diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.0.6-r2 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.0.6-r2 new file mode 100644 index 0000000000..a3df476c0b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.0.6-r2 @@ -0,0 +1,12 @@ +DEFINED_PHASES=compile install postinst setup unpack +DEPEND=>=sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 =sys-fs/lvm2-2.02.45 >=dev-libs/libgcrypt-1.1.42 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 =sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 =sys-apps/util-linux-2.17.2 !dynamic? ( || ( >=dev-libs/libgpg-error-1.10[static-libs] =dev-libs/popt-1.16-r1[static-libs] =sys-apps/util-linux-2.20[static-libs] =sys-fs/lvm2-2.02.64 >=dev-libs/libgcrypt-1.1.42:0 >=dev-libs/libgpg-error-1.0-r1 >=dev-libs/popt-1.7 virtual/udev || ( >=sys-libs/e2fsprogs-libs-1.41 =sys-apps/util-linux-2.17.2 +SLOT=0 +SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.1.3.tar.bz2 +_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=5939a762b2970e56157cce11a7392c29 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.2.0-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.2.0-r1 new file mode 100644 index 0000000000..f50bd7b474 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.2.0-r1 @@ -0,0 +1,13 @@ +DEFINED_PHASES=configure install postinst prepare setup test +DEPEND=!static? ( >=dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks static? ( >=dev-libs/libgpg-error-1.10[static-libs] >=dev-libs/popt-1.16-r1[static-libs] || ( >=sys-apps/util-linux-2.20[static-libs] =sys-fs/lvm2-2.02.88[static-libs] =dev-libs/libgcrypt-1.1.42:0 dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=sys-fs/lvm2-2.02.64 ) virtual/udev >=sys-libs/e2fsprogs-libs-1.41 selinux? ( sys-libs/libselinux ) !sys-fs/cryptsetup-luks +SLOT=0 +SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.2.0.tar.bz2 +_eclasses_=eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=3075ed8e7d04a7f6a74595181abbefb4 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.4.3 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.4.3 new file mode 100644 index 0000000000..72d8ee68a7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.4.3 @@ -0,0 +1,13 @@ +DEFINED_PHASES=configure install postinst prepare setup test +DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) +DESCRIPTION=Tool to setup encrypted devices with dm-crypt +EAPI=4 +HOMEPAGE=http://code.google.com/p/cryptsetup/ +IUSE=nls selinux static static-libs udev +KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 +LICENSE=GPL-2 +RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] >=dev-libs/popt-1.7[static-libs(+)] >=sys-apps/util-linux-2.17.2[static-libs(+)] >=dev-libs/libgcrypt-1.1.42:0[static-libs(+)] >=sys-fs/lvm2-2.02.64[static-libs(+)] >=sys-libs/e2fsprogs-libs-1.41[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error >=dev-libs/popt-1.7 >=sys-apps/util-linux-2.17.2 >=dev-libs/libgcrypt-1.1.42:0 >=sys-fs/lvm2-2.02.64 >=sys-libs/e2fsprogs-libs-1.41 udev? ( virtual/udev ) !=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool +DESCRIPTION=Tool to setup encrypted devices with dm-crypt +EAPI=5 +HOMEPAGE=http://code.google.com/p/cryptsetup/ +IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7 +KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86 +LICENSE=GPL-2+ +RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) +REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) ) +SLOT=0 +SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.2.tar.bz2 +_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=9a89f15b4731426d9207d71a551b36db diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.3 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.3 new file mode 100644 index 0000000000..c110f6ead7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.3 @@ -0,0 +1,14 @@ +DEFINED_PHASES=configure install postinst prepare setup test +DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool +DESCRIPTION=Tool to setup encrypted devices with dm-crypt +EAPI=5 +HOMEPAGE=http://code.google.com/p/cryptsetup/ +IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7 +KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 +LICENSE=GPL-2+ +RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) +REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) ) +SLOT=0 +SRC_URI=http://cryptsetup.googlecode.com/files/cryptsetup-1.6.3.tar.bz2 +_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=8c0d12e561582e098729cca132078263 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.4 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.4 new file mode 100644 index 0000000000..5851fbf747 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.4 @@ -0,0 +1,14 @@ +DEFINED_PHASES=configure install postinst prepare setup test +DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool +DESCRIPTION=Tool to setup encrypted devices with dm-crypt +EAPI=5 +HOMEPAGE=http://code.google.com/p/cryptsetup/ +IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7 +KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 +LICENSE=GPL-2+ +RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) +REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) ) +SLOT=0 +SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.4.tar.xz +_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=2cee1b3883a5db817fbcade015586a03 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.5 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.5 new file mode 100644 index 0000000000..5c573c829e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-fs/cryptsetup-1.6.5 @@ -0,0 +1,14 @@ +DEFINED_PHASES=configure install postinst prepare setup test +DEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) virtual/pkgconfig static? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) || ( >=sys-devel/automake-1.12:1.12 >=sys-devel/automake-1.13:1.13 ) >=sys-devel/autoconf-2.68 sys-devel/libtool +DESCRIPTION=Tool to setup encrypted devices with dm-crypt +EAPI=5 +HOMEPAGE=http://code.google.com/p/cryptsetup/ +IUSE=+gcrypt kernel nettle openssl nls python reencrypt static static-libs udev urandom python_targets_python2_6 python_targets_python2_7 python_single_target_python2_6 python_single_target_python2_7 +KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 +LICENSE=GPL-2+ +RDEPEND=static-libs? ( dev-libs/libgpg-error[static-libs(+)] dev-libs/popt[static-libs(+)] sys-apps/util-linux[static-libs(+)] gcrypt? ( dev-libs/libgcrypt:0[static-libs(+)] ) nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] ) openssl? ( dev-libs/openssl[static-libs(+)] ) sys-fs/lvm2[static-libs(+)] sys-libs/e2fsprogs-libs[static-libs(+)] udev? ( virtual/udev[static-libs(+)] ) ) dev-libs/libgpg-error dev-libs/popt sys-apps/util-linux gcrypt? ( dev-libs/libgcrypt:0 ) nettle? ( >=dev-libs/nettle-2.4 ) openssl? ( dev-libs/openssl ) sys-fs/lvm2 sys-libs/e2fsprogs-libs udev? ( virtual/udev ) python? ( python_single_target_python2_6? ( >=dev-lang/python-2.6.8-r3:2.6 ) python_single_target_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) dev-lang/python-exec:=[python_targets_python2_6(-)?,python_targets_python2_7(-)?,python_single_target_python2_6(+)?,python_single_target_python2_7(+)?] ) +REQUIRED_USE=^^ ( gcrypt kernel nettle openssl ) python? ( python_single_target_python2_6? ( python_targets_python2_6 ) python_single_target_python2_7? ( python_targets_python2_7 ) ^^ ( python_single_target_python2_6 python_single_target_python2_7 ) ) +SLOT=0 +SRC_URI=mirror://kernel/linux/utils/cryptsetup/v1.6/cryptsetup-1.6.5.tar.xz +_eclasses_=autotools 16761a2f972abd686713e5967ff3c754 eutils 4878e7f88afc0ba0866ac112190b0fd4 libtool b1c8688e60f9580bcb9bb46e08737eb1 linux-info a9cbd6bbe2b28166e403321882f3c73c multilib 892e597faee02a5b94eb02ab512e7622 multiprocessing 89580da5ec17ad687fcde876c542b91e python-single-r1 4d9f916e821994a2ccdbbcfc8ac225c9 python-utils-r1 49ee0ca5e1019d8f256a23692dad2642 toolchain-funcs 51e6c948e72c43bcc8edc7544411c953 user d0a4d0735a6c0183d707ca919bd72f28 versionator 6601b4c5b3f019a993db59a50e1854e4 +_md5_=1e4b280955b331259db9e7feecc0c354 diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/ChangeLog b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/ChangeLog new file mode 100644 index 0000000000..984e4fe9f9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/ChangeLog @@ -0,0 +1,712 @@ +# ChangeLog for sys-fs/cryptsetup +# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.169 2014/07/01 07:27:44 robbat2 Exp $ + +*cryptsetup-1.6.5 (01 Jul 2014) + + 01 Jul 2014; Robin H. Johnson +cryptsetup-1.6.5.ebuild: + Bump per bug #515838. + +*cryptsetup-1.6.4 (03 Mar 2014) + + 03 Mar 2014; Lars Wendler -cryptsetup-1.1.2.ebuild, + -cryptsetup-1.4.1.ebuild, -cryptsetup-1.4.1-r1.ebuild, + -cryptsetup-1.4.2.ebuild, -cryptsetup-1.6.0.ebuild, -cryptsetup-1.6.1.ebuild, + +cryptsetup-1.6.4.ebuild, -files/1.1.0-libudev.patch, + -files/1.1.0_rc3-static-no-selinux.patch, -files/1.4.1-dmcrypt.rc: + Version bump (bug #503280). Removed old. + + 01 Mar 2014; Michał Górny cryptsetup-1.1.2.ebuild, + cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild, + cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.1.ebuild, cryptsetup-1.4.2.ebuild, + cryptsetup-1.4.3.ebuild, cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild, + cryptsetup-1.6.1.ebuild, cryptsetup-1.6.2.ebuild, cryptsetup-1.6.3.ebuild: + Update libgcrypt dep to use slot :0. + + 18 Jan 2014; Agostino Sarubbo cryptsetup-1.6.2.ebuild: + Stable for alpha, wrt bug #487652 + + 15 Jan 2014; Agostino Sarubbo cryptsetup-1.6.2.ebuild: + Stable for ia64, wrt bug #487652 + +*cryptsetup-1.6.3 (27 Dec 2013) + + 27 Dec 2013; Lars Wendler +cryptsetup-1.6.3.ebuild: + Version bump by Manuel Rüger (bug #496126). + + 23 Dec 2013; Agostino Sarubbo cryptsetup-1.6.2.ebuild: + Stable for sparc, wrt bug #487652 + + 22 Dec 2013; Agostino Sarubbo cryptsetup-1.6.2.ebuild: + Stable for ppc64, wrt bug #487652 + + 21 Dec 2013; Agostino Sarubbo cryptsetup-1.6.2.ebuild: + Stable for ppc, wrt bug #487652 + + 01 Dec 2013; Johannes Huber cryptsetup-1.6.2.ebuild: + x86 stable, bug #487652 + + 27 Nov 2013; Markus Meier cryptsetup-1.6.2.ebuild: + arm stable, bug #487652 + + 19 Nov 2013; Chema Alonso cryptsetup-1.6.2.ebuild: + Stable for amd64 wrt bug #487652 + + 09 Nov 2013; Jeroen Roovers cryptsetup-1.6.2.ebuild: + Stable for HPPA (bug #487652). + + 05 Sep 2013; Michał Górny cryptsetup-1.6.1.ebuild: + Clean up PYTHON_COMPAT from old implementations. + +*cryptsetup-1.6.2 (14 Aug 2013) + + 14 Aug 2013; Tim Harder +cryptsetup-1.6.2.ebuild: + Version bump. + + 14 Aug 2013; Tim Harder metadata.xml: + Simplify USE flag descriptions. + + 06 Aug 2013; Ian Stakenvicius + +files/cryptsetup-1.6.1-openssl-static.patch, cryptsetup-1.6.1.ebuild: + fixed compilation error when USE='openssl static', bug 472692; dropped + IUSE=selinux as there is no direct dep, selinux support comes from + libdevmapper via sys-fs/lvm2[selinux] + + 04 Jun 2013; Diego E. Pettenò cryptsetup-1.6.1.ebuild: + Fix broken dependencies. + + 04 Jun 2013; Tim Harder cryptsetup-1.6.1.ebuild: + Drop -caps use dep from libgcrypt to fix dep tree (and libgcrypt now has + capabilities disabled by default). + +*cryptsetup-1.6.1 (04 Jun 2013) + + 04 Jun 2013; Tim Harder +cryptsetup-1.6.1.ebuild, + metadata.xml: + Version bump (bug #464610 by Manuel Rüger), convert to python-single-r1, add + support for choosing a crypto backend (gcrypt, kernel, nettle, or openssl), + remove old postinst warning, and only show postinst logs on new installs. + + 09 Apr 2013; Samuli Suominen + cryptsetup-1.0.6-r2.ebuild: + Remove sys-fs/device-mapper from || () syntax in favour of sys-fs/lvm2 wrt + #461382 + + 21 Jan 2013; Mike Frysinger cryptsetup-1.4.3.ebuild, + cryptsetup-1.5.1.ebuild, cryptsetup-1.6.0.ebuild: + Add USE=udev control #453390 by Piotr Mitas. + + 21 Jan 2013; Samuli Suominen cryptsetup-1.5.1.ebuild, + cryptsetup-1.6.0.ebuild: + Restore virtual/udev dependency wrt #453390 by Piotr Mitas + +*cryptsetup-1.6.0 (17 Jan 2013) +*cryptsetup-1.5.1 (17 Jan 2013) + + 17 Jan 2013; Robin H. Johnson +cryptsetup-1.5.1.ebuild, + +cryptsetup-1.6.0.ebuild, +files/1.5.1-dmcrypt.rc, metadata.xml: + Bump per bug #421249. Add UUID support per bug #420015. + + 21 Dec 2012; Mike Frysinger cryptsetup-1.4.3.ebuild: + Drop udev dep since cryptsetup no longer calls udevsettle at runtime #445660 + by Piotr Karbowski. + + 16 Dec 2012; Raúl Porcel cryptsetup-1.4.3.ebuild: + alpha/ia64/s390/sh/sparc stable wrt #429704 + + 29 Nov 2012; Samuli Suominen + cryptsetup-1.0.6-r2.ebuild, cryptsetup-1.1.2.ebuild, + cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild, + cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild, cryptsetup-1.4.2.ebuild, + cryptsetup-1.4.3.ebuild: + Use virtual/udev instead of sys-fs/udev wrt #444398 + + 21 Nov 2012; Agostino Sarubbo cryptsetup-1.4.3.ebuild: + Stable for x86, tested by Vicente Olivert Riera , wrt + bug #429704 + + 30 Oct 2012; Jeroen Roovers cryptsetup-1.4.3.ebuild: + Stable for HPPA (bug #429704). + + 25 Oct 2012; Anthony G. Basile cryptsetup-1.4.3.ebuild: + stable arm ppc ppc64, bug #429704 + + 22 Oct 2012; Agostino Sarubbo cryptsetup-1.4.3.ebuild: + Stable for amd64, wrt bug #429704 + + 21 Oct 2012; Samuli Suominen + cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild: + Update sys-fs/udev dependency because stable udev was revision bumped. + +*cryptsetup-1.4.3 (06 Jun 2012) + + 06 Jun 2012; Mike Frysinger +cryptsetup-1.4.3.ebuild: + Version bump #419829 by Manuel Rüger (mrueg). + + 21 May 2012; Samuli Suominen + cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild: + Fix sys-fs/udev dependency within || ( ) block from -171-r5 to -171-r6 wrt + #416653, Comment #3 by Mariusz Pękala + + 11 May 2012; Mike Frysinger cryptsetup-1.4.2.ebuild: + Always depend on library packages as we install a shared lib as pointed out by + Samuli Suominen #414665 by Egor Y. Egorov. + +*cryptsetup-1.4.2 (11 May 2012) + + 11 May 2012; Mike Frysinger +cryptsetup-1.4.2.ebuild, + files/dmcrypt.rc: + Version bump #412795 by Manuel Rüger (mrueg). Replace `read -t` with stty + hacks by Martin Väth #255528. + + 11 May 2012; Mike Frysinger +files/1.4.1-dmcrypt.rc, + cryptsetup-1.4.1.ebuild, cryptsetup-1.4.1-r1.ebuild: + Rename stable dmcrypt init.d so updates can land for newer versions. + + 11 May 2012; Mike Frysinger files/dmcrypt.rc: + Use POSIX compliant for loop #408117 by Maxim Kammerer. + + 11 May 2012; Mike Frysinger cryptsetup-1.4.1-r1.ebuild: + Add write access to /dev/mapper and /dev/loop for tests #408047 by Toralf + Förster. + + 11 May 2012; Mike Frysinger cryptsetup-1.4.1-r1.ebuild: + Unify static lib dependencies and update to EAPI=4. + + 01 Apr 2012; Raúl Porcel cryptsetup-1.4.1.ebuild: + alpha/ia64/s390/sh/sparc stable wrt #401217 + + 30 Mar 2012; Markus Meier cryptsetup-1.4.1.ebuild: + arm stable, bug #401217 + +*cryptsetup-1.4.1-r1 (20 Mar 2012) + + 20 Mar 2012; Samuli Suominen + +cryptsetup-1.4.1-r1.ebuild: + Don't enable USE="static" by default anymore because initramfs is required + with latest udev for separate /usr in anycase. This was a workaround for + cross / and /usr linking. + + 20 Mar 2012; Samuli Suominen + cryptsetup-1.2.0-r1.ebuild, cryptsetup-1.4.1.ebuild: + Make sure sys-fs/udev has been emerged with USE="static-libs" for + USE="static" wrt #409039 by jannis + + 14 Mar 2012; Jeroen Roovers cryptsetup-1.4.1.ebuild: + Stable for HPPA (bug #401217). + + 13 Mar 2012; Samuli Suominen cryptsetup-1.4.1.ebuild: + ppc/ppc64/x86 stable wrt #401217 + + 11 Mar 2012; Agostino Sarubbo cryptsetup-1.4.1.ebuild: + Stable for amd64, wrt bug #401217 + + 27 Feb 2012; Robin H. Johnson cryptsetup-1.1.3-r3.ebuild: + Stable version is bitten by the util-linux static-libs as well, per + https://forums.gentoo.org/viewtopic-t-914468.html. + + 20 Nov 2011; Mike Frysinger files/dmcrypt.rc: + Drop dead prompt code. + + 13 Nov 2011; Mike Frysinger cryptsetup-1.4.1.ebuild: + Fix init.d typo #390381 by Helmut Jarausch. + +*cryptsetup-1.4.1 (13 Nov 2011) + + 13 Nov 2011; Mike Frysinger +cryptsetup-1.4.1.ebuild, + +files/dmcrypt.rc: + Version bump #363521 by Attila Jecs. Rewrite init.d script to only work with + openrc. Tweak init.d for splash support #386563 by Tim Ruffing, and make a + bit more POSIX compliant #255528 by Martin Väth. + + 19 Sep 2011; Mike Frysinger cryptsetup-1.2.0-r1.ebuild: + Simplify deps a little more, and require static-libs with lvm2 #383417 by + Bernd Lommerzheim. + + 07 Sep 2011; Mike Frysinger cryptsetup-1.2.0-r1.ebuild: + Pull in util-linux for uuid and require static/static-libs properly #381197 + by Vasileios Lourdas, and drop older deps that are no longer in the tree. + + 07 Aug 2011; Mike Frysinger + files/1.1.3-dm-crypt-start.sh: + Patch by ekass to skip service-specific openrc configs #377927. + + 17 Mar 2011; Samuli Suominen + cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild: + Fix dev-libs/popt USE static-libs depend. + + 22 Jan 2011; Raúl Porcel cryptsetup-1.1.3-r3.ebuild: + alpha/ia64/s390/sh/sparc stable wrt #350044 + + 21 Jan 2011; Jeroen Roovers cryptsetup-1.1.3-r3.ebuild: + Stable for HPPA (bug #350044). + + 18 Jan 2011; Mike Frysinger files/1.0.5-dmcrypt.rc: + Don't require device-mapper -- let the user select which packages they + need for their fs stack #351251 by Jochen Klein. + + 18 Jan 2011; Kacper Kowalik + cryptsetup-1.1.3-r3.ebuild: + ppc64 stable wrt #350044 + + 17 Jan 2011; Mike Frysinger + cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild: + Require new dev-libs/libgcrypt[static-libs] too #351810. + + 15 Jan 2011; Mike Frysinger + cryptsetup-1.2.0-r1.ebuild: + Require libgpg-error[static-libs] when USE=static #351810 by Peter Volkov. + +*cryptsetup-1.1.3-r3 (12 Jan 2011) + + 12 Jan 2011; Mike Frysinger + files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r3.ebuild, + files/1.1.3-dm-crypt-stop.sh: + Push out updated addon to fix baselayout-2 support #350399 by Martin + Kolleck. + + 08 Jan 2011; Markus Meier cryptsetup-1.1.3-r2.ebuild: + arm stable, bug #350044 + +*cryptsetup-1.1.3-r2 (08 Jan 2011) + + 08 Jan 2011; Mike Frysinger + files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r2.ebuild: + Push out updated addon to fix baselayout-1 support #350399 by Manuel + Danisch. + + 08 Jan 2011; Mike Frysinger + files/1.1.3-dm-crypt-start.sh: + Tweak status detection to work with newer cryptsetup output #350345 by + Aaron Lewis. + + 08 Jan 2011; Mike Frysinger + cryptsetup-1.2.0-r1.ebuild: + Improve tests a bit -- skip when dmcrypt is not available. + + 07 Jan 2011; Brent Baude cryptsetup-1.1.3-r1.ebuild: + stable ppc, bug 350044 + + 04 Jan 2011; Mike Frysinger + cryptsetup-1.2.0-r1.ebuild: + Fix build failures for USE=-static #350463 by Alessandro Guido. + + 02 Jan 2011; Pawel Hajdan jr + cryptsetup-1.1.3-r1.ebuild: + x86 stable wrt bug #350044 + + 01 Jan 2011; Markos Chandras + cryptsetup-1.1.3-r1.ebuild: + Stable on amd64 wrt bug #350044 + +*cryptsetup-1.2.0-r1 (30 Dec 2010) + + 30 Dec 2010; Mike Frysinger -cryptsetup-1.2.0.ebuild, + +cryptsetup-1.2.0-r1.ebuild: + Convert to IUSE=+static and make it work again #350105 by Casey Carter. + +*cryptsetup-1.2.0 (29 Dec 2010) + + 29 Dec 2010; Mike Frysinger +cryptsetup-1.2.0.ebuild: + Version bump #349962 by ScytheMan. + + 29 Oct 2010; Jeroen Roovers cryptsetup-1.1.2.ebuild: + Stable for HPPA (bug #327689). + + 06 Oct 2010; Mike Frysinger + files/1.1.3-dm-crypt-start.sh: + Do not warn about global options #329437 by Marcin Mirosław. + +*cryptsetup-1.1.3-r1 (30 Sep 2010) + + 30 Sep 2010; Mike Frysinger + +files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r1.ebuild, + +files/1.1.3-dm-crypt-stop.sh: + Update by Wolfram to let the init.d scripts be multiplexed #338876. + + 28 Aug 2010; Raúl Porcel cryptsetup-1.1.2.ebuild: + ia64/s390/sh/sparc stable wrt #327689 + + 28 Aug 2010; Markus Meier cryptsetup-1.1.2.ebuild: + arm stable, bug #327689 + + 13 Aug 2010; Joseph Jezak cryptsetup-1.1.2.ebuild: + Marked ppc/ppc64 stable for bug #327689. + + 31 Jul 2010; Tobias Klausmann + cryptsetup-1.1.2.ebuild: + Stable on alpha, bug #327689 + + 27 Jul 2010; Robin H. Johnson + -cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.7.ebuild, + -cryptsetup-1.0.7-r1.ebuild, -cryptsetup-1.1.0.ebuild, + -cryptsetup-1.1.1_rc1.ebuild, -cryptsetup-1.1.1_rc2.ebuild, + -cryptsetup-1.1.1.ebuild: + Cleanup old versions. + + 27 Jul 2010; Robin H. Johnson + cryptsetup-1.1.2.ebuild, cryptsetup-1.1.3.ebuild: + Bug #329991: Document that users of plain (non-LUKS) volumes from the 1.0 + series MUST specify the cipher/keysize/hash, as the defaults have changed + for security reasons. + + 27 Jul 2010; Pacho Ramos cryptsetup-1.1.2.ebuild: + amd64 stable, bug 327689 + + 23 Jul 2010; Christian Faulhammer + cryptsetup-1.1.2.ebuild: + stable x86, bug 327689 + +*cryptsetup-1.1.3 (21 Jul 2010) + + 21 Jul 2010; Robin H. Johnson + +cryptsetup-1.1.3.ebuild: + Version bump. + +*cryptsetup-1.1.2 (17 Jun 2010) + + 17 Jun 2010; Robin H. Johnson + +cryptsetup-1.1.2.ebuild: + Bug #323655: version bump + +*cryptsetup-1.1.1 (24 May 2010) + + 24 May 2010; Robin H. Johnson + +cryptsetup-1.1.1.ebuild: + Version bump. + +*cryptsetup-1.1.1_rc2 (14 May 2010) + + 14 May 2010; Robin H. Johnson + +cryptsetup-1.1.1_rc2.ebuild: + Bug #318379: version bump. Fixes dm-crypt module loading over rc1. + + 01 May 2010; Robin H. Johnson + cryptsetup-1.1.1_rc1.ebuild: + Both patches are actually not needed now. + +*cryptsetup-1.1.1_rc1 (01 May 2010) + + 01 May 2010; Robin H. Johnson + +cryptsetup-1.1.1_rc1.ebuild: + Bug #318039: version bump. + + 23 Apr 2010; Robin H. Johnson + +files/1.1.0-libudev.patch, cryptsetup-1.1.0.ebuild: + Bug #316571: Bring in libudev for devmapper. + +*cryptsetup-1.1.0 (14 Feb 2010) + + 14 Feb 2010; Robin H. Johnson + +files/1.1.0_rc3-static-no-selinux.patch, +cryptsetup-1.1.0.ebuild: + Version bump per bug #294934. + +*cryptsetup-1.0.7-r1 (30 Nov 2009) + + 30 Nov 2009; Robin H. Johnson + +cryptsetup-1.0.7-r1.ebuild: + Bug #276803: old sys-fs/devicemapper not supported anymore. Use the new + lvm2-2.02.56-r1 for safe static linking. + +*cryptsetup-1.0.7 (28 Nov 2009) + + 28 Nov 2009; Robin H. Johnson + +cryptsetup-1.0.7.ebuild: + Version bump per bug #277990. + + 31 Aug 2009; Raúl Porcel cryptsetup-1.0.6-r2.ebuild: + arm/ia64/s390/sh/sparc stable wrt #259253 + + 16 Aug 2009; Mike Frysinger + cryptsetup-1.0.6-r2.ebuild: + Install into rcscripts multilib dir #262838 by Thilo Bangert. + + 16 Aug 2009; Mike Frysinger + cryptsetup-1.0.6-r2.ebuild: + Make sure USE=selinux is respected #274034 by Petteri Räty. + + 16 Aug 2009; Mike Frysinger + files/cryptsetup-1.0.6-udevsettle.patch: + Do not complain if udevadm did not exec for systems that use mdev and such + #276369 by Florian Streibelt. + + 15 Jul 2009; nixnut cryptsetup-1.0.6-r2.ebuild: + ppc stable #259253 + + 27 Jun 2009; Tobias Klausmann + cryptsetup-1.0.6-r2.ebuild: + Stable on alpha, bug #259253 + + 27 Jun 2009; Tobias Klausmann ChangeLog: + Stable on alpha, bug #259253 + + 26 Jun 2009; Thomas Anderson + cryptsetup-1.0.6-r2.ebuild: + stable amd64, bug 259253 + + 19 Jun 2009; Brent Baude cryptsetup-1.0.6-r2.ebuild: + stable ppc64, bug 259253 + + 17 Jun 2009; Jeroen Roovers cryptsetup-1.0.6-r2.ebuild: + Stable for HPPA (bug #259253). + + 17 Jun 2009; Christian Faulhammer + cryptsetup-1.0.6-r2.ebuild: + stable x86, bug 259253 + + 16 Jun 2009; Jeremy Olexa + files/1.0.6-r2-dm-crypt-start.sh: + Fix dm-crypt-start.sh file for passphrase at startup issue, bug 243216 + + 19 Apr 2009; Doug Goldstein + -files/1.0.6-dm-crypt-start.sh, -cryptsetup-1.0.5.ebuild, + cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.6.ebuild, + -cryptsetup-1.0.6-r1.ebuild, cryptsetup-1.0.6-r2.ebuild: + clean up old versions. clean up depends + + 10 Apr 2009; Caleb Tennis cryptsetup-0.1-r3.ebuild, + cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild, + cryptsetup-1.0.6.ebuild, cryptsetup-1.0.6-r1.ebuild, + cryptsetup-1.0.6-r2.ebuild: + Fix device-mapper dep for new lvm2, bug #265599 + +*cryptsetup-1.0.6-r2 (05 Oct 2008) + + 05 Oct 2008; Mike Frysinger + +files/1.0.6-dmcrypt.confd, +files/1.0.6-r2-dm-crypt-start.sh, + +cryptsetup-1.0.6-r2.ebuild: + Do not bang directly on /dev/console so we dont break when running under X + or something. + + 15 Sep 2008; Robin H. Johnson + cryptsetup-1.0.6-r1.ebuild: + Bug #237714, make the udev dep for udevadm slightly wider. + + 14 Sep 2008; Robin H. Johnson + cryptsetup-1.0.6-r1.ebuild: + Fix changelog removal, and ensure a min version of udev for new revision + since some old versions did not contain the udevadm tool yet. + +*cryptsetup-1.0.6-r1 (14 Sep 2008) + + 14 Sep 2008; Doug Goldstein + +files/cryptsetup-1.0.6-udevsettle.patch, -cryptsetup-0.1-r2.ebuild, + cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild, + cryptsetup-1.0.6.ebuild, +cryptsetup-1.0.6-r1.ebuild: + fix bug #236481. block udev-126 and higher on older versions that won't + work with it. add udev as a depend since the code calls it always. remove + old version + + 22 Aug 2008; Doug Goldstein metadata.xml: + add GLEP 56 USE flag desc from use.local.desc + + 16 Aug 2008; Torsten Veller metadata.xml: + Remove strerror from metadata.xml (#89719) + + 25 Mar 2008; cryptsetup-0.1-r2.ebuild, + cryptsetup-0.1-r3.ebuild: + Drop to ~mips due to unstable deps + +*cryptsetup-1.0.6 (19 Mar 2008) + + 19 Mar 2008; Mike Frysinger + +files/1.0.6-dm-crypt-start.sh, +cryptsetup-1.0.6.ebuild: + Version bump #212997 by Alex Elsayed and make startup script much nicer + #202364 by me. + + 20 Feb 2008; Chris Gianelloni + cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild: + I hate blank spaces in output for no reason, so switching from using echo to + using an extra \n at the end of the line. + + 01 Feb 2008; Diego Pettenò files/1.0.5-dmcrypt.rc: + Update init script to work with current development version of OpenRC + (checkroot -> root; checkfs -> fsck). + + 31 Jan 2008; Chris Gianelloni + cryptsetup-1.0.5-r1.ebuild: + Cleaning up a couple typos/errors in einfo/ewarn output. There's no actual + code changes in this. + + 06 Nov 2007; Raúl Porcel cryptsetup-1.0.5-r1.ebuild: + alpha/ia64/sparc stable wrt #195648 + + 02 Nov 2007; Steve Dibb cryptsetup-1.0.5-r1.ebuild: + amd64 stable, bug 195648 + + 14 Oct 2007; Markus Rothe cryptsetup-1.0.5-r1.ebuild: + Stable on ppc64; bug #195648 + + 13 Oct 2007; Jeroen Roovers cryptsetup-1.0.5-r1.ebuild: + Stable for HPPA (bug #195648). + + 13 Oct 2007; nixnut cryptsetup-1.0.5-r1.ebuild: + Stable on ppc wrt bug 195648 + + 13 Oct 2007; Christian Faulhammer + cryptsetup-1.0.5-r1.ebuild: + stable x86, bug 195648 + + 06 Oct 2007; Mike Frysinger cryptsetup-1.0.5.ebuild, + cryptsetup-1.0.5-r1.ebuild: + Block cryptsetup-luks #194907 by Jakub Moc. + +*cryptsetup-1.0.5-r1 (02 Oct 2007) + + 02 Oct 2007; Benjamin Smee + files/1.0.5-dm-crypt-start.sh, files/1.0.5-dm-crypt-stop.sh, + files/1.0.5-dmcrypt.rc, +cryptsetup-1.0.5-r1.ebuild: + Fixes for bugs #180068 #181503 #164795 and other improvements. Thanks to + Thomas Bettler for a patch + + 14 Sep 2007; Chris Gianelloni + cryptsetup-1.0.5.ebuild: + Removed check for USE=build since it did nothing because cryptsetup isn't in + stage1. Removed call to linux-info_pkg_setup to remove requirement on a + configured kernel. This fixes bug #148390 from this end, but changes are + still needed in linux-info.eclass, which is tracked at bug #192556. + + 15 Aug 2007; Benjamin Smee + files/1.0.5-dm-crypt-start.sh: + Change to 1.0.5-dm-crypt-start.sh to fix misplaced bin + +*cryptsetup-1.0.5 (14 Aug 2007) + + 14 Aug 2007; Benjamin Smee + +files/1.0.5-dm-crypt-start.sh, +files/1.0.5-dm-crypt-stop.sh, + +files/1.0.5-dmcrypt.confd, +files/1.0.5-dmcrypt.rc, + +cryptsetup-1.0.5.ebuild: + Major changes for bug #177100 and others. Thanks to ikelos + + 07 Jul 2006; Thomas Cort cryptsetup-0.1-r3.ebuild: + Stable on alpha wrt Bug #124928. + + 28 Apr 2006; Luis Medinas cryptsetup-0.1-r3.ebuild: + Stable on amd64. Bug #124928. + + 27 Apr 2006; Alec Warner Manifest: + Fixing SHA256 digest, pass four + + 29 Apr 2006; Joshua Kinard cryptsetup-0.1-r3.ebuild: + Marked stable on mips. + + 10 Mar 2006; Aron Griffis cryptsetup-0.1-r3.ebuild: + Mark 0.1-r3 stable on ia64. #124928 + + 06 Mar 2006; Gustavo Zacarias + cryptsetup-0.1-r3.ebuild: + Stable on sparc wrt #124928 + + 06 Mar 2006; Michele Noberasco cryptsetup-0.1-r3.ebuild: + Stable for x86, see bug #124928 + + 05 Mar 2006; Tom Gall cryptsetup-0.1-r3.ebuild: + stable on ppc64, bug #124928 + + 04 Mar 2006; cryptsetup-0.1-r3.ebuild: + Stable on ppc. bug #124928 + + 26 Feb 2006; Joshua Kinard cryptsetup-0.1-r2.ebuild: + Marked stable on mips. + + 15 Feb 2006; Markus Rothe cryptsetup-0.1-r2.ebuild: + Stable on ppc64; bug #118791 + + 08 Feb 2006; Aron Griffis cryptsetup-0.1-r2.ebuild: + Mark 0.1-r2 stable on alpha + +*cryptsetup-0.1-r3 (02 Feb 2006) + + 02 Feb 2006; Benjamin Smee + +files/cryptsetup-libmapper.patch, +cryptsetup-0.1-r3.ebuild: + Bump for bug #120802 + + 13 Jan 2006; Tobias Scherbaum + cryptsetup-0.1-r2.ebuild: + ppc stable, bug #118791 + + 12 Jan 2006; Markus Rothe cryptsetup-0.1-r2.ebuild: + Added ~ppc64 + + 12 Jan 2006; Chris Gianelloni + cryptsetup-0.1-r2.ebuild: + Stable on x86 wrt bug #118791. + + 12 Jan 2006; Luis Medinas cryptsetup-0.1-r2.ebuild: + Stable on amd64. See bug #118791. + + 12 Jan 2006; Gustavo Zacarias + cryptsetup-0.1-r2.ebuild: + Stable on sparc wrt #118791 + + 25 Nov 2005; Tom Gall cryptsetup-0.1-r1.ebuild: + stable on ppc64 + + 18 Oct 2005; Aron Griffis cryptsetup-0.1-r1.ebuild: + Mark 0.1-r1 stable on alpha + + 03 Sep 2005; Daniel Black + cryptsetup-0.1-r1.ebuild, cryptsetup-0.1-r2.ebuild: + dependancy fixes + + 08 Aug 2005; Aaron Walker cryptsetup-0.1-r2.ebuild: + Added ~mips for bug 89528. + +*cryptsetup-0.1-r2 (02 Jun 2005) + + 02 Jun 2005; Benjamin Smee + +cryptsetup-0.1-r2.ebuild: + Now blocks with cryptsetup-luks + + 29 May 2005; Benjamin Smee cryptsetup-0.1-r1.ebuild: + Removed "die" call as per Spanky's request. + + 25 May 2005; Herbie Hopkins cryptsetup-0.1-r1.ebuild: + Multilib fixes. + + 24 May 2005; Benjamin Smee metadata.xml, + cryptsetup-0.1-r1.ebuild: + Fixed the dm-crypt check as per bug 89142 + + 12 Apr 2005; Gustavo Zacarias + cryptsetup-0.1-r1.ebuild: + Stable on sparc + + 25 Mar 2005; Bryan Østergaard + cryptsetup-0.1-r1.ebuild: + Add ~alpha keyword, bug 83684. + + 22 Mar 2005; Gustavo Zacarias + cryptsetup-0.1-r1.ebuild: + Keyworded ~sparc wrt #83684 + + 14 Mar 2005; Rob Holland : + fixed up module check. fixes bug #85102 + +*cryptsetup-0.1-r1 (02 Mar 2005) + + 02 Mar 2005; Martin Schlemmer +files/cryptfs.confd, + +files/dm-crypt-start.sh, +files/dm-crypt-stop.sh, + +cryptsetup-0.1-r1.ebuild: + Add cryptfs conf.d file and addon scripts. + + 01 Mar 2005; Lars Weiler cryptsetup-0.1.ebuild: + Stable on ppc. + + 13 Oct 2004; Chris Gianelloni cryptsetup-0.1.ebuild: + Stable on amd64, blame jhuebel. + + 17 Sep 2004; Rob Holland cryptsetup-0.1.ebuild: + Marking stable on x86 + + 27 Jul 2004; Travis Tilley cryptsetup-0.1.ebuild: + added ~amd64 keyword + + 22 Jul 2004; David Holm cryptsetup-0.1.ebuild: + Added to ~ppc. + +*cryptsetup-0.1 (21 Jul 2004) + + 21 Jul 2004; Rob Holland +cryptsetup-0.1.ebuild: + Initial version. Closes bug #44079. Thanks to ripple@ripple.be and + ben@disciplina.net for submitting ebuilds for it diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/Manifest b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/Manifest new file mode 100644 index 0000000000..9b44063330 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/Manifest @@ -0,0 +1,30 @@ +AUX 1.0.5-dm-crypt-stop.sh 1022 SHA256 42015047c708aa73eae615559ff76c9c8948a5d01fba68f64c5432e30ec799a4 SHA512 6a8e55a2458278a48edaa8563ff7a586f521280587f4aacf03ab903fe6c3ae312b1925ee73a1462352d86cdc7097945f7ea842ba633ed527bbfb3a80689b1ae0 WHIRLPOOL c97f3d3485f56cb687acda6c697c4bb97e531d3aacc819ffa7073d9ac99f3e3d237e154064476e5f7ef1fce9b990792ffc992a90e083b5c93c45501f74564c58 +AUX 1.0.5-dmcrypt.rc 601 SHA256 0b58b18dc903d0d4a23e5e2df1e6f3c5db64c65b8884e24710e4b7528ea3f8dc SHA512 d18f0192eea97d5051b81b4287b96d5ffb59e2dc3611f93111ff92700916d561c246f956417f438180b9f65313f35fa85ca076872592ef87c984b91d9625c3c6 WHIRLPOOL 66eaefe2ea4ab4d82e2956891efac6e884f7997a36b9cd9527412b3d3713394d5d5144b0ec3807daee3de05dba15a0f9c7a2a1cc9f4919121f6d13ffbb2d582e +AUX 1.0.6-dmcrypt.confd 3309 SHA256 0c30e081c0b8f879964ae49735f10b05a1d92f4f481042851958860945e13271 SHA512 d04ae17d3708ef20ade7afb223d4ef19e1b6812e0be8f9499e37e9c71344568b42030d9dd8f6918a9bfb211a3a94b40a9354e3b32a009cb165e84508d0a5e14b WHIRLPOOL 9496cd3fb3f8e8d84a5d70fd6e9853fdd2fe87df96244cb00fe73fee9a711847d795937b800ff13f98a888a288cfc5b33f564392794413e2a0b8e033165d4f5f +AUX 1.0.6-r2-dm-crypt-start.sh 8092 SHA256 56004bef91b8fad57fe67fec19427dd7c48e01c8e1ba7ff60f8c370295775fdc SHA512 e55949ed23518f9530476973ab632f9d4af9a5a684546baf662caabe4566aeb0164484ed972ab2edf220120609c593b05fc07173da388b3fceb5063acef3aadb WHIRLPOOL 6f67efbf34bfc62b316026106fe89914c8a16f7377a64ff787e81fa80ab32654c88e803e5f0cb4ecaa943d36499d4b72c469cb2bb030c830d064836cc4ecae61 +AUX 1.1.3-dm-crypt-start.sh 8651 SHA256 1489ce5480d51beb81cf4f5178468ad4b2f2e4b3f53bc75ee8fe47d3e050a76a SHA512 4cd3e4c28f1c3da4b864c556873c2036854da78d0c3055f06ea8e2d359f16dc7020b4ebc2c0d4024dc557f51e923a919ecf384add07e92525d908efe4073af4d WHIRLPOOL b68eacec508861821c1573dd85b4fb1a5d909ab70ad8445997796cf328cd54c8a2363dfc54ae8da82b4d7e526df6938baab5332bd8cb2d1c095ac15e730541ae +AUX 1.1.3-dm-crypt-stop.sh 1272 SHA256 c81bf0cf8e57b3f83f55c808dba619b0a0f60eef8c3ed406d266be7cecdf96f9 SHA512 ec184e988f3ab36c5f661cc4743edf8ce0798ff69e4e40df854c172eaf0bae264de10160ee098dbfb7814318b2cd875ea18e1b447789c7e08b9549b11db3f175 WHIRLPOOL cb0c1afb4929229dc7bdade5657f053192c72a6011fd0eb05ef1e649f6a31925a57e61913cbea208eb0b3e2547b8bbe37cecb4e343ba84722efe2affadfa12ca +AUX 1.5.1-dmcrypt.rc 9453 SHA256 02faf27470ea0e50b764c923786724847e77dfdf9680a50cc202546cad2bf02f SHA512 660d1a29294e8e01343aea0b92d9159d42891261d41313c3f9e77ed3bd69e648d19d3799a8ad1b00884b6f4c0f48d4e12cb406ca291e64b789e71ba70ab3c29f WHIRLPOOL 3f36f078eb5f8d07d52b2559b2f7ba7280c620bab895b3ab34ee12619a4145ad3f04879f821b91a17805c792f0395ec96070aa218836373a38aa839fe0260505 +AUX cryptsetup-1.0.6-udevsettle.patch 561 SHA256 80c4914071769dedc20198425b4ea528ec22264ff4c54516a9e5722a8e671f60 SHA512 74631c2aab95bd32a67dce1ae75ea30acdb167be78503a31ef8afbf178b651917cc65a37bafc5d6d60c1d3545664a2f53bf07885ba3ba86f562b12db17733228 WHIRLPOOL beb109875aa9579f05527d79a12eb0ebfd187853322accb70dc9e2a36e7ca4be881aa7f504f7573a040a64e0df777e70c4fbf31f79f29728c74cffaea8029d74 +AUX cryptsetup-1.6.1-openssl-static.patch 472 SHA256 7029ba7870ff183b7dac3c658140c8c01286efd29e9427d1195b5b4e85fe2f4f SHA512 4292ee661b3e1a26b3c9b6fe8f360ed1df1cb416a13162ffa40d6610d5d0431c3dbdb17280fb1aa3aa6eeacb735ead3da4e6cc126d8be74121565b4c9bf6c6a2 WHIRLPOOL f0186cf9317560a480dab53c8c538f35ba5273401f2d37b4be9e3aae06203c43fcd22c4ce17c41cf80a01db5cd22877105ff2be0a8f3effd50cde8c9f42b68df +AUX dmcrypt.rc 9336 SHA256 2cacfbe5b305c0ba9633764e79dfadd160e63ffb089f7347c0bca8c2ba9ec42f SHA512 0019cc0d0bb91c04b04949cdfb0126fdb04541ec4e76117760092e1287d4a4eb091ecbf643fb8e4346f226e6b01d8fe358f0f0e0221f31abc83415b5e235b17a WHIRLPOOL 527fbbebafcdd7e2e3687acdc59fb07e2fa26370508aa0758ca0deb6e12fcab789271b6733cdfd18381ddf55f606152febe6f1e4fdac26d1efd4206b7b219655 +DIST cryptsetup-1.0.6.tar.bz2 405713 SHA256 df7fda80cfa01f063caf39140287a47d018dfe056fc71a3ba605e690ff0183fd SHA512 deed2c603bfba3b26eb1cab65d880eb9fd69dc4aabc9e8fa2bf78de0879ecd5ddb03c4c6bd9c0ec166d2d5e87a13bb370e6e46d50f5dd246522e81bf75380e1b WHIRLPOOL 71e9c71387f0d6242303bcb53825595023af387b8a76c48681b74ccd38fa19b225930edddcd1369ea62854e5d95b05447b72ede707bd2a8af110242fcc41536f +DIST cryptsetup-1.1.3.tar.bz2 499276 SHA256 9c8e68a272f6d9cfb6cd65cc0743f4c44a2096c61f74e0602bf40208b5e69c0a SHA512 ecf259f41384d0d10d522c01f12815743e3a245b897a223909bce91b95401b73d1d0bd22cbe73d1d26e44df13c0666d039879404c26b66835d49983be69637ea WHIRLPOOL 8a7ebfc3dc6a2eda339add80682f678186272ecde027006196d3a9ffebd69ddbf76665df75f1f602c22a1309d35af9c1d320d0432acb2dd89f5287dad4b04af0 +DIST cryptsetup-1.2.0.tar.bz2 523859 SHA256 411129817ff29e6a957bcbdcd9a2c4c953c1539acd8af912c383262ba901b5ea SHA512 7af9b26581d544e6207ad126e0ee4cf963b013cb1306f05e82fda1703d3fdf35b29e11f56e1fbc3641db9f52874a44057fba5b96597cfa595710cc94619692be WHIRLPOOL eb05a564bbdfac23f0b35409c30fc16b145bbe98bab364ea3e25bbdb54fe16b1238bd537788b2de6dc53271c51f6257b05380706f94e41303453f411fba57b4e +DIST cryptsetup-1.4.3.tar.bz2 798101 SHA256 d5ff2c00f6f791d77fa5636a02ae43ddbb46c6c793bdeafdec5e38fd15f99d0a SHA512 e91ad9cda9549802e9ea5cec02273ee4bc1a040883650e903e91a07c8cce8131b0bda068fa3433d2b5b3b7470cf9481d73670267cd419ce2d7b0f673b3601ba3 WHIRLPOOL e30c3bb9ad24145e425d64069cc84d8c129dc06d775299668dea9ad06c14c95e21b8bb734f94872990c7c1586666bdc6aee79aac5c8a64bacc3aa416d23a2f24 +DIST cryptsetup-1.5.1.tar.bz2 958979 SHA256 16d23f78cab35937281a0ae7a8febce0c3a1a0f291cc94e169a7b968b81d2b36 SHA512 f1847d1833f0aba59af334a5b3919ca44b1a6dce152a44ccb76747fed5996ce83bddac9b6550ab8c63d7ca66dd9e0e79ccc2399b7b3860e8090bf776a72a77b0 WHIRLPOOL 2f24c43ba689039ab3548225cda91bea0c65cf2014e7cd57157def111493c3c2037a283cb778c3301c9d7b138f4fc8da21ce5752b9d1379d66fa01ef2481823e +DIST cryptsetup-1.6.2.tar.bz2 1189584 SHA256 15723f0198303d4bcb99d480b7a773918e2d319f0348457988c063bdd03e109a SHA512 59fb835ef8bcd6d0c704a021055032639840ef4bb7be6ade8ff91d347ae74d8e6cba4583d8ced7a4a8c6f09ebc16c4eff3549c13c4327d92fd9234db58e18c10 WHIRLPOOL 3ab24572ea42dfdd0d5176dfa4621520cd0bccda53c3a01676d400a7a841ab9643c979c4942daa774658602bd8cdf659376cbc94c553e2097c5eb3c51a7edb31 +DIST cryptsetup-1.6.3.tar.bz2 1263747 SHA256 a2af4731d9442cb70bc84b7cecdd069493055d29ab65ab625c574b0f599938d8 SHA512 f11c58db2643f5a1035be9de699fa7cef7780f83da261dbb0425d233bcf73df6f120b71c23a8a122b1f648c8fe43eea3e15f75aa536184a537f3e5dd00a1f988 WHIRLPOOL 5e9075082c920563aeeb34556415b031c5ce51182c3430c0a679bf9873a11d6e74599fc10b4b26ca79971130dffb330e83d9ecd1365b6e892e588895df7b8a65 +DIST cryptsetup-1.6.4.tar.xz 1081492 SHA256 70b8e86eef94bbb4441ad38460d87138130d7aaaafe5d01131c3ba50b9f0dca0 SHA512 0208d856fa59425fcd1216c92f32af2efcf8bbd6f32730ae8e0fe93720d4adceadbff94684d5d3f76bae347669949fa6029ab9832dc3812830a84801f4006669 WHIRLPOOL ffde0b3774663cb897aeab6ce84f5851b6b18ed83fdfec17ebc8ea2ce4fba243fb73c95415b3c052745145b5b2478dde790120dc42c419d0bde73f47435e94a0 +DIST cryptsetup-1.6.5.tar.xz 1136892 SHA256 267973f20be43f9d685f7193aa23954b60768c74a1d330243114d4b8bc17ca9a SHA512 c77ac590d28954e7bd430d1069b820a288c4668857a7ced7f81546ea39676f2b536abbcda06f20440e31c205b7ada68bcfa5aab220b102a2b62198a788d9b65e WHIRLPOOL 74a597abbdcc1225bb811597e53737eab2348a328f3ba30e7eb519a0621b06e6c898e320db8e24a16decfd4706b6a2e68b06894dde91124e4c089e952dbff9c1 +EBUILD cryptsetup-1.0.6-r2.ebuild 3122 SHA256 e0428878fb5416942255112eb70d7a6fdb13583504fdbcdac641a0457f7b97e9 SHA512 178ba72e4687ca0b388b423626eb3ad12ae694567c2f18faf09830cda1a633c29268df13f9b074a421a31715b6e46853a942e8833381500ca7becf688571ac0d WHIRLPOOL 773a0858a6c479f1020c328ca1bd202f0e316db22f9ee075cf21a40032a4543a2337631352ab6804f05041a4bde7925aee98576fcf5ab064b603357d7be4b3d7 +EBUILD cryptsetup-1.1.3-r3.ebuild 3465 SHA256 5ad4b06a3cf68ea96ae8be24789435ab5398af40f510a2916a6b62ae4819c9a8 SHA512 6ab8e527e6df332803e65e3e385f3633153278251cd024dd671b4e71ec0696e5594348edf91441c308161689ed7465caa4a5d25ee73f31f797c796b9dd76d8f5 WHIRLPOOL 1ccbe5f4e085b8acd5ea86ea003f30a14c4d43ae61a69718d86b553029f9e63f612c84b7b2f24b8a0c77ceeb418f62a2dc42ccf17b73dd8fb837d72f8d84dc8b +EBUILD cryptsetup-1.2.0-r1.ebuild 3656 SHA256 5a066c639ceed3b8ddbf82ebc8adb60666917273f5cab992c75418d6cfe030fe SHA512 a22cc0f0457c9f9e323b8c3752b76f1198171e44dc7379f86b5173e74a5d44a9d48c8c74fb61d1627cc895206a88a01a9fc4d7b9f5e689b03545ce9889040121 WHIRLPOOL 28553355a7e1d894a659dfe2447b17ab3240289687f2ca147371061b0daacbe9718d3dee27dc9122237fa42d4265d3ca68a365343a6999035e4f93337cdf459b +EBUILD cryptsetup-1.4.3.ebuild 3557 SHA256 e52546b86cdcae464416c6264d5cf39c12b17c3380417c45095a659d9e460dbc SHA512 069b6e48e6839eb5d547828bffbedcadd13dc9f868b69493e8c5c6095052dbfdb1a30fa5339f626c6ddb73dfc38dd9dd862a2475f6c7dc9db375edd2239d95b1 WHIRLPOOL 693fcf51ec4484b869d69c975f4d7e8e04004ac0ebb649ca418ccd4618d059aa63a3bd5538df8c01fce3e701c024baea91daef3f4d15bafe7cd1ca8f87a1096b +EBUILD cryptsetup-1.5.1.ebuild 3841 SHA256 ee28ec449fe8e1cbf85d134c1f83f93ffc89b5901768302685db0c89b632b2b4 SHA512 6c05ba5ee426211dd91bea0269b300366b73f3b02a1d2d7943d9193ed91932f74031177b71e8bd2d116a9ee7a272b4a5c7a1d9957911ba7ec6e16c90e76c99e6 WHIRLPOOL 9d1896939e355f86ac3c5896e4659028b5ebee3ef72592d7e94a378d122481594ca3172461c7f000ffbbf0888031792be50ad49aea30dbf6c69b42fac675f80b +EBUILD cryptsetup-1.6.2.ebuild 4336 SHA256 d6fcda5bf1ca14e1eb3c44538dc8bd262a6e981360452d4f34c67d26bdf44dc4 SHA512 9f891931cc22554f78bbadcbf30c966feeeda060de4f6d5752e9297b9eacc8dc06fed2315af8719c5c56b26334383631b85d136637a1a12ceffc452280cb6e3f WHIRLPOOL 6b7601283a6ea93c891954d4725a798f5b2f2ef608cd43cfec8c1c0d4d0763d0b710bd2d952ccab4ec1b4ccccc0e8869c57f229c3f7b371327f12cf05728f0c7 +EBUILD cryptsetup-1.6.3.ebuild 4289 SHA256 89803dc31a19496a793bcdd257af2066899954cd2c7992c75a95fc939a59e5ad SHA512 f652f1a6ff27f580056963668d069a1dce178bfbbb9795ef5ce3a76876a7f421d431d34f2cc06ab02a56e7cf077adfc5cf8673eec705ce868bf2b3805b9d44dd WHIRLPOOL 5bee95e56b1549af8d2e177a02eefb5a08eab94c82e1d66c593eee951c972ef5c095ece98e1487681d86426ed4bda50ec4d3cc20d54ddd8b733b3f659265c505 +EBUILD cryptsetup-1.6.4.ebuild 4398 SHA256 4bdaf08c4bbbab4d537cb6fca4b58a3192ab4605a27713e09154d97fd57d9d17 SHA512 1fbf44658f90a050b9501cc47da08456c9439fe6b51b4eb2ad02225f563ddde3931421cdf86f1312670625f9d30cbeed01b1e36283570f2a4eee7ec679678464 WHIRLPOOL 3fa6210779f7b03cd8be05624750ade452702c6d4aa0e273e12843c3bf126c7472259ea2e252ae9cacfe0ae434afeef9369c22131dd0372bf75b6c216b38125f +EBUILD cryptsetup-1.6.5.ebuild 4393 SHA256 ee46294c37be5e6034d23ab8c05b82f873cbf0e7021c0a5d41b0ffe46420eb76 SHA512 c1000b213d8c1954feb5cd1c2f0bca4a76609beba6cebe626520e0e24a517802d44c1da95b5bcd1c0803989660048122a8434bb982a64c053a4274e3fca9a490 WHIRLPOOL 4ee554e7ba3db16eab302365b9ea50e1ddf3e98daacf343ce80823d69463bdad8062e579a1870ee2071ac2c7f4af11934f4a875915cc36810acf1ca5a924980f +MISC ChangeLog 26171 SHA256 c2383c81dcffe8c6225e4c0fdf071b14d7a86e4211b11c3d9d513bafb6ca02ae SHA512 1f254a101c25d3b80edff4cee3c01514b6a49f283c9bf139ec61e7a8fa270e5ed3622ce1fa1f7aa32c15f71572674181c7255db565a8a4493dc57db8a9061b26 WHIRLPOOL 1d5fac728ec1b76da939009c04746a45412b866bef5c35f5c0fa2fbd8acbb02758d68fa7cbbbf4f29b89497075844394393cbfa5d0168fece8e672460dab89f7 +MISC metadata.xml 763 SHA256 494337a4a156da7feba29856957ffe6babede998bbbe2aa76ad68463f7a3ba4d SHA512 4124c6744a491b4b59115fe561408bde963d7527b835e5c554b3b99b460c6b2a9e98abb294f0e3de5af8625e27efecc7b139b8887b5e8b51af93772bd3574b1a WHIRLPOOL 1b76543228dffe7115e547dc068b6db84b06ff0a5f244c5964eb21cba55c9b6ee9637d4a19c38b4b9ebeba55ac7fe4437e97c4be32f26380fec6773b76ef8fce diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild new file mode 100644 index 0000000000..10cbf98ad2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild @@ -0,0 +1,101 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.0.6-r2.ebuild,v 1.17 2013/04/09 10:06:06 ssuominen Exp $ + +inherit linux-info eutils flag-o-matic multilib + +DESCRIPTION="Tool to setup encrypted devices with dm-crypt" +HOMEPAGE="http://luks.endorphin.org/ http://code.google.com/p/cryptsetup/" +SRC_URI="http://luks.endorphin.org/source/${P}.tar.bz2" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86" +IUSE="dynamic nls selinux" + +RDEPEND=">=sys-fs/lvm2-2.02.45 + >=dev-libs/libgcrypt-1.1.42 + >=dev-libs/libgpg-error-1.0-r1 + >=dev-libs/popt-1.7 + virtual/udev + || ( >=sys-libs/e2fsprogs-libs-1.41 == Mapping name for partition. +# swap= == Mapping name for swap partition. +# source='' == Real device for partition. +# key='[:]' == Fullpath from / or from inside removable media. +# remdev='' == Device that will be assigned to removable media. +# gpg_options='' == Default are --quiet --decrypt +# options='' == cryptsetup, for LUKS you can only use --readonly +# loop_file='' == Loopback file. +# pre_mount='cmds' == commands to execute before mounting partition. +# post_mount='cmds' == commands to execute after mounting partition. +#----------- +# Supported Modes +# gpg == decrypt and pipe key into cryptsetup. +# Note: new-line character must not be part of key. +# Command to erase \n char: 'cat key | tr -d '\n' > cleanKey' + +#-------------------- +# dm-crypt examples +#-------------------- + +## swap +# Swap partitions. These should come first so that no keys make their +# way into unencrypted swap. +# If no options are given, they will default to: -c aes -h sha1 -d /dev/urandom +# If no makefs is given then mkswap will be assumed +#swap=crypt-swap +#source='/dev/hda2' + +## /home with passphrase +#target=crypt-home +#source='/dev/hda5' + +## /home with regular keyfile +#target=crypt-home +#source='/dev/hda5' +#key='/full/path/to/homekey' + +## /home with gpg protected key +#target=crypt-home +#source='/dev/hda5' +#key='/full/path/to/homekey:gpg' + +## /home with regular keyfile on removable media(such as usb-stick) +#target=crypt-home +#source='/dev/hda5' +#key='/full/path/to/homekey' +#remdev='/dev/sda1' + +##/home with gpg protected key on removable media(such as usb-stick) +#target=crypt-home +#source='/dev/hda5' +#key='/full/path/to/homekey:gpg' +#remdev='/dev/sda1' + +##/tmp with regular keyfile +#target=crypt-tmp +#source='/dev/hda6' +#key='/full/path/to/tmpkey' +#pre_mount='/sbin/mkreiserfs -f -f ${dev}' +#post_mount='chown root:root ${mount_point}; chmod 1777 ${mount_point}' + +## Loopback file example +#mount='crypt-loop-home' +#source='/dev/loop0' +#loop_file='/mnt/crypt/home' diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-r2-dm-crypt-start.sh b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-r2-dm-crypt-start.sh new file mode 100644 index 0000000000..44d2c4563b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.0.6-r2-dm-crypt-start.sh @@ -0,0 +1,294 @@ +# /lib/rcscripts/addons/dm-crypt-start.sh + +# For backwards compatability with baselayout < 1.13.0 +dm_crypt_execute_checkfs() { + dm_crypt_execute_dmcrypt +} + +dm_crypt_execute_volumes() { + dm_crypt_execute_dmcrypt +} + +# Setup mappings for an individual target/swap +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_dmcrypt() { + local dev ret mode foo + # some colors + local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m' + + if [ -n "$target" ]; then + # let user set options, otherwise leave empty + : ${options:=' '} + elif [ -n "$swap" ]; then + einfo "Checking swap is not LUKS" + cryptsetup isLuks ${source} 2>/dev/null + foo="$?" + if [ "${foo}" -eq 0 ]; then + ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup." + return + fi + target=${swap} + # swap contents do not need to be preserved between boots, luks not required. + # suspend2 users should have initramfs's init handling their swap partition either way. + : ${options:='-c aes -h sha1 -d /dev/urandom'} + : ${pre_mount:='mkswap ${dev}'} + else + return + fi + if [ -z "$source" ] && [ ! -e "$source" ]; then + ewarn "source \"${source}\" for ${target} missing, skipping..." + return + fi + + if [[ -n ${loop_file} ]] ; then + dev="/dev/mapper/${target}" + ebegin " Setting up loop device ${source}" + /sbin/losetup ${source} ${loop_file} + fi + + # cryptsetup: + # luksOpen # is $source + # create # is $target + local arg1="create" arg2="$target" arg3="$source" luks=0 + + cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; } + + if /sbin/cryptsetup status ${target} | egrep -q '\/dev/null 2>&1 + + # Handle keys + if [ -n "$key" ]; then + read_abort() { + local ans + local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) " + shift + echo -n -e "${prompt}" + if ! read -n 1 $* ans ; then + local back=${prompt//?/\\b} + echo -n -e "${back}" + else + echo + fi + case $ans in + [yY]|[yY][eE][sS]) return 0;; + *) return 1;; + esac + } + + # Notes: sed not used to avoid case where /usr partition is encrypted. + mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg + key=${key/:*/} + case "$mode" in + gpg|reg) + # handle key on removable device + if [ -n "$remdev" ]; then + # temp directory to mount removable device + local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$" + if [ ! -d "${mntrem}" ] ; then + if ! mkdir -p "${mntrem}" ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: Unable to create temporary mount point '${mntrem}'" + return + fi + fi + i=0 + einfo "Please insert removable device for ${target}" + while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do + foo="" + if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then + # keyfile exists? + if [ ! -e "${mntrem}${key}" ]; then + umount -n "${mntrem}" + rmdir "${mntrem}" + einfo "Cannot find ${key} on removable media." + read_abort "Abort" ${read_timeout:--t 1} && return + else + key="${mntrem}${key}" + break + fi + else + [ -e "${remdev}" ] \ + && foo="mount failed" \ + || foo="mount source not found" + fi + ((++i)) + read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return + done + else # keyfile ! on removable device + if [ ! -e "$key" ]; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: keyfile ${key} does not exist." + return + fi + fi + ;; + *) + ewarn "${source} will not be decrypted ..." + einfo "Reason: mode ${mode} is invalid." + return + ;; + esac + else + mode=none + fi + ebegin "dm-crypt map ${target}" + einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}" + if [ "$mode" == "gpg" ]; then + : ${gpg_options:='-q -d'} + # gpg available ? + if type -p gpg >/dev/null ; then + for (( i = 0 ; i < 3 ; i++ )) + do + # paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected. + # save stdin stdout stderr "values" + gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret="$?" + [ "$ret" -eq 0 ] && break + done + eend "${ret}" "failure running cryptsetup" + else + ewarn "${source} will not be decrypted ..." + einfo "Reason: cannot find gpg application." + einfo "You have to install app-crypt/gnupg first." + einfo "If you have /usr on its own partition, try copying gpg to /bin ." + fi + else + if [ "$mode" == "reg" ]; then + cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3} + ret="$?" + eend "${ret}" "failure running cryptsetup" + else + cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret="$?" + eend "${ret}" "failure running cryptsetup" + fi + fi + if [ -d "$mntrem" ]; then + umount -n ${mntrem} 2>/dev/null >/dev/null + rmdir ${mntrem} 2>/dev/null >/dev/null + fi + splash svc_input_end ${SVCNAME} >/dev/null 2>&1 + + if [[ ${ret} != 0 ]] ; then + cryptfs_status=1 + else + if [[ -n ${pre_mount} ]] ; then + dev="/dev/mapper/${target}" + ebegin " Running pre_mount commands for ${target}" + eval "${pre_mount}" > /dev/null + ewend $? || cryptfs_status=1 + fi + fi +} + +# Run any post_mount commands for an individual mount +# +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_localmount() { + local mount_point + + [ -z "$target" ] && [ -z "$post_mount" ] && return + + if ! /sbin/cryptsetup status ${target} | egrep -q '\/dev/null + eend $? || cryptfs_status=1 + fi +} + +# Determine string lengths +strlen() { + if [ -z "$1" ] + then + echo "usage: strlen " + die + fi + eval echo "\${#${1}}" +} + +# Lookup optional bootparams +parse_opt() { + case "$1" in + *\=*) + local key_name="`echo "$1" | cut -f1 -d=`" + local key_len=`strlen key_name` + local value_start=$((key_len+2)) + echo "$1" | cut -c ${value_start}- + ;; + esac +} + +local cryptfs_status=0 +local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev + +CMDLINE="`cat /proc/cmdline`" +for x in ${CMDLINE} +do + case "${x}" in + key_timeout\=*) + KEY_TIMEOUT=`parse_opt "${x}"` + if [ ${KEY_TIMEOUT} -gt 0 ]; then + read_timeout="-t ${KEY_TIMEOUT}" + fi + ;; + esac +done + +if [[ -f /etc/conf.d/dmcrypt ]] && [[ -x /sbin/cryptsetup ]] ; then + ebegin "Setting up dm-crypt mappings" + + # Fix for baselayout-1.12.10 (bug 174256) + [ -z ${SVCNAME} ] && SVCNAME="${myservice}" + + while read -u 3 targetline ; do + # skip comments and blank lines + [[ ${targetline}\# == \#* ]] && continue + + # check for the start of a new target/swap + case ${targetline} in + target=*|swap=*) + # If we have a target queued up, then execute it + dm_crypt_execute_${SVCNAME} + + # Prepare for the next target/swap by resetting variables + unset gpg_options key loop_file target options pre_mount post_mount source swap remdev + ;; + + gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*) + if [[ -z ${target} && -z ${swap} ]] ; then + ewarn "Ignoring setting outside target/swap section: ${targetline}" + continue + fi + ;; + + *) + ewarn "Skipping invalid line in /etc/conf.d/dmcrypt: ${targetline}" + ;; + esac + + # Queue this setting for the next call to dm_crypt_execute_${SVCNAME} + eval "${targetline}" + done 3< /etc/conf.d/dmcrypt + + # If we have a target queued up, then execute it + dm_crypt_execute_${SVCNAME} + + ewend ${cryptfs_status} "Failed to setup dm-crypt devices" +fi + +# vim:ts=4 diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-start.sh b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-start.sh new file mode 100644 index 0000000000..e56dbc9781 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-start.sh @@ -0,0 +1,309 @@ +# /lib/rcscripts/addons/dm-crypt-start.sh + +# For backwards compatibility with baselayout < 1.13.0 #174256 +: ${SVCNAME:=${myservice}} + +# We might be hooked into init.d scripts (ala baselayout-1), or we might +# be a standalone dmcrypt script. We support multiple dmcrypt instances, +# but they must start with "dmcrypt." to be detected that way. It keeps +# our lives much simpler with this multiplexed arrangement. +execute_hook="dm_crypt_execute_dmcrypt" +conf_file="dmcrypt" +case ${SVCNAME} in + localmount) execute_hook="dm_crypt_execute_localmount" ;; + dmcrypt.*) conf_file="${SVCNAME}" ;; +esac +conf_file="/etc/conf.d/${conf_file}" + +# Setup mappings for an individual target/swap +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_dmcrypt() { + local dev ret mode foo + # some colors + local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m' + + if [ -n "$target" ]; then + # let user set options, otherwise leave empty + : ${options:=' '} + elif [ -n "$swap" ]; then + einfo "Checking swap is not LUKS" + cryptsetup isLuks ${source} 2>/dev/null + foo="$?" + if [ "${foo}" -eq 0 ]; then + ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup." + return + fi + target=${swap} + # swap contents do not need to be preserved between boots, luks not required. + # suspend2 users should have initramfs's init handling their swap partition either way. + : ${options:='-c aes -h sha1 -d /dev/urandom'} + : ${pre_mount:='mkswap ${dev}'} + else + return + fi + if [ -z "$source" ] && [ ! -e "$source" ]; then + ewarn "source \"${source}\" for ${target} missing, skipping..." + return + fi + + if [[ -n ${loop_file} ]] ; then + dev="/dev/mapper/${target}" + ebegin " Setting up loop device ${source}" + /sbin/losetup ${source} ${loop_file} + fi + + # cryptsetup: + # luksOpen # is $source + # create # is $target + local arg1="create" arg2="$target" arg3="$source" luks=0 + + cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; } + + # Older versions reported: + # ${target} is active: + # Newer versions report: + # ${target} is active[ and is in use.] + if cryptsetup status ${target} | egrep -q ' is active' ; then + einfo "dm-crypt mapping ${target} is already configured" + return + fi + splash svc_input_begin ${SVCNAME} >/dev/null 2>&1 + + # Handle keys + if [ -n "$key" ]; then + read_abort() { + local ans + local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) " + shift + echo -n -e "${prompt}" + if ! read -n 1 $* ans ; then + local back=${prompt//?/\\b} + echo -n -e "${back}" + else + echo + fi + case $ans in + [yY]|[yY][eE][sS]) return 0;; + *) return 1;; + esac + } + + # Notes: sed not used to avoid case where /usr partition is encrypted. + mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg + key=${key/:*/} + case "$mode" in + gpg|reg) + # handle key on removable device + if [ -n "$remdev" ]; then + # temp directory to mount removable device + local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$" + if [ ! -d "${mntrem}" ] ; then + if ! mkdir -p "${mntrem}" ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: Unable to create temporary mount point '${mntrem}'" + return + fi + fi + i=0 + einfo "Please insert removable device for ${target}" + while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do + foo="" + if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then + # keyfile exists? + if [ ! -e "${mntrem}${key}" ]; then + umount -n "${mntrem}" + rmdir "${mntrem}" + einfo "Cannot find ${key} on removable media." + read_abort "Abort" ${read_timeout:--t 1} && return + else + key="${mntrem}${key}" + break + fi + else + [ -e "${remdev}" ] \ + && foo="mount failed" \ + || foo="mount source not found" + fi + ((++i)) + read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return + done + else # keyfile ! on removable device + if [ ! -e "$key" ]; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: keyfile ${key} does not exist." + return + fi + fi + ;; + *) + ewarn "${source} will not be decrypted ..." + einfo "Reason: mode ${mode} is invalid." + return + ;; + esac + else + mode=none + fi + ebegin "dm-crypt map ${target}" + einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}" + if [ "$mode" == "gpg" ]; then + : ${gpg_options:='-q -d'} + # gpg available ? + if type -p gpg >/dev/null ; then + for (( i = 0 ; i < 3 ; i++ )) + do + # paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected. + # save stdin stdout stderr "values" + gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret="$?" + [ "$ret" -eq 0 ] && break + done + eend "${ret}" "failure running cryptsetup" + else + ewarn "${source} will not be decrypted ..." + einfo "Reason: cannot find gpg application." + einfo "You have to install app-crypt/gnupg first." + einfo "If you have /usr on its own partition, try copying gpg to /bin ." + fi + else + if [ "$mode" == "reg" ]; then + cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3} + ret="$?" + eend "${ret}" "failure running cryptsetup" + else + cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret="$?" + eend "${ret}" "failure running cryptsetup" + fi + fi + if [ -d "$mntrem" ]; then + umount -n ${mntrem} 2>/dev/null >/dev/null + rmdir ${mntrem} 2>/dev/null >/dev/null + fi + splash svc_input_end ${SVCNAME} >/dev/null 2>&1 + + if [[ ${ret} != 0 ]] ; then + cryptfs_status=1 + else + if [[ -n ${pre_mount} ]] ; then + dev="/dev/mapper/${target}" + ebegin " Running pre_mount commands for ${target}" + eval "${pre_mount}" > /dev/null + ewend $? || cryptfs_status=1 + fi + fi +} + +# Run any post_mount commands for an individual mount +# +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_localmount() { + local mount_point + + [ -z "$target" ] && [ -z "$post_mount" ] && return + + if ! /sbin/cryptsetup status ${target} | egrep -q '\/dev/null + eend $? || cryptfs_status=1 + fi +} + +# Determine string lengths +strlen() { + if [ -z "$1" ] + then + echo "usage: strlen " + die + fi + eval echo "\${#${1}}" +} + +# Lookup optional bootparams +parse_opt() { + case "$1" in + *\=*) + local key_name="`echo "$1" | cut -f1 -d=`" + local key_len=`strlen key_name` + local value_start=$((key_len+2)) + echo "$1" | cut -c ${value_start}- + ;; + esac +} + +local cryptfs_status=0 +local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev + +CMDLINE="`cat /proc/cmdline`" +for x in ${CMDLINE} +do + case "${x}" in + key_timeout\=*) + KEY_TIMEOUT=`parse_opt "${x}"` + if [ ${KEY_TIMEOUT} -gt 0 ]; then + read_timeout="-t ${KEY_TIMEOUT}" + fi + ;; + esac +done + +if [[ -f ${conf_file} ]] && [[ -x /sbin/cryptsetup ]] ; then + ebegin "Setting up dm-crypt mappings" + + while read -u 3 targetline ; do + # skip comments and blank lines + [[ ${targetline}\# == \#* ]] && continue + + # skip service-specific openrc configs #377927 + [[ ${targetline} == rc_* ]] && continue + + # check for the start of a new target/swap + case ${targetline} in + target=*|swap=*) + # If we have a target queued up, then execute it + ${execute_hook} + + # Prepare for the next target/swap by resetting variables + unset gpg_options key loop_file target options pre_mount post_mount source swap remdev + ;; + + gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*) + if [[ -z ${target} && -z ${swap} ]] ; then + ewarn "Ignoring setting outside target/swap section: ${targetline}" + continue + fi + ;; + + dmcrypt_max_timeout=*) + # ignore global options + continue + ;; + + *) + ewarn "Skipping invalid line in ${conf_file}: ${targetline}" + ;; + esac + + # Queue this setting for the next call to dm_crypt_execute_xxx + eval "${targetline}" + done 3< ${conf_file} + + # If we have a target queued up, then execute it + ${execute_hook} + + ewend ${cryptfs_status} "Failed to setup dm-crypt devices" +fi + +# vim:ts=4 diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-stop.sh b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-stop.sh new file mode 100644 index 0000000000..548269c0ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.1.3-dm-crypt-stop.sh @@ -0,0 +1,51 @@ +# /lib/rcscripts/addons/dm-crypt-stop.sh + +# For backwards compatibility with baselayout < 1.13.0 #174256 +: ${SVCNAME:=${myservice}} + +# See notes in dm-crypt-start.sh +execute_hook="dm_crypt_execute_dmcrypt" +conf_file="dmcrypt" +case ${SVCNAME} in + dmcrypt.*) conf_file="${SVCNAME}" ;; +esac +conf_file="/etc/conf.d/${conf_file}" + +# Try to remove any dm-crypt mappings +csetup=/sbin/cryptsetup +if [ -f ${conf_file} ] && [ -x "$csetup" ] +then + einfo "Removing dm-crypt mappings" + + /bin/egrep "^(target|swap)" ${conf_file} | \ + while read targetline + do + target= + swap= + + eval ${targetline} + + [ -n "${swap}" ] && target=${swap} + [ -z "${target}" ] && ewarn "Invalid line in ${conf_file}: ${targetline}" + + ebegin "Removing dm-crypt mapping for: ${target}" + ${csetup} remove ${target} + eend $? "Failed to remove dm-crypt mapping for: ${target}" + done + + if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" ${conf_file}) ]] ; then + einfo "Taking down any dm-crypt loop devices" + /bin/egrep -e "^(source)" ${conf_file} | while read sourceline + do + source= + eval ${sourceline} + if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then + ebegin " Taking down ${source}" + /sbin/losetup -d ${source} + eend $? " Failed to remove loop" + fi + done + fi +fi + +# vim:ts=4 diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc new file mode 100755 index 0000000000..fed2cc6aec --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc @@ -0,0 +1,350 @@ +#!/sbin/runscript +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.5.1-dmcrypt.rc,v 1.1 2013/01/17 23:35:08 robbat2 Exp $ + +depend() { + before checkfs fsck +} + +# We support multiple dmcrypt instances based on $SVCNAME +execute_hook="dm_crypt_execute_dmcrypt" +# XXX: Should we drop this ? +# execute_hook="dm_crypt_execute_localmount" +conf_file="/etc/conf.d/${SVCNAME}" + +# Get splash helpers if available. +if [ -e /sbin/splash-functions.sh ] ; then + . /sbin/splash-functions.sh +fi + +# Setup mappings for an individual target/swap +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_dmcrypt() { + local dev ret mode foo + + if [ -n "${target}" ] ; then + # let user set options, otherwise leave empty + : ${options:=' '} + elif [ -n "${swap}" ] ; then + if cryptsetup isLuks ${source} 2>/dev/null ; then + ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup." + return + fi + target=${swap} + # swap contents do not need to be preserved between boots, luks not required. + # suspend2 users should have initramfs's init handling their swap partition either way. + : ${options:='-c aes -h sha1 -d /dev/urandom'} + : ${pre_mount:='mkswap ${dev}'} + else + return + fi + if [ "x${source#UUID}" != "x${source}" ]; then + source=${source#UUID=} + source="$(blkid -U ${source})" + fi + if [ -z "${source}" ] && [ ! -e "${source}" ] ; then + ewarn "source \"${source}\" for ${target} missing, skipping..." + return + fi + + if [ -n "${loop_file}" ] ; then + dev="/dev/mapper/${target}" + ebegin " Setting up loop device ${source}" + losetup ${source} ${loop_file} + fi + + # cryptsetup: + # luksOpen # is $source + # create # is $target + local arg1="create" arg2="${target}" arg3="${source}" luks=0 + + cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; } + + # Older versions reported: + # ${target} is active: + # Newer versions report: + # ${target} is active[ and is in use.] + if cryptsetup status ${target} | egrep -q ' is active' ; then + einfo "dm-crypt mapping ${target} is already configured" + return + fi + splash svc_input_begin ${SVCNAME} >/dev/null 2>&1 + + # Handle keys + if [ -n "${key}" ] ; then + read_abort() { + # some colors + local ans savetty resettty + [ -z "${NORMAL}" ] && eval $(eval_ecolors) + einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) " + shift + # This is ugly as s**t. But POSIX doesn't provide `read -t`, so + # we end up having to implement our own crap with stty/etc... + savetty=$(stty -g) + resettty='stty ${savetty}; trap - EXIT HUP INT TERM' + trap 'eval "${resettty}"' EXIT HUP INT TERM + stty -icanon + [ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))" + ans=$(dd count=1 bs=1 2>/dev/null) || ans='' + eval "${resettty}" + if [ -z "${ans}" ] ; then + printf '\r' + else + echo + fi + case ${ans} in + [yY]) return 0;; + *) return 1;; + esac + } + + # Notes: sed not used to avoid case where /usr partition is encrypted. + mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg + key=${key/:*/} + case "${mode}" in + gpg|reg) + # handle key on removable device + if [ -n "${remdev}" ] ; then + # temp directory to mount removable device + local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$" + if [ ! -d "${mntrem}" ] ; then + if ! mkdir -p "${mntrem}" ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: Unable to create temporary mount point '${mntrem}'" + return + fi + fi + i=0 + einfo "Please insert removable device for ${target}" + while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do + foo="" + if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then + # keyfile exists? + if [ ! -e "${mntrem}${key}" ] ; then + umount -n "${mntrem}" + rmdir "${mntrem}" + einfo "Cannot find ${key} on removable media." + read_abort "Abort" ${read_timeout:--t 1} && return + else + key="${mntrem}${key}" + break + fi + else + [ -e "${remdev}" ] \ + && foo="mount failed" \ + || foo="mount source not found" + fi + : $((i += 1)) + read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return + done + else # keyfile ! on removable device + if [ ! -e "${key}" ] ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: keyfile ${key} does not exist." + return + fi + fi + ;; + *) + ewarn "${source} will not be decrypted ..." + einfo "Reason: mode ${mode} is invalid." + return + ;; + esac + else + mode=none + fi + ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}" + if [ "${mode}" = "gpg" ] ; then + : ${gpg_options:='-q -d'} + # gpg available ? + if type -p gpg >/dev/null ; then + for i in 0 1 2 ; do + # paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected. + # save stdin stdout stderr "values" + gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret=$? + [ ${ret} -eq 0 ] && break + done + eend ${ret} "failure running cryptsetup" + else + ewarn "${source} will not be decrypted ..." + einfo "Reason: cannot find gpg application." + einfo "You have to install app-crypt/gnupg first." + einfo "If you have /usr on its own partition, try copying gpg to /bin ." + fi + else + if [ "${mode}" = "reg" ] ; then + cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3} + ret=$? + eend ${ret} "failure running cryptsetup" + else + cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret=$? + eend ${ret} "failure running cryptsetup" + fi + fi + if [ -d "${mntrem}" ] ; then + umount -n ${mntrem} 2>/dev/null >/dev/null + rmdir ${mntrem} 2>/dev/null >/dev/null + fi + splash svc_input_end ${SVCNAME} >/dev/null 2>&1 + + if [ ${ret} -ne 0 ] ; then + cryptfs_status=1 + else + if [ -n "${pre_mount}" ] ; then + dev="/dev/mapper/${target}" + ebegin " pre_mount: ${pre_mount}" + eval "${pre_mount}" > /dev/null + ewend $? || cryptfs_status=1 + fi + fi +} + +# Run any post_mount commands for an individual mount +# +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_localmount() { + local mount_point + + [ -z "${target}" ] && [ -z "${post_mount}" ] && return + + if ! cryptsetup status ${target} | egrep -q '\/dev/null + eend $? || cryptfs_status=1 + fi +} + +# Lookup optional bootparams +get_bootparam_val() { + # We're given something like: + # foo=bar=cow + # Return the "bar=cow" part. + case $1 in + *\=*) + local key=$(echo "$1" | cut -f1 -d=) + echo "$1" | cut -c $(( ${#key} + 2 )) + ;; + esac +} + +start() { + local header=true cryptfs_status=0 + local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev + + local x + for x in $(cat /proc/cmdline) ; do + case "${x}" in + key_timeout\=*) + local KEY_TIMEOUT=$(get_bootparam_val "${x}") + if [ ${KEY_TIMEOUT} -gt 0 ] ; then + read_timeout="-t ${KEY_TIMEOUT}" + fi + ;; + esac + done + + while read -u 3 targetline ; do + case ${targetline} in + # skip comments and blank lines + ""|"#"*) continue ;; + # skip service-specific openrc configs #377927 + rc_*) continue ;; + esac + + ${header} && ebegin "Setting up dm-crypt mappings" + header=false + + # check for the start of a new target/swap + case ${targetline} in + target=*|swap=*) + # If we have a target queued up, then execute it + ${execute_hook} + + # Prepare for the next target/swap by resetting variables + unset gpg_options key loop_file target options pre_mount post_mount source swap remdev + ;; + + gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*) + if [ -z "${target}${swap}" ] ; then + ewarn "Ignoring setting outside target/swap section: ${targetline}" + continue + fi + ;; + + dmcrypt_max_timeout=*) + # ignore global options + continue + ;; + + *) + ewarn "Skipping invalid line in ${conf_file}: ${targetline}" + ;; + esac + + # Queue this setting for the next call to dm_crypt_execute_xxx + eval "${targetline}" + done 3< ${conf_file} + + # If we have a target queued up, then execute it + ${execute_hook} + + ewend ${cryptfs_status} "Failed to setup dm-crypt devices" +} + +stop() { + local line header + + # Break down all mappings + header=true + egrep "^(target|swap)=" ${conf_file} | \ + while read line ; do + ${header} && einfo "Removing dm-crypt mappings" + header=false + + target= swap= + eval ${line} + + [ -n "${swap}" ] && target=${swap} + if [ -z "${target}" ] ; then + ewarn "invalid line in ${conf_file}: ${line}" + continue + fi + + ebegin " ${target}" + cryptsetup remove ${target} + eend $? + done + + # Break down loop devices + header=true + grep '^source=./dev/loop' ${conf_file} | \ + while read line ; do + ${header} && einfo "Detaching dm-crypt loop devices" + header=false + + source= + eval ${line} + + ebegin " ${source}" + losetup -d "${source}" + eend $? + done + + return 0 +} diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.0.6-udevsettle.patch b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.0.6-udevsettle.patch new file mode 100644 index 0000000000..6860a7c4c3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.0.6-udevsettle.patch @@ -0,0 +1,21 @@ +2008-09-13 Doug Goldstein + * switch to udevadm settle since udevsettle has been deprecated + and finally removed with udev 126. + +--- cryptsetup-1.0.6/lib/libdevmapper.c ++++ cryptsetup-1.0.6/lib/libdevmapper.c +@@ -18,11 +18,11 @@ + + #define CRYPT_TARGET "crypt" + +-#define UDEVSETTLE "/sbin/udevsettle" ++#define UDEVSETTLE "/sbin/udevadm settle" + +-static void run_udevsettle(void) ++static int run_udevsettle(void) + { +- system(UDEVSETTLE); ++ return system(UDEVSETTLE); + } + + static void set_dm_error(int level, const char *file, int line, diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.6.1-openssl-static.patch b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.6.1-openssl-static.patch new file mode 100644 index 0000000000..e479a305c3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/cryptsetup-1.6.1-openssl-static.patch @@ -0,0 +1,13 @@ +--- a/configure.ac 2013-03-24 05:02:02.000000000 -0400 ++++ b/configure.ac 2013-08-06 15:57:57.844461481 -0400 +@@ -149,8 +149,8 @@ + if test x$enable_static_cryptsetup = xyes; then + saved_PKG_CONFIG=$PKG_CONFIG + PKG_CONFIG="$PKG_CONFIG --static" +- PKG_CHECK_MODULES([OPENSSL], [openssl]) +- CRYPTO_STATIC_LIBS=$OPENSSL_LIBS ++ PKG_CHECK_MODULES([OPENSSL_STATIC], [openssl]) ++ CRYPTO_STATIC_LIBS=$OPENSSL_STATIC_LIBS + PKG_CONFIG=$saved_PKG_CONFIG + fi + NO_FIPS([]) diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/dmcrypt.rc b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/dmcrypt.rc new file mode 100755 index 0000000000..130036b920 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/files/dmcrypt.rc @@ -0,0 +1,346 @@ +#!/sbin/runscript +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/dmcrypt.rc,v 1.4 2012/05/11 08:33:01 vapier Exp $ + +depend() { + before checkfs fsck +} + +# We support multiple dmcrypt instances based on $SVCNAME +execute_hook="dm_crypt_execute_dmcrypt" +# XXX: Should we drop this ? +# execute_hook="dm_crypt_execute_localmount" +conf_file="/etc/conf.d/${SVCNAME}" + +# Get splash helpers if available. +if [ -e /sbin/splash-functions.sh ] ; then + . /sbin/splash-functions.sh +fi + +# Setup mappings for an individual target/swap +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_dmcrypt() { + local dev ret mode foo + + if [ -n "${target}" ] ; then + # let user set options, otherwise leave empty + : ${options:=' '} + elif [ -n "${swap}" ] ; then + if cryptsetup isLuks ${source} 2>/dev/null ; then + ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup." + return + fi + target=${swap} + # swap contents do not need to be preserved between boots, luks not required. + # suspend2 users should have initramfs's init handling their swap partition either way. + : ${options:='-c aes -h sha1 -d /dev/urandom'} + : ${pre_mount:='mkswap ${dev}'} + else + return + fi + if [ -z "${source}" ] && [ ! -e "${source}" ] ; then + ewarn "source \"${source}\" for ${target} missing, skipping..." + return + fi + + if [ -n "${loop_file}" ] ; then + dev="/dev/mapper/${target}" + ebegin " Setting up loop device ${source}" + losetup ${source} ${loop_file} + fi + + # cryptsetup: + # luksOpen # is $source + # create # is $target + local arg1="create" arg2="${target}" arg3="${source}" luks=0 + + cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="${source}"; arg3="${target}"; luks=1; } + + # Older versions reported: + # ${target} is active: + # Newer versions report: + # ${target} is active[ and is in use.] + if cryptsetup status ${target} | egrep -q ' is active' ; then + einfo "dm-crypt mapping ${target} is already configured" + return + fi + splash svc_input_begin ${SVCNAME} >/dev/null 2>&1 + + # Handle keys + if [ -n "${key}" ] ; then + read_abort() { + # some colors + local ans savetty resettty + [ -z "${NORMAL}" ] && eval $(eval_ecolors) + einfon " $1? (${WARN}yes${NORMAL}/${GOOD}No${NORMAL}) " + shift + # This is ugly as s**t. But POSIX doesn't provide `read -t`, so + # we end up having to implement our own crap with stty/etc... + savetty=$(stty -g) + resettty='stty ${savetty}; trap - EXIT HUP INT TERM' + trap 'eval "${resettty}"' EXIT HUP INT TERM + stty -icanon + [ "${1}" = -t ] && stty min 0 time "$(( $2 * 10 ))" + ans=$(dd count=1 bs=1 2>/dev/null) || ans='' + eval "${resettty}" + if [ -z "${ans}" ] ; then + printf '\r' + else + echo + fi + case ${ans} in + [yY]) return 0;; + *) return 1;; + esac + } + + # Notes: sed not used to avoid case where /usr partition is encrypted. + mode=${key/*:/} && ( [ "${mode}" = "${key}" ] || [ -z "${mode}" ] ) && mode=reg + key=${key/:*/} + case "${mode}" in + gpg|reg) + # handle key on removable device + if [ -n "${remdev}" ] ; then + # temp directory to mount removable device + local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$" + if [ ! -d "${mntrem}" ] ; then + if ! mkdir -p "${mntrem}" ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: Unable to create temporary mount point '${mntrem}'" + return + fi + fi + i=0 + einfo "Please insert removable device for ${target}" + while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do + foo="" + if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then + # keyfile exists? + if [ ! -e "${mntrem}${key}" ] ; then + umount -n "${mntrem}" + rmdir "${mntrem}" + einfo "Cannot find ${key} on removable media." + read_abort "Abort" ${read_timeout:--t 1} && return + else + key="${mntrem}${key}" + break + fi + else + [ -e "${remdev}" ] \ + && foo="mount failed" \ + || foo="mount source not found" + fi + : $((i += 1)) + read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return + done + else # keyfile ! on removable device + if [ ! -e "${key}" ] ; then + ewarn "${source} will not be decrypted ..." + einfo "Reason: keyfile ${key} does not exist." + return + fi + fi + ;; + *) + ewarn "${source} will not be decrypted ..." + einfo "Reason: mode ${mode} is invalid." + return + ;; + esac + else + mode=none + fi + ebegin " ${target} using: ${options} ${arg1} ${arg2} ${arg3}" + if [ "${mode}" = "gpg" ] ; then + : ${gpg_options:='-q -d'} + # gpg available ? + if type -p gpg >/dev/null ; then + for i in 0 1 2 ; do + # paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected. + # save stdin stdout stderr "values" + gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret=$? + [ ${ret} -eq 0 ] && break + done + eend ${ret} "failure running cryptsetup" + else + ewarn "${source} will not be decrypted ..." + einfo "Reason: cannot find gpg application." + einfo "You have to install app-crypt/gnupg first." + einfo "If you have /usr on its own partition, try copying gpg to /bin ." + fi + else + if [ "${mode}" = "reg" ] ; then + cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3} + ret=$? + eend ${ret} "failure running cryptsetup" + else + cryptsetup ${options} ${arg1} ${arg2} ${arg3} + ret=$? + eend ${ret} "failure running cryptsetup" + fi + fi + if [ -d "${mntrem}" ] ; then + umount -n ${mntrem} 2>/dev/null >/dev/null + rmdir ${mntrem} 2>/dev/null >/dev/null + fi + splash svc_input_end ${SVCNAME} >/dev/null 2>&1 + + if [ ${ret} -ne 0 ] ; then + cryptfs_status=1 + else + if [ -n "${pre_mount}" ] ; then + dev="/dev/mapper/${target}" + ebegin " pre_mount: ${pre_mount}" + eval "${pre_mount}" > /dev/null + ewend $? || cryptfs_status=1 + fi + fi +} + +# Run any post_mount commands for an individual mount +# +# Note: This relies on variables localized in the main body below. +dm_crypt_execute_localmount() { + local mount_point + + [ -z "${target}" ] && [ -z "${post_mount}" ] && return + + if ! cryptsetup status ${target} | egrep -q '\/dev/null + eend $? || cryptfs_status=1 + fi +} + +# Lookup optional bootparams +get_bootparam_val() { + # We're given something like: + # foo=bar=cow + # Return the "bar=cow" part. + case $1 in + *\=*) + local key=$(echo "$1" | cut -f1 -d=) + echo "$1" | cut -c $(( ${#key} + 2 )) + ;; + esac +} + +start() { + local header=true cryptfs_status=0 + local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev + + local x + for x in $(cat /proc/cmdline) ; do + case "${x}" in + key_timeout\=*) + local KEY_TIMEOUT=$(get_bootparam_val "${x}") + if [ ${KEY_TIMEOUT} -gt 0 ] ; then + read_timeout="-t ${KEY_TIMEOUT}" + fi + ;; + esac + done + + while read -u 3 targetline ; do + case ${targetline} in + # skip comments and blank lines + ""|"#"*) continue ;; + # skip service-specific openrc configs #377927 + rc_*) continue ;; + esac + + ${header} && ebegin "Setting up dm-crypt mappings" + header=false + + # check for the start of a new target/swap + case ${targetline} in + target=*|swap=*) + # If we have a target queued up, then execute it + ${execute_hook} + + # Prepare for the next target/swap by resetting variables + unset gpg_options key loop_file target options pre_mount post_mount source swap remdev + ;; + + gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*) + if [ -z "${target}${swap}" ] ; then + ewarn "Ignoring setting outside target/swap section: ${targetline}" + continue + fi + ;; + + dmcrypt_max_timeout=*) + # ignore global options + continue + ;; + + *) + ewarn "Skipping invalid line in ${conf_file}: ${targetline}" + ;; + esac + + # Queue this setting for the next call to dm_crypt_execute_xxx + eval "${targetline}" + done 3< ${conf_file} + + # If we have a target queued up, then execute it + ${execute_hook} + + ewend ${cryptfs_status} "Failed to setup dm-crypt devices" +} + +stop() { + local line header + + # Break down all mappings + header=true + egrep "^(target|swap)=" ${conf_file} | \ + while read line ; do + ${header} && einfo "Removing dm-crypt mappings" + header=false + + target= swap= + eval ${line} + + [ -n "${swap}" ] && target=${swap} + if [ -z "${target}" ] ; then + ewarn "invalid line in ${conf_file}: ${line}" + continue + fi + + ebegin " ${target}" + cryptsetup remove ${target} + eend $? + done + + # Break down loop devices + header=true + grep '^source=./dev/loop' ${conf_file} | \ + while read line ; do + ${header} && einfo "Detaching dm-crypt loop devices" + header=false + + source= + eval ${line} + + ebegin " ${source}" + losetup -d "${source}" + eend $? + done + + return 0 +} diff --git a/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/metadata.xml b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/metadata.xml new file mode 100644 index 0000000000..b6324f7be2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-fs/cryptsetup/metadata.xml @@ -0,0 +1,17 @@ + + + + base-system + + Build cryptsetup dynamically + Use dev-libs/libgcrypt crypto backend + Use kernel crypto backend (mainly for embedded systems) + Use dev-libs/nettle crypto backend + Use dev-libs/openssl crypto backend + Use /dev/urandom instead of /dev/random + Build cryptsetup-reencrypt + + + cryptsetup + +