;;
|
||||
esac
|
||||
conf_file="/etc/conf.d/${conf_file}"
|
||||
|
||||
# Setup mappings for an individual target/swap
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_dmcrypt() {
|
||||
local dev ret mode foo
|
||||
# some colors
|
||||
local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
|
||||
|
||||
if [ -n "$target" ]; then
|
||||
# let user set options, otherwise leave empty
|
||||
: ${options:=' '}
|
||||
elif [ -n "$swap" ]; then
|
||||
einfo "Checking swap is not LUKS"
|
||||
cryptsetup isLuks ${source} 2>/dev/null
|
||||
foo="$?"
|
||||
if [ "${foo}" -eq 0 ]; then
|
||||
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
|
||||
return
|
||||
fi
|
||||
target=${swap}
|
||||
# swap contents do not need to be preserved between boots, luks not required.
|
||||
# suspend2 users should have initramfs's init handling their swap partition either way.
|
||||
: ${options:='-c aes -h sha1 -d /dev/urandom'}
|
||||
: ${pre_mount:='mkswap ${dev}'}
|
||||
else
|
||||
return
|
||||
fi
|
||||
if [ -z "$source" ] && [ ! -e "$source" ]; then
|
||||
ewarn "source \"${source}\" for ${target} missing, skipping..."
|
||||
return
|
||||
fi
|
||||
|
||||
if [[ -n ${loop_file} ]] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Setting up loop device ${source}"
|
||||
/sbin/losetup ${source} ${loop_file}
|
||||
fi
|
||||
|
||||
# cryptsetup:
|
||||
# luksOpen <device> <name> # <device> is $source
|
||||
# create <name> <device> # <name> is $target
|
||||
local arg1="create" arg2="$target" arg3="$source" luks=0
|
||||
|
||||
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
|
||||
|
||||
# Older versions reported:
|
||||
# ${target} is active:
|
||||
# Newer versions report:
|
||||
# ${target} is active[ and is in use.]
|
||||
if cryptsetup status ${target} | egrep -q ' is active' ; then
|
||||
einfo "dm-crypt mapping ${target} is already configured"
|
||||
return
|
||||
fi
|
||||
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
# Handle keys
|
||||
if [ -n "$key" ]; then
|
||||
read_abort() {
|
||||
local ans
|
||||
local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
|
||||
shift
|
||||
echo -n -e "${prompt}"
|
||||
if ! read -n 1 $* ans ; then
|
||||
local back=${prompt//?/\\b}
|
||||
echo -n -e "${back}"
|
||||
else
|
||||
echo
|
||||
fi
|
||||
case $ans in
|
||||
[yY]|[yY][eE][sS]) return 0;;
|
||||
*) return 1;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Notes: sed not used to avoid case where /usr partition is encrypted.
|
||||
mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
|
||||
key=${key/:*/}
|
||||
case "$mode" in
|
||||
gpg|reg)
|
||||
# handle key on removable device
|
||||
if [ -n "$remdev" ]; then
|
||||
# temp directory to mount removable device
|
||||
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
|
||||
if [ ! -d "${mntrem}" ] ; then
|
||||
if ! mkdir -p "${mntrem}" ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
|
||||
return
|
||||
fi
|
||||
fi
|
||||
i=0
|
||||
einfo "Please insert removable device for ${target}"
|
||||
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
|
||||
foo=""
|
||||
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
|
||||
# keyfile exists?
|
||||
if [ ! -e "${mntrem}${key}" ]; then
|
||||
umount -n "${mntrem}"
|
||||
rmdir "${mntrem}"
|
||||
einfo "Cannot find ${key} on removable media."
|
||||
read_abort "Abort" ${read_timeout:--t 1} && return
|
||||
else
|
||||
key="${mntrem}${key}"
|
||||
break
|
||||
fi
|
||||
else
|
||||
[ -e "${remdev}" ] \
|
||||
&& foo="mount failed" \
|
||||
|| foo="mount source not found"
|
||||
fi
|
||||
((++i))
|
||||
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
|
||||
done
|
||||
else # keyfile ! on removable device
|
||||
if [ ! -e "$key" ]; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: keyfile ${key} does not exist."
|
||||
return
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: mode ${mode} is invalid."
|
||||
return
|
||||
;;
|
||||
esac
|
||||
else
|
||||
mode=none
|
||||
fi
|
||||
ebegin "dm-crypt map ${target}"
|
||||
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
|
||||
if [ "$mode" == "gpg" ]; then
|
||||
: ${gpg_options:='-q -d'}
|
||||
# gpg available ?
|
||||
if type -p gpg >/dev/null ; then
|
||||
for (( i = 0 ; i < 3 ; i++ ))
|
||||
do
|
||||
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
|
||||
# save stdin stdout stderr "values"
|
||||
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
[ "$ret" -eq 0 ] && break
|
||||
done
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
else
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: cannot find gpg application."
|
||||
einfo "You have to install app-crypt/gnupg first."
|
||||
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
|
||||
fi
|
||||
else
|
||||
if [ "$mode" == "reg" ]; then
|
||||
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
else
|
||||
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret="$?"
|
||||
eend "${ret}" "failure running cryptsetup"
|
||||
fi
|
||||
fi
|
||||
if [ -d "$mntrem" ]; then
|
||||
umount -n ${mntrem} 2>/dev/null >/dev/null
|
||||
rmdir ${mntrem} 2>/dev/null >/dev/null
|
||||
fi
|
||||
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
if [[ ${ret} != 0 ]] ; then
|
||||
cryptfs_status=1
|
||||
else
|
||||
if [[ -n ${pre_mount} ]] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Running pre_mount commands for ${target}"
|
||||
eval "${pre_mount}" > /dev/null
|
||||
ewend $? || cryptfs_status=1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
# Run any post_mount commands for an individual mount
|
||||
#
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_localmount() {
|
||||
local mount_point
|
||||
|
||||
[ -z "$target" ] && [ -z "$post_mount" ] && return
|
||||
|
||||
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
|
||||
ewarn "Skipping unmapped target ${target}"
|
||||
cryptfs_status=1
|
||||
return
|
||||
fi
|
||||
|
||||
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
|
||||
if [[ -z ${mount_point} ]] ; then
|
||||
ewarn "Failed to find mount point for ${target}, skipping"
|
||||
cryptfs_status=1
|
||||
fi
|
||||
|
||||
if [[ -n ${post_mount} ]] ; then
|
||||
ebegin "Running post_mount commands for target ${target}"
|
||||
eval "${post_mount}" >/dev/null
|
||||
eend $? || cryptfs_status=1
|
||||
fi
|
||||
}
|
||||
|
||||
# Determine string lengths
|
||||
strlen() {
|
||||
if [ -z "$1" ]
|
||||
then
|
||||
echo "usage: strlen <variable_name>"
|
||||
die
|
||||
fi
|
||||
eval echo "\${#${1}}"
|
||||
}
|
||||
|
||||
# Lookup optional bootparams
|
||||
parse_opt() {
|
||||
case "$1" in
|
||||
*\=*)
|
||||
local key_name="`echo "$1" | cut -f1 -d=`"
|
||||
local key_len=`strlen key_name`
|
||||
local value_start=$((key_len+2))
|
||||
echo "$1" | cut -c ${value_start}-
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
local cryptfs_status=0
|
||||
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
|
||||
|
||||
CMDLINE="`cat /proc/cmdline`"
|
||||
for x in ${CMDLINE}
|
||||
do
|
||||
case "${x}" in
|
||||
key_timeout\=*)
|
||||
KEY_TIMEOUT=`parse_opt "${x}"`
|
||||
if [ ${KEY_TIMEOUT} -gt 0 ]; then
|
||||
read_timeout="-t ${KEY_TIMEOUT}"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
if [[ -f ${conf_file} ]] && [[ -x /sbin/cryptsetup ]] ; then
|
||||
ebegin "Setting up dm-crypt mappings"
|
||||
|
||||
while read -u 3 targetline ; do
|
||||
# skip comments and blank lines
|
||||
[[ ${targetline}\# == \#* ]] && continue
|
||||
|
||||
# skip service-specific openrc configs #377927
|
||||
[[ ${targetline} == rc_* ]] && continue
|
||||
|
||||
# check for the start of a new target/swap
|
||||
case ${targetline} in
|
||||
target=*|swap=*)
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
# Prepare for the next target/swap by resetting variables
|
||||
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
|
||||
;;
|
||||
|
||||
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
|
||||
if [[ -z ${target} && -z ${swap} ]] ; then
|
||||
ewarn "Ignoring setting outside target/swap section: ${targetline}"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
|
||||
dmcrypt_max_timeout=*)
|
||||
# ignore global options
|
||||
continue
|
||||
;;
|
||||
|
||||
*)
|
||||
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
|
||||
;;
|
||||
esac
|
||||
|
||||
# Queue this setting for the next call to dm_crypt_execute_xxx
|
||||
eval "${targetline}"
|
||||
done 3< ${conf_file}
|
||||
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
|
||||
fi
|
||||
|
||||
# vim:ts=4
|
51
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-stop.sh
vendored
Normal file
51
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-stop.sh
vendored
Normal file
@ -0,0 +1,51 @@
|
||||
# /lib/rcscripts/addons/dm-crypt-stop.sh
|
||||
|
||||
# For backwards compatibility with baselayout < 1.13.0 #174256
|
||||
: ${SVCNAME:=${myservice}}
|
||||
|
||||
# See notes in dm-crypt-start.sh
|
||||
execute_hook="dm_crypt_execute_dmcrypt"
|
||||
conf_file="dmcrypt"
|
||||
case ${SVCNAME} in
|
||||
dmcrypt.*) conf_file="${SVCNAME}" ;;
|
||||
esac
|
||||
conf_file="/etc/conf.d/${conf_file}"
|
||||
|
||||
# Try to remove any dm-crypt mappings
|
||||
csetup=/sbin/cryptsetup
|
||||
if [ -f ${conf_file} ] && [ -x "$csetup" ]
|
||||
then
|
||||
einfo "Removing dm-crypt mappings"
|
||||
|
||||
/bin/egrep "^(target|swap)" ${conf_file} | \
|
||||
while read targetline
|
||||
do
|
||||
target=
|
||||
swap=
|
||||
|
||||
eval ${targetline}
|
||||
|
||||
[ -n "${swap}" ] && target=${swap}
|
||||
[ -z "${target}" ] && ewarn "Invalid line in ${conf_file}: ${targetline}"
|
||||
|
||||
ebegin "Removing dm-crypt mapping for: ${target}"
|
||||
${csetup} remove ${target}
|
||||
eend $? "Failed to remove dm-crypt mapping for: ${target}"
|
||||
done
|
||||
|
||||
if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" ${conf_file}) ]] ; then
|
||||
einfo "Taking down any dm-crypt loop devices"
|
||||
/bin/egrep -e "^(source)" ${conf_file} | while read sourceline
|
||||
do
|
||||
source=
|
||||
eval ${sourceline}
|
||||
if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
|
||||
ebegin " Taking down ${source}"
|
||||
/sbin/losetup -d ${source}
|
||||
eend $? " Failed to remove loop"
|
||||
fi
|
||||
done
|
||||
fi
|
||||
fi
|
||||
|
||||
# vim:ts=4
|
350
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc
vendored
Executable file
350
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc
vendored
Executable file
@ -0,0 +1,350 @@
|
||||
#!/sbin/runscript
|
||||
# Copyright 1999-2013 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc,v 1.1 2013/01/17 23:35:08 robbat2 Exp $
|
||||
|
||||
depend() {
|
||||
before checkfs fsck
|
||||
}
|
||||
|
||||
# We support multiple dmcrypt instances based on $SVCNAME
|
||||
execute_hook="dm_crypt_execute_dmcrypt"
|
||||
# XXX: Should we drop this ?
|
||||
# execute_hook="dm_crypt_execute_localmount"
|
||||
conf_file="/etc/conf.d/${SVCNAME}"
|
||||
|
||||
# Get splash helpers if available.
|
||||
if [ -e /sbin/splash-functions.sh ] ; then
|
||||
. /sbin/splash-functions.sh
|
||||
fi
|
||||
|
||||
# Setup mappings for an individual target/swap
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_dmcrypt() {
|
||||
local dev ret mode foo
|
||||
|
||||
if [ -n "${target}" ] ; then
|
||||
# let user set options, otherwise leave empty
|
||||
: ${options:=' '}
|
||||
elif [ -n "${swap}" ] ; then
|
||||
if cryptsetup isLuks ${source} 2>/dev/null ; then
|
||||
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
|
||||
return
|
||||
fi
|
||||
target=${swap}
|
||||
# swap contents do not need to be preserved between boots, luks not required.
|
||||
# suspend2 users should have initramfs's init handling their swap partition either way.
|
||||
: ${options:='-c aes -h sha1 -d /dev/urandom'}
|
||||
: ${pre_mount:='mkswap ${dev}'}
|
||||
else
|
||||
return
|
||||
fi
|
||||
if [ "x${source#UUID}" != "x${source}" ]; then
|
||||
source=${source#UUID=}
|
||||
source="$(blkid -U ${source})"
|
||||
fi
|
||||
if [ -z "${source}" ] && [ ! -e "${source}" ] ; then
|
||||
ewarn "source \"${source}\" for ${target} missing, skipping..."
|
||||
return
|
||||
fi
|
||||
|
||||
if [ -n "${loop_file}" ] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Setting up loop device ${source}"
|
||||
losetup ${source} ${loop_file}
|
||||
fi
|
||||
|
||||
# cryptsetup:
|
||||
# luksOpen <device> <name> # <device> is $source
|
||||
# create <name> <device> # <name> is $target
|
||||
local arg1="create" arg2="${target}" arg3="${source}" luks=0
|
||||
|
||||
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; }
|
||||
|
||||
# Older versions reported:
|
||||
# ${target} is active:
|
||||
# Newer versions report:
|
||||
# ${target} is active[ and is in use.]
|
||||
if cryptsetup status ${target} | egrep -q ' is active' ; then
|
||||
einfo "dm-crypt mapping ${target} is already configured"
|
||||
return
|
||||
fi
|
||||
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
# Handle keys
|
||||
if [ -n "${key}" ] ; then
|
||||
read_abort() {
|
||||
# some colors
|
||||
local ans savetty resettty
|
||||
[ -z "${NORMAL}" ] && eval $(eval_ecolors)
|
||||
einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) "
|
||||
shift
|
||||
# This is ugly as s**t. But POSIX doesn't provide `read -t`, so
|
||||
# we end up having to implement our own crap with stty/etc...
|
||||
savetty=$(stty -g)
|
||||
resettty='stty ${savetty}; trap - EXIT HUP INT TERM'
|
||||
trap 'eval "${resettty}"' EXIT HUP INT TERM
|
||||
stty -icanon
|
||||
[ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))"
|
||||
ans=$(dd count=1 bs=1 2>/dev/null) || ans=''
|
||||
eval "${resettty}"
|
||||
if [ -z "${ans}" ] ; then
|
||||
printf '\r'
|
||||
else
|
||||
echo
|
||||
fi
|
||||
case ${ans} in
|
||||
[yY]) return 0;;
|
||||
*) return 1;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Notes: sed not used to avoid case where /usr partition is encrypted.
|
||||
mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg
|
||||
key=${key/:*/}
|
||||
case "${mode}" in
|
||||
gpg|reg)
|
||||
# handle key on removable device
|
||||
if [ -n "${remdev}" ] ; then
|
||||
# temp directory to mount removable device
|
||||
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
|
||||
if [ ! -d "${mntrem}" ] ; then
|
||||
if ! mkdir -p "${mntrem}" ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
|
||||
return
|
||||
fi
|
||||
fi
|
||||
i=0
|
||||
einfo "Please insert removable device for ${target}"
|
||||
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
|
||||
foo=""
|
||||
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
|
||||
# keyfile exists?
|
||||
if [ ! -e "${mntrem}${key}" ] ; then
|
||||
umount -n "${mntrem}"
|
||||
rmdir "${mntrem}"
|
||||
einfo "Cannot find ${key} on removable media."
|
||||
read_abort "Abort" ${read_timeout:--t 1} && return
|
||||
else
|
||||
key="${mntrem}${key}"
|
||||
break
|
||||
fi
|
||||
else
|
||||
[ -e "${remdev}" ] \
|
||||
&& foo="mount failed" \
|
||||
|| foo="mount source not found"
|
||||
fi
|
||||
: $((i += 1))
|
||||
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
|
||||
done
|
||||
else # keyfile ! on removable device
|
||||
if [ ! -e "${key}" ] ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: keyfile ${key} does not exist."
|
||||
return
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: mode ${mode} is invalid."
|
||||
return
|
||||
;;
|
||||
esac
|
||||
else
|
||||
mode=none
|
||||
fi
|
||||
ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}"
|
||||
if [ "${mode}" = "gpg" ] ; then
|
||||
: ${gpg_options:='-q -d'}
|
||||
# gpg available ?
|
||||
if type -p gpg >/dev/null ; then
|
||||
for i in 0 1 2 ; do
|
||||
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
|
||||
# save stdin stdout stderr "values"
|
||||
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
[ ${ret} -eq 0 ] && break
|
||||
done
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
else
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: cannot find gpg application."
|
||||
einfo "You have to install app-crypt/gnupg first."
|
||||
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
|
||||
fi
|
||||
else
|
||||
if [ "${mode}" = "reg" ] ; then
|
||||
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
else
|
||||
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
fi
|
||||
fi
|
||||
if [ -d "${mntrem}" ] ; then
|
||||
umount -n ${mntrem} 2>/dev/null >/dev/null
|
||||
rmdir ${mntrem} 2>/dev/null >/dev/null
|
||||
fi
|
||||
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
if [ ${ret} -ne 0 ] ; then
|
||||
cryptfs_status=1
|
||||
else
|
||||
if [ -n "${pre_mount}" ] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " pre_mount: ${pre_mount}"
|
||||
eval "${pre_mount}" > /dev/null
|
||||
ewend $? || cryptfs_status=1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
# Run any post_mount commands for an individual mount
|
||||
#
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_localmount() {
|
||||
local mount_point
|
||||
|
||||
[ -z "${target}" ] && [ -z "${post_mount}" ] && return
|
||||
|
||||
if ! cryptsetup status ${target} | egrep -q '\<active:' ; then
|
||||
ewarn "Skipping unmapped target ${target}"
|
||||
cryptfs_status=1
|
||||
return
|
||||
fi
|
||||
|
||||
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
|
||||
if [ -z "${mount_point}" ] ; then
|
||||
ewarn "Failed to find mount point for ${target}, skipping"
|
||||
cryptfs_status=1
|
||||
fi
|
||||
|
||||
if [ -n "${post_mount}" ] ; then
|
||||
ebegin "Running post_mount commands for target ${target}"
|
||||
eval "${post_mount}" >/dev/null
|
||||
eend $? || cryptfs_status=1
|
||||
fi
|
||||
}
|
||||
|
||||
# Lookup optional bootparams
|
||||
get_bootparam_val() {
|
||||
# We're given something like:
|
||||
# foo=bar=cow
|
||||
# Return the "bar=cow" part.
|
||||
case $1 in
|
||||
*\=*)
|
||||
local key=$(echo "$1" | cut -f1 -d=)
|
||||
echo "$1" | cut -c $(( ${#key} + 2 ))
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
start() {
|
||||
local header=true cryptfs_status=0
|
||||
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
|
||||
|
||||
local x
|
||||
for x in $(cat /proc/cmdline) ; do
|
||||
case "${x}" in
|
||||
key_timeout\=*)
|
||||
local KEY_TIMEOUT=$(get_bootparam_val "${x}")
|
||||
if [ ${KEY_TIMEOUT} -gt 0 ] ; then
|
||||
read_timeout="-t ${KEY_TIMEOUT}"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
while read -u 3 targetline ; do
|
||||
case ${targetline} in
|
||||
# skip comments and blank lines
|
||||
""|"#"*) continue ;;
|
||||
# skip service-specific openrc configs #377927
|
||||
rc_*) continue ;;
|
||||
esac
|
||||
|
||||
${header} && ebegin "Setting up dm-crypt mappings"
|
||||
header=false
|
||||
|
||||
# check for the start of a new target/swap
|
||||
case ${targetline} in
|
||||
target=*|swap=*)
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
# Prepare for the next target/swap by resetting variables
|
||||
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
|
||||
;;
|
||||
|
||||
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
|
||||
if [ -z "${target}${swap}" ] ; then
|
||||
ewarn "Ignoring setting outside target/swap section: ${targetline}"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
|
||||
dmcrypt_max_timeout=*)
|
||||
# ignore global options
|
||||
continue
|
||||
;;
|
||||
|
||||
*)
|
||||
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
|
||||
;;
|
||||
esac
|
||||
|
||||
# Queue this setting for the next call to dm_crypt_execute_xxx
|
||||
eval "${targetline}"
|
||||
done 3< ${conf_file}
|
||||
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
|
||||
}
|
||||
|
||||
stop() {
|
||||
local line header
|
||||
|
||||
# Break down all mappings
|
||||
header=true
|
||||
egrep "^(target|swap)=" ${conf_file} | \
|
||||
while read line ; do
|
||||
${header} && einfo "Removing dm-crypt mappings"
|
||||
header=false
|
||||
|
||||
target= swap=
|
||||
eval ${line}
|
||||
|
||||
[ -n "${swap}" ] && target=${swap}
|
||||
if [ -z "${target}" ] ; then
|
||||
ewarn "invalid line in ${conf_file}: ${line}"
|
||||
continue
|
||||
fi
|
||||
|
||||
ebegin " ${target}"
|
||||
cryptsetup remove ${target}
|
||||
eend $?
|
||||
done
|
||||
|
||||
# Break down loop devices
|
||||
header=true
|
||||
grep '^source=./dev/loop' ${conf_file} | \
|
||||
while read line ; do
|
||||
${header} && einfo "Detaching dm-crypt loop devices"
|
||||
header=false
|
||||
|
||||
source=
|
||||
eval ${line}
|
||||
|
||||
ebegin " ${source}"
|
||||
losetup -d "${source}"
|
||||
eend $?
|
||||
done
|
||||
|
||||
return 0
|
||||
}
|
@ -0,0 +1,21 @@
|
||||
2008-09-13 Doug Goldstein <cardoe@gentoo.org>
|
||||
* switch to udevadm settle since udevsettle has been deprecated
|
||||
and finally removed with udev 126.
|
||||
|
||||
--- cryptsetup-1.0.6/lib/libdevmapper.c
|
||||
+++ cryptsetup-1.0.6/lib/libdevmapper.c
|
||||
@@ -18,11 +18,11 @@
|
||||
|
||||
#define CRYPT_TARGET "crypt"
|
||||
|
||||
-#define UDEVSETTLE "/sbin/udevsettle"
|
||||
+#define UDEVSETTLE "/sbin/udevadm settle"
|
||||
|
||||
-static void run_udevsettle(void)
|
||||
+static int run_udevsettle(void)
|
||||
{
|
||||
- system(UDEVSETTLE);
|
||||
+ return system(UDEVSETTLE);
|
||||
}
|
||||
|
||||
static void set_dm_error(int level, const char *file, int line,
|
@ -0,0 +1,13 @@
|
||||
--- a/configure.ac 2013-03-24 05:02:02.000000000 -0400
|
||||
+++ b/configure.ac 2013-08-06 15:57:57.844461481 -0400
|
||||
@@ -149,8 +149,8 @@
|
||||
if test x$enable_static_cryptsetup = xyes; then
|
||||
saved_PKG_CONFIG=$PKG_CONFIG
|
||||
PKG_CONFIG="$PKG_CONFIG --static"
|
||||
- PKG_CHECK_MODULES([OPENSSL], [openssl])
|
||||
- CRYPTO_STATIC_LIBS=$OPENSSL_LIBS
|
||||
+ PKG_CHECK_MODULES([OPENSSL_STATIC], [openssl])
|
||||
+ CRYPTO_STATIC_LIBS=$OPENSSL_STATIC_LIBS
|
||||
PKG_CONFIG=$saved_PKG_CONFIG
|
||||
fi
|
||||
NO_FIPS([])
|
346
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/dmcrypt.rc
vendored
Executable file
346
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/dmcrypt.rc
vendored
Executable file
@ -0,0 +1,346 @@
|
||||
#!/sbin/runscript
|
||||
# Copyright 1999-2012 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/dmcrypt.rc,v 1.4 2012/05/11 08:33:01 vapier Exp $
|
||||
|
||||
depend() {
|
||||
before checkfs fsck
|
||||
}
|
||||
|
||||
# We support multiple dmcrypt instances based on $SVCNAME
|
||||
execute_hook="dm_crypt_execute_dmcrypt"
|
||||
# XXX: Should we drop this ?
|
||||
# execute_hook="dm_crypt_execute_localmount"
|
||||
conf_file="/etc/conf.d/${SVCNAME}"
|
||||
|
||||
# Get splash helpers if available.
|
||||
if [ -e /sbin/splash-functions.sh ] ; then
|
||||
. /sbin/splash-functions.sh
|
||||
fi
|
||||
|
||||
# Setup mappings for an individual target/swap
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_dmcrypt() {
|
||||
local dev ret mode foo
|
||||
|
||||
if [ -n "${target}" ] ; then
|
||||
# let user set options, otherwise leave empty
|
||||
: ${options:=' '}
|
||||
elif [ -n "${swap}" ] ; then
|
||||
if cryptsetup isLuks ${source} 2>/dev/null ; then
|
||||
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
|
||||
return
|
||||
fi
|
||||
target=${swap}
|
||||
# swap contents do not need to be preserved between boots, luks not required.
|
||||
# suspend2 users should have initramfs's init handling their swap partition either way.
|
||||
: ${options:='-c aes -h sha1 -d /dev/urandom'}
|
||||
: ${pre_mount:='mkswap ${dev}'}
|
||||
else
|
||||
return
|
||||
fi
|
||||
if [ -z "${source}" ] && [ ! -e "${source}" ] ; then
|
||||
ewarn "source \"${source}\" for ${target} missing, skipping..."
|
||||
return
|
||||
fi
|
||||
|
||||
if [ -n "${loop_file}" ] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " Setting up loop device ${source}"
|
||||
losetup ${source} ${loop_file}
|
||||
fi
|
||||
|
||||
# cryptsetup:
|
||||
# luksOpen <device> <name> # <device> is $source
|
||||
# create <name> <device> # <name> is $target
|
||||
local arg1="create" arg2="${target}" arg3="${source}" luks=0
|
||||
|
||||
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; }
|
||||
|
||||
# Older versions reported:
|
||||
# ${target} is active:
|
||||
# Newer versions report:
|
||||
# ${target} is active[ and is in use.]
|
||||
if cryptsetup status ${target} | egrep -q ' is active' ; then
|
||||
einfo "dm-crypt mapping ${target} is already configured"
|
||||
return
|
||||
fi
|
||||
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
# Handle keys
|
||||
if [ -n "${key}" ] ; then
|
||||
read_abort() {
|
||||
# some colors
|
||||
local ans savetty resettty
|
||||
[ -z "${NORMAL}" ] && eval $(eval_ecolors)
|
||||
einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) "
|
||||
shift
|
||||
# This is ugly as s**t. But POSIX doesn't provide `read -t`, so
|
||||
# we end up having to implement our own crap with stty/etc...
|
||||
savetty=$(stty -g)
|
||||
resettty='stty ${savetty}; trap - EXIT HUP INT TERM'
|
||||
trap 'eval "${resettty}"' EXIT HUP INT TERM
|
||||
stty -icanon
|
||||
[ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))"
|
||||
ans=$(dd count=1 bs=1 2>/dev/null) || ans=''
|
||||
eval "${resettty}"
|
||||
if [ -z "${ans}" ] ; then
|
||||
printf '\r'
|
||||
else
|
||||
echo
|
||||
fi
|
||||
case ${ans} in
|
||||
[yY]) return 0;;
|
||||
*) return 1;;
|
||||
esac
|
||||
}
|
||||
|
||||
# Notes: sed not used to avoid case where /usr partition is encrypted.
|
||||
mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg
|
||||
key=${key/:*/}
|
||||
case "${mode}" in
|
||||
gpg|reg)
|
||||
# handle key on removable device
|
||||
if [ -n "${remdev}" ] ; then
|
||||
# temp directory to mount removable device
|
||||
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
|
||||
if [ ! -d "${mntrem}" ] ; then
|
||||
if ! mkdir -p "${mntrem}" ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
|
||||
return
|
||||
fi
|
||||
fi
|
||||
i=0
|
||||
einfo "Please insert removable device for ${target}"
|
||||
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
|
||||
foo=""
|
||||
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
|
||||
# keyfile exists?
|
||||
if [ ! -e "${mntrem}${key}" ] ; then
|
||||
umount -n "${mntrem}"
|
||||
rmdir "${mntrem}"
|
||||
einfo "Cannot find ${key} on removable media."
|
||||
read_abort "Abort" ${read_timeout:--t 1} && return
|
||||
else
|
||||
key="${mntrem}${key}"
|
||||
break
|
||||
fi
|
||||
else
|
||||
[ -e "${remdev}" ] \
|
||||
&& foo="mount failed" \
|
||||
|| foo="mount source not found"
|
||||
fi
|
||||
: $((i += 1))
|
||||
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
|
||||
done
|
||||
else # keyfile ! on removable device
|
||||
if [ ! -e "${key}" ] ; then
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: keyfile ${key} does not exist."
|
||||
return
|
||||
fi
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: mode ${mode} is invalid."
|
||||
return
|
||||
;;
|
||||
esac
|
||||
else
|
||||
mode=none
|
||||
fi
|
||||
ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}"
|
||||
if [ "${mode}" = "gpg" ] ; then
|
||||
: ${gpg_options:='-q -d'}
|
||||
# gpg available ?
|
||||
if type -p gpg >/dev/null ; then
|
||||
for i in 0 1 2 ; do
|
||||
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
|
||||
# save stdin stdout stderr "values"
|
||||
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
[ ${ret} -eq 0 ] && break
|
||||
done
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
else
|
||||
ewarn "${source} will not be decrypted ..."
|
||||
einfo "Reason: cannot find gpg application."
|
||||
einfo "You have to install app-crypt/gnupg first."
|
||||
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
|
||||
fi
|
||||
else
|
||||
if [ "${mode}" = "reg" ] ; then
|
||||
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
else
|
||||
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
|
||||
ret=$?
|
||||
eend ${ret} "failure running cryptsetup"
|
||||
fi
|
||||
fi
|
||||
if [ -d "${mntrem}" ] ; then
|
||||
umount -n ${mntrem} 2>/dev/null >/dev/null
|
||||
rmdir ${mntrem} 2>/dev/null >/dev/null
|
||||
fi
|
||||
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
|
||||
|
||||
if [ ${ret} -ne 0 ] ; then
|
||||
cryptfs_status=1
|
||||
else
|
||||
if [ -n "${pre_mount}" ] ; then
|
||||
dev="/dev/mapper/${target}"
|
||||
ebegin " pre_mount: ${pre_mount}"
|
||||
eval "${pre_mount}" > /dev/null
|
||||
ewend $? || cryptfs_status=1
|
||||
fi
|
||||
fi
|
||||
}
|
||||
|
||||
# Run any post_mount commands for an individual mount
|
||||
#
|
||||
# Note: This relies on variables localized in the main body below.
|
||||
dm_crypt_execute_localmount() {
|
||||
local mount_point
|
||||
|
||||
[ -z "${target}" ] && [ -z "${post_mount}" ] && return
|
||||
|
||||
if ! cryptsetup status ${target} | egrep -q '\<active:' ; then
|
||||
ewarn "Skipping unmapped target ${target}"
|
||||
cryptfs_status=1
|
||||
return
|
||||
fi
|
||||
|
||||
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
|
||||
if [ -z "${mount_point}" ] ; then
|
||||
ewarn "Failed to find mount point for ${target}, skipping"
|
||||
cryptfs_status=1
|
||||
fi
|
||||
|
||||
if [ -n "${post_mount}" ] ; then
|
||||
ebegin "Running post_mount commands for target ${target}"
|
||||
eval "${post_mount}" >/dev/null
|
||||
eend $? || cryptfs_status=1
|
||||
fi
|
||||
}
|
||||
|
||||
# Lookup optional bootparams
|
||||
get_bootparam_val() {
|
||||
# We're given something like:
|
||||
# foo=bar=cow
|
||||
# Return the "bar=cow" part.
|
||||
case $1 in
|
||||
*\=*)
|
||||
local key=$(echo "$1" | cut -f1 -d=)
|
||||
echo "$1" | cut -c $(( ${#key} + 2 ))
|
||||
;;
|
||||
esac
|
||||
}
|
||||
|
||||
start() {
|
||||
local header=true cryptfs_status=0
|
||||
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
|
||||
|
||||
local x
|
||||
for x in $(cat /proc/cmdline) ; do
|
||||
case "${x}" in
|
||||
key_timeout\=*)
|
||||
local KEY_TIMEOUT=$(get_bootparam_val "${x}")
|
||||
if [ ${KEY_TIMEOUT} -gt 0 ] ; then
|
||||
read_timeout="-t ${KEY_TIMEOUT}"
|
||||
fi
|
||||
;;
|
||||
esac
|
||||
done
|
||||
|
||||
while read -u 3 targetline ; do
|
||||
case ${targetline} in
|
||||
# skip comments and blank lines
|
||||
""|"#"*) continue ;;
|
||||
# skip service-specific openrc configs #377927
|
||||
rc_*) continue ;;
|
||||
esac
|
||||
|
||||
${header} && ebegin "Setting up dm-crypt mappings"
|
||||
header=false
|
||||
|
||||
# check for the start of a new target/swap
|
||||
case ${targetline} in
|
||||
target=*|swap=*)
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
# Prepare for the next target/swap by resetting variables
|
||||
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
|
||||
;;
|
||||
|
||||
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
|
||||
if [ -z "${target}${swap}" ] ; then
|
||||
ewarn "Ignoring setting outside target/swap section: ${targetline}"
|
||||
continue
|
||||
fi
|
||||
;;
|
||||
|
||||
dmcrypt_max_timeout=*)
|
||||
# ignore global options
|
||||
continue
|
||||
;;
|
||||
|
||||
*)
|
||||
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
|
||||
;;
|
||||
esac
|
||||
|
||||
# Queue this setting for the next call to dm_crypt_execute_xxx
|
||||
eval "${targetline}"
|
||||
done 3< ${conf_file}
|
||||
|
||||
# If we have a target queued up, then execute it
|
||||
${execute_hook}
|
||||
|
||||
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
|
||||
}
|
||||
|
||||
stop() {
|
||||
local line header
|
||||
|
||||
# Break down all mappings
|
||||
header=true
|
||||
egrep "^(target|swap)=" ${conf_file} | \
|
||||
while read line ; do
|
||||
${header} && einfo "Removing dm-crypt mappings"
|
||||
header=false
|
||||
|
||||
target= swap=
|
||||
eval ${line}
|
||||
|
||||
[ -n "${swap}" ] && target=${swap}
|
||||
if [ -z "${target}" ] ; then
|
||||
ewarn "invalid line in ${conf_file}: ${line}"
|
||||
continue
|
||||
fi
|
||||
|
||||
ebegin " ${target}"
|
||||
cryptsetup remove ${target}
|
||||
eend $?
|
||||
done
|
||||
|
||||
# Break down loop devices
|
||||
header=true
|
||||
grep '^source=./dev/loop' ${conf_file} | \
|
||||
while read line ; do
|
||||
${header} && einfo "Detaching dm-crypt loop devices"
|
||||
header=false
|
||||
|
||||
source=
|
||||
eval ${line}
|
||||
|
||||
ebegin " ${source}"
|
||||
losetup -d "${source}"
|
||||
eend $?
|
||||
done
|
||||
|
||||
return 0
|
||||
}
|
17
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/metadata.xml
vendored
Normal file
17
sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/metadata.xml
vendored
Normal file
@ -0,0 +1,17 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<herd>base-system</herd>
|
||||
<use>
|
||||
<flag name="dynamic">Build cryptsetup dynamically</flag>
|
||||
<flag name="gcrypt">Use <pkg>dev-libs/libgcrypt</pkg> crypto backend</flag>
|
||||
<flag name="kernel">Use kernel crypto backend (mainly for embedded systems)</flag>
|
||||
<flag name="nettle">Use <pkg>dev-libs/nettle</pkg> crypto backend</flag>
|
||||
<flag name="openssl">Use <pkg>dev-libs/openssl</pkg> crypto backend</flag>
|
||||
<flag name="urandom">Use /dev/urandom instead of /dev/random</flag>
|
||||
<flag name="reencrypt">Build cryptsetup-reencrypt</flag>
|
||||
</use>
|
||||
<upstream>
|
||||
<remote-id type="google-code">cryptsetup</remote-id>
|
||||
</upstream>
|
||||
</pkgmetadata>
|
Loading…
x
Reference in New Issue
Block a user