cryptsetup: remove, still not perfect but gentoo is better than we are on this

This commit is contained in:
Zero_Chaos 2012-04-27 18:12:00 +00:00
parent 18e2e26884
commit 43ccef3888
16 changed files with 0 additions and 1961 deletions

View file

@ -1,480 +0,0 @@
# ChangeLog for sys-fs/cryptsetup
# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/ChangeLog,v 1.114 2011/01/22 21:28:15 armin76 Exp $
22 Jan 2011; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
alpha/ia64/s390/sh/sparc stable wrt #350044
21 Jan 2011; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.3-r3.ebuild:
Stable for HPPA (bug #350044).
18 Jan 2011; Mike Frysinger <vapier@gentoo.org> files/1.0.5-dmcrypt.rc:
Don't require device-mapper -- let the user select which packages they
need for their fs stack #351251 by Jochen Klein.
18 Jan 2011; Kacper Kowalik <xarthisius@gentoo.org>
cryptsetup-1.1.3-r3.ebuild:
ppc64 stable wrt #350044
17 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.1.3-r3.ebuild, cryptsetup-1.2.0-r1.ebuild:
Require new dev-libs/libgcrypt[static-libs] too #351810.
15 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Require libgpg-error[static-libs] when USE=static #351810 by Peter Volkov.
*cryptsetup-1.1.3-r3 (12 Jan 2011)
12 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r3.ebuild,
files/1.1.3-dm-crypt-stop.sh:
Push out updated addon to fix baselayout-2 support #350399 by Martin
Kolleck.
08 Jan 2011; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.3-r2.ebuild:
arm stable, bug #350044
*cryptsetup-1.1.3-r2 (08 Jan 2011)
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r2.ebuild:
Push out updated addon to fix baselayout-1 support #350399 by Manuel
Danisch.
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh:
Tweak status detection to work with newer cryptsetup output #350345 by
Aaron Lewis.
08 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Improve tests a bit -- skip when dmcrypt is not available.
07 Jan 2011; Brent Baude <ranger@gentoo.org> cryptsetup-1.1.3-r1.ebuild:
stable ppc, bug 350044
04 Jan 2011; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.2.0-r1.ebuild:
Fix build failures for USE=-static #350463 by Alessandro Guido.
02 Jan 2011; Pawel Hajdan jr <phajdan.jr@gentoo.org>
cryptsetup-1.1.3-r1.ebuild:
x86 stable wrt bug #350044
01 Jan 2011; Markos Chandras <hwoarang@gentoo.org>
cryptsetup-1.1.3-r1.ebuild:
Stable on amd64 wrt bug #350044
*cryptsetup-1.2.0-r1 (30 Dec 2010)
30 Dec 2010; Mike Frysinger <vapier@gentoo.org> -cryptsetup-1.2.0.ebuild,
+cryptsetup-1.2.0-r1.ebuild:
Convert to IUSE=+static and make it work again #350105 by Casey Carter.
*cryptsetup-1.2.0 (29 Dec 2010)
29 Dec 2010; Mike Frysinger <vapier@gentoo.org> +cryptsetup-1.2.0.ebuild:
Version bump #349962 by ScytheMan.
29 Oct 2010; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.1.2.ebuild:
Stable for HPPA (bug #327689).
06 Oct 2010; Mike Frysinger <vapier@gentoo.org>
files/1.1.3-dm-crypt-start.sh:
Do not warn about global options #329437 by Marcin Mirosław.
*cryptsetup-1.1.3-r1 (30 Sep 2010)
30 Sep 2010; Mike Frysinger <vapier@gentoo.org>
+files/1.1.3-dm-crypt-start.sh, +cryptsetup-1.1.3-r1.ebuild,
+files/1.1.3-dm-crypt-stop.sh:
Update by Wolfram to let the init.d scripts be multiplexed #338876.
28 Aug 2010; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.1.2.ebuild:
ia64/s390/sh/sparc stable wrt #327689
28 Aug 2010; Markus Meier <maekke@gentoo.org> cryptsetup-1.1.2.ebuild:
arm stable, bug #327689
13 Aug 2010; Joseph Jezak <josejx@gentoo.org> cryptsetup-1.1.2.ebuild:
Marked ppc/ppc64 stable for bug #327689.
31 Jul 2010; Tobias Klausmann <klausman@gentoo.org>
cryptsetup-1.1.2.ebuild:
Stable on alpha, bug #327689
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
-cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.7.ebuild,
-cryptsetup-1.0.7-r1.ebuild, -cryptsetup-1.1.0.ebuild,
-cryptsetup-1.1.1_rc1.ebuild, -cryptsetup-1.1.1_rc2.ebuild,
-cryptsetup-1.1.1.ebuild:
Cleanup old versions.
27 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.1.2.ebuild, cryptsetup-1.1.3.ebuild:
Bug #329991: Document that users of plain (non-LUKS) volumes from the 1.0
series MUST specify the cipher/keysize/hash, as the defaults have changed
for security reasons.
27 Jul 2010; Pacho Ramos <pacho@gentoo.org> cryptsetup-1.1.2.ebuild:
amd64 stable, bug 327689
23 Jul 2010; Christian Faulhammer <fauli@gentoo.org>
cryptsetup-1.1.2.ebuild:
stable x86, bug 327689
*cryptsetup-1.1.3 (21 Jul 2010)
21 Jul 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.3.ebuild:
Version bump.
*cryptsetup-1.1.2 (17 Jun 2010)
17 Jun 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.2.ebuild:
Bug #323655: version bump
*cryptsetup-1.1.1 (24 May 2010)
24 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1.ebuild:
Version bump.
*cryptsetup-1.1.1_rc2 (14 May 2010)
14 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1_rc2.ebuild:
Bug #318379: version bump. Fixes dm-crypt module loading over rc1.
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.1.1_rc1.ebuild:
Both patches are actually not needed now.
*cryptsetup-1.1.1_rc1 (01 May 2010)
01 May 2010; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.1.1_rc1.ebuild:
Bug #318039: version bump.
23 Apr 2010; Robin H. Johnson <robbat2@gentoo.org>
+files/1.1.0-libudev.patch, cryptsetup-1.1.0.ebuild:
Bug #316571: Bring in libudev for devmapper.
*cryptsetup-1.1.0 (14 Feb 2010)
14 Feb 2010; Robin H. Johnson <robbat2@gentoo.org>
+files/1.1.0_rc3-static-no-selinux.patch, +cryptsetup-1.1.0.ebuild:
Version bump per bug #294934.
*cryptsetup-1.0.7-r1 (30 Nov 2009)
30 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.0.7-r1.ebuild:
Bug #276803: old sys-fs/devicemapper not supported anymore. Use the new
lvm2-2.02.56-r1 for safe static linking.
*cryptsetup-1.0.7 (28 Nov 2009)
28 Nov 2009; Robin H. Johnson <robbat2@gentoo.org>
+cryptsetup-1.0.7.ebuild:
Version bump per bug #277990.
31 Aug 2009; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
arm/ia64/s390/sh/sparc stable wrt #259253
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Install into rcscripts multilib dir #262838 by Thilo Bangert.
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Make sure USE=selinux is respected #274034 by Petteri Räty.
16 Aug 2009; Mike Frysinger <vapier@gentoo.org>
files/cryptsetup-1.0.6-udevsettle.patch:
Do not complain if udevadm did not exec for systems that use mdev and such
#276369 by Florian Streibelt.
15 Jul 2009; nixnut <nixnut@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
ppc stable #259253
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
Stable on alpha, bug #259253
27 Jun 2009; Tobias Klausmann <klausman@gentoo.org> ChangeLog:
Stable on alpha, bug #259253
26 Jun 2009; Thomas Anderson <gentoofan23@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
stable amd64, bug 259253
19 Jun 2009; Brent Baude <ranger@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
stable ppc64, bug 259253
17 Jun 2009; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.6-r2.ebuild:
Stable for HPPA (bug #259253).
17 Jun 2009; Christian Faulhammer <fauli@gentoo.org>
cryptsetup-1.0.6-r2.ebuild:
stable x86, bug 259253
16 Jun 2009; Jeremy Olexa <darkside@gentoo.org>
files/1.0.6-r2-dm-crypt-start.sh:
Fix dm-crypt-start.sh file for passphrase at startup issue, bug 243216
19 Apr 2009; Doug Goldstein <cardoe@gentoo.org>
-files/1.0.6-dm-crypt-start.sh, -cryptsetup-1.0.5.ebuild,
cryptsetup-1.0.5-r1.ebuild, -cryptsetup-1.0.6.ebuild,
-cryptsetup-1.0.6-r1.ebuild, cryptsetup-1.0.6-r2.ebuild:
clean up old versions. clean up depends
10 Apr 2009; Caleb Tennis <caleb@gentoo.org> cryptsetup-0.1-r3.ebuild,
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
cryptsetup-1.0.6.ebuild, cryptsetup-1.0.6-r1.ebuild,
cryptsetup-1.0.6-r2.ebuild:
Fix device-mapper dep for new lvm2, bug #265599
*cryptsetup-1.0.6-r2 (05 Oct 2008)
05 Oct 2008; Mike Frysinger <vapier@gentoo.org>
+files/1.0.6-dmcrypt.confd, +files/1.0.6-r2-dm-crypt-start.sh,
+cryptsetup-1.0.6-r2.ebuild:
Do not bang directly on /dev/console so we dont break when running under X
or something.
15 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.0.6-r1.ebuild:
Bug #237714, make the udev dep for udevadm slightly wider.
14 Sep 2008; Robin H. Johnson <robbat2@gentoo.org>
cryptsetup-1.0.6-r1.ebuild:
Fix changelog removal, and ensure a min version of udev for new revision
since some old versions did not contain the udevadm tool yet.
*cryptsetup-1.0.6-r1 (14 Sep 2008)
14 Sep 2008; Doug Goldstein <cardoe@gentoo.org>
+files/cryptsetup-1.0.6-udevsettle.patch, -cryptsetup-0.1-r2.ebuild,
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild,
cryptsetup-1.0.6.ebuild, +cryptsetup-1.0.6-r1.ebuild:
fix bug #236481. block udev-126 and higher on older versions that won't
work with it. add udev as a depend since the code calls it always. remove
old version
22 Aug 2008; Doug Goldstein <cardoe@gentoo.org> metadata.xml:
add GLEP 56 USE flag desc from use.local.desc
16 Aug 2008; Torsten Veller <tove@gentoo.org> metadata.xml:
Remove strerror from metadata.xml (#89719)
25 Mar 2008; <ricmm@gentoo.org> cryptsetup-0.1-r2.ebuild,
cryptsetup-0.1-r3.ebuild:
Drop to ~mips due to unstable deps
*cryptsetup-1.0.6 (19 Mar 2008)
19 Mar 2008; Mike Frysinger <vapier@gentoo.org>
+files/1.0.6-dm-crypt-start.sh, +cryptsetup-1.0.6.ebuild:
Version bump #212997 by Alex Elsayed and make startup script much nicer
#202364 by me.
20 Feb 2008; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5.ebuild, cryptsetup-1.0.5-r1.ebuild:
I hate blank spaces in output for no reason, so switching from using echo to
using an extra \n at the end of the line.
01 Feb 2008; Diego Pettenò <flameeyes@gentoo.org> files/1.0.5-dmcrypt.rc:
Update init script to work with current development version of OpenRC
(checkroot -> root; checkfs -> fsck).
31 Jan 2008; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5-r1.ebuild:
Cleaning up a couple typos/errors in einfo/ewarn output. There's no actual
code changes in this.
06 Nov 2007; Raúl Porcel <armin76@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
alpha/ia64/sparc stable wrt #195648
02 Nov 2007; Steve Dibb <beandog@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
amd64 stable, bug 195648
14 Oct 2007; Markus Rothe <corsair@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable on ppc64; bug #195648
13 Oct 2007; Jeroen Roovers <jer@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable for HPPA (bug #195648).
13 Oct 2007; nixnut <nixnut@gentoo.org> cryptsetup-1.0.5-r1.ebuild:
Stable on ppc wrt bug 195648
13 Oct 2007; Christian Faulhammer <opfer@gentoo.org>
cryptsetup-1.0.5-r1.ebuild:
stable x86, bug 195648
06 Oct 2007; Mike Frysinger <vapier@gentoo.org> cryptsetup-1.0.5.ebuild,
cryptsetup-1.0.5-r1.ebuild:
Block cryptsetup-luks #194907 by Jakub Moc.
*cryptsetup-1.0.5-r1 (02 Oct 2007)
02 Oct 2007; Benjamin Smee <strerror@gentoo.org>
files/1.0.5-dm-crypt-start.sh, files/1.0.5-dm-crypt-stop.sh,
files/1.0.5-dmcrypt.rc, +cryptsetup-1.0.5-r1.ebuild:
Fixes for bugs #180068 #181503 #164795 and other improvements. Thanks to
Thomas Bettler for a patch
14 Sep 2007; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-1.0.5.ebuild:
Removed check for USE=build since it did nothing because cryptsetup isn't in
stage1. Removed call to linux-info_pkg_setup to remove requirement on a
configured kernel. This fixes bug #148390 from this end, but changes are
still needed in linux-info.eclass, which is tracked at bug #192556.
15 Aug 2007; Benjamin Smee <strerror@gentoo.org>
files/1.0.5-dm-crypt-start.sh:
Change to 1.0.5-dm-crypt-start.sh to fix misplaced bin
*cryptsetup-1.0.5 (14 Aug 2007)
14 Aug 2007; Benjamin Smee <strerror@gentoo.org>
+files/1.0.5-dm-crypt-start.sh, +files/1.0.5-dm-crypt-stop.sh,
+files/1.0.5-dmcrypt.confd, +files/1.0.5-dmcrypt.rc,
+cryptsetup-1.0.5.ebuild:
Major changes for bug #177100 and others. Thanks to ikelos
07 Jul 2006; Thomas Cort <tcort@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on alpha wrt Bug #124928.
28 Apr 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on amd64. Bug #124928.
27 Apr 2006; Alec Warner <antarus@gentoo.org> Manifest:
Fixing SHA256 digest, pass four
29 Apr 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r3.ebuild:
Marked stable on mips.
10 Mar 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r3.ebuild:
Mark 0.1-r3 stable on ia64. #124928
06 Mar 2006; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r3.ebuild:
Stable on sparc wrt #124928
06 Mar 2006; Michele Noberasco <s4t4n@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable for x86, see bug #124928
05 Mar 2006; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r3.ebuild:
stable on ppc64, bug #124928
04 Mar 2006; <nixnut@gentoo.org> cryptsetup-0.1-r3.ebuild:
Stable on ppc. bug #124928
26 Feb 2006; Joshua Kinard <kumba@gentoo.org> cryptsetup-0.1-r2.ebuild:
Marked stable on mips.
15 Feb 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
Stable on ppc64; bug #118791
08 Feb 2006; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r2.ebuild:
Mark 0.1-r2 stable on alpha
*cryptsetup-0.1-r3 (02 Feb 2006)
02 Feb 2006; Benjamin Smee <strerror@gentoo.org>
+files/cryptsetup-libmapper.patch, +cryptsetup-0.1-r3.ebuild:
Bump for bug #120802
13 Jan 2006; Tobias Scherbaum <dertobi123@gentoo.org>
cryptsetup-0.1-r2.ebuild:
ppc stable, bug #118791
12 Jan 2006; Markus Rothe <corsair@gentoo.org> cryptsetup-0.1-r2.ebuild:
Added ~ppc64
12 Jan 2006; Chris Gianelloni <wolf31o2@gentoo.org>
cryptsetup-0.1-r2.ebuild:
Stable on x86 wrt bug #118791.
12 Jan 2006; Luis Medinas <metalgod@gentoo.org> cryptsetup-0.1-r2.ebuild:
Stable on amd64. See bug #118791.
12 Jan 2006; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r2.ebuild:
Stable on sparc wrt #118791
25 Nov 2005; Tom Gall <tgall@gentoo.org> cryptsetup-0.1-r1.ebuild:
stable on ppc64
18 Oct 2005; Aron Griffis <agriffis@gentoo.org> cryptsetup-0.1-r1.ebuild:
Mark 0.1-r1 stable on alpha
03 Sep 2005; Daniel Black <dragonheart@gentoo.org>
cryptsetup-0.1-r1.ebuild, cryptsetup-0.1-r2.ebuild:
dependancy fixes
08 Aug 2005; Aaron Walker <ka0ttic@gentoo.org> cryptsetup-0.1-r2.ebuild:
Added ~mips for bug 89528.
*cryptsetup-0.1-r2 (02 Jun 2005)
02 Jun 2005; Benjamin Smee <strerror@gentoo.org>
+cryptsetup-0.1-r2.ebuild:
Now blocks with cryptsetup-luks
29 May 2005; Benjamin Smee <strerror@gentoo.org> cryptsetup-0.1-r1.ebuild:
Removed "die" call as per Spanky's request.
25 May 2005; Herbie Hopkins <herbs@gentoo.org> cryptsetup-0.1-r1.ebuild:
Multilib fixes.
24 May 2005; Benjamin Smee <strerror@gentoo.org> metadata.xml,
cryptsetup-0.1-r1.ebuild:
Fixed the dm-crypt check as per bug 89142
12 Apr 2005; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Stable on sparc
25 Mar 2005; Bryan Østergaard <kloeri@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Add ~alpha keyword, bug 83684.
22 Mar 2005; Gustavo Zacarias <gustavoz@gentoo.org>
cryptsetup-0.1-r1.ebuild:
Keyworded ~sparc wrt #83684
14 Mar 2005; Rob Holland <tigger@gentoo.org> :
fixed up module check. fixes bug #85102
*cryptsetup-0.1-r1 (02 Mar 2005)
02 Mar 2005; Martin Schlemmer <azarah@gentoo.org> +files/cryptfs.confd,
+files/dm-crypt-start.sh, +files/dm-crypt-stop.sh,
+cryptsetup-0.1-r1.ebuild:
Add cryptfs conf.d file and addon scripts.
01 Mar 2005; Lars Weiler <pylon@gentoo.org> cryptsetup-0.1.ebuild:
Stable on ppc.
13 Oct 2004; Chris Gianelloni <wolf31o2@gentoo.org> cryptsetup-0.1.ebuild:
Stable on amd64, blame jhuebel.
17 Sep 2004; Rob Holland <tigger@gentoo.org> cryptsetup-0.1.ebuild:
Marking stable on x86
27 Jul 2004; Travis Tilley <lv@gentoo.org> cryptsetup-0.1.ebuild:
added ~amd64 keyword
22 Jul 2004; David Holm <dholm@gentoo.org> cryptsetup-0.1.ebuild:
Added to ~ppc.
*cryptsetup-0.1 (21 Jul 2004)
21 Jul 2004; Rob Holland <tigger@gentoo.org> +cryptsetup-0.1.ebuild:
Initial version. Closes bug #44079. Thanks to ripple@ripple.be and
ben@disciplina.net for submitting ebuilds for it

View file

@ -1,18 +0,0 @@
AUX 1.0.5-dm-crypt-stop.sh 1022 RMD160 c74d4fffec325378bb008b28c4225b67577c1d1b SHA1 d7b18d4d4845540baecdde373942cc8966c3d5e3 SHA256 42015047c708aa73eae615559ff76c9c8948a5d01fba68f64c5432e30ec799a4
AUX 1.0.5-dmcrypt.rc 601 RMD160 b6483b8f5d7726a4fb3ea39190af110eb5502453 SHA1 eaa6d125c83ddfcbd1806e12e2271e117928226a SHA256 0b58b18dc903d0d4a23e5e2df1e6f3c5db64c65b8884e24710e4b7528ea3f8dc
AUX 1.0.6-dmcrypt.confd 3309 RMD160 23a1a91ae2b2fd4d743bf8e0427cf40e4b24ecd8 SHA1 a4bd74df103227c0aaa1cfcd75908f16c67f843a SHA256 0c30e081c0b8f879964ae49735f10b05a1d92f4f481042851958860945e13271
AUX 1.0.6-r2-dm-crypt-start.sh 8092 RMD160 d61f1cf13e75c105065f8ca6c6a9afe12eedbcaa SHA1 fc4b6580063cd3758ada2d1ddfced3e005c8fabf SHA256 56004bef91b8fad57fe67fec19427dd7c48e01c8e1ba7ff60f8c370295775fdc
AUX 1.1.0-libudev.patch 964 RMD160 362e8bf35a2f6c022404f515811befa80121e779 SHA1 fd70e437a50a04ee6b37e8c36cee75aa9fa59e8c SHA256 02529608ee3743ada736ae3a6205c363cb1777ca5d72c5824287ec99fe9fe5f7
AUX 1.1.0_rc3-static-no-selinux.patch 813 RMD160 a9e476edd9bfe12e4663962198e3ed28f43877a3 SHA1 f26e3e356848d098c70f0857a04945fb264ae844 SHA256 7ec5067c5b05b478f45cdd35953827e4696011104f533b3339d18c4becc1985a
AUX 1.1.3-dm-crypt-start.sh 9089 RMD160 650c0d6bc92a5b6e8a50d27c1b55926947bd6507 SHA1 a3d5e3b11007ca71b1dc3f2d1c3a00b2ef0a3764 SHA256 3686ebc776d9d28464d8078b30a5a88578369dc1aba5db49bb88e2c8fea12dc2
AUX 1.1.3-dm-crypt-stop.sh 1261 RMD160 de4d71acd18466fdc27c8d31dc1c4a456684e809 SHA1 64ae75bc3926fccc5b13ee37e0cf475fd7db2e5d SHA256 37f548b4ff9a019d86e8e45cb89dadced2019e7ad262b40a449840b2cfec7d86
AUX cryptsetup-1.0.6-udevsettle.patch 561 RMD160 613da67876c1c20c3ea3687ec425b31551ae57d1 SHA1 cd0177fa53f4d6f605522f53a98c57286162859f SHA256 80c4914071769dedc20198425b4ea528ec22264ff4c54516a9e5722a8e671f60
AUX posix_shell.patch 7083 RMD160 83df232b92bfbaa41423b7b1b8504373d7a1b3ff SHA1 44b1aa7dc8f5dca6368af0ee3936b7b7610e4b81 SHA256 04d14e1e16ed47cf48acd78a7cc08e885a7e7a85f119c15655a53d22f722b073
DIST cryptsetup-1.1.3.tar.bz2 499276 RMD160 bf2e724779174a3cd6ce9d592e17c70979f26e85 SHA1 6f8a4c9a80a0d25f8492dfce6db6abed221598f6 SHA256 9c8e68a272f6d9cfb6cd65cc0743f4c44a2096c61f74e0602bf40208b5e69c0a
DIST cryptsetup-1.2.0.tar.bz2 523859 RMD160 8f1ce6d72a056e9c98996be85041569e96abff24 SHA1 fa9383eda40655311f2dfe751e061b0111c73908 SHA256 411129817ff29e6a957bcbdcd9a2c4c953c1539acd8af912c383262ba901b5ea
DIST cryptsetup-1.4.1.tar.bz2 772971 RMD160 4c8a7e1a3a7bd7f2d52591c1b8de21a31edeb780 SHA1 32608be5b146a7bd3999129b086bad8b66c085b9 SHA256 82b143328c2b427ef2b89fb76c701d311c95b54093c21bbf22342f7b393bddcb
EBUILD cryptsetup-1.1.3-r3.ebuild 3322 RMD160 3586d09344aa72c806de79c646d45c4c67be4c38 SHA1 bd16d9143245759fb6f98b98e525f9ca98779969 SHA256 e0cc0e68d29341afccead42ad0297ba8e51f61aa862885427649793e5cc69913
EBUILD cryptsetup-1.2.0-r1.ebuild 3475 RMD160 07da1846e263590d4a4f2b9c69e8b5329c99e9d5 SHA1 1f5044776dc9d33df37a39130f87334dbf6c951d SHA256 2eac3faba9339ae689d4e06186c9018ffa3e69399e86932e82d16bbb97d50f2a
EBUILD cryptsetup-1.4.1.ebuild 3508 RMD160 711ab92f287b0bab857bf8d520178ffc03186e7f SHA1 67dcc728f9a7e512cec436a9fe57c0fff6eb74d4 SHA256 5afa3616de4df62629846b4679cf498db33c9775026b734a61f0d5f9afe44af7
MISC ChangeLog 16670 RMD160 d82748346df7d3faf9da87c86bab35cea0aa9c1f SHA1 92672b2eeb532cf37cac38a9b236debd589fec7b SHA256 f70ce6c1aab1e1c210b083208c982e8f863d018ac435d8b8c9765c20c43fe1b2
MISC metadata.xml 239 RMD160 81512c49e64b6e70c7b746ba09d3e6fce4c7bc89 SHA1 c4085a72e46fe6bcea5bdff780007791eae6db4b SHA256 aebd5282fb892100f348eba1ed27edd27e7296356897c6f5314674f8abb4b51a

View file

@ -1,97 +0,0 @@
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.1.3-r3.ebuild,v 1.5 2011/01/22 21:28:15 armin76 Exp $
EAPI="2"
inherit linux-info eutils multilib libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
IUSE="dynamic nls selinux"
S=${WORKDIR}/${MY_P}
RDEPEND=">=sys-fs/lvm2-2.02.64
>=dev-libs/libgcrypt-1.1.42
>=dev-libs/libgpg-error-1.0-r1
>=dev-libs/popt-1.7
>=sys-fs/udev-124
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
DEPEND="${RDEPEND}
!dynamic? (
|| ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 )
dev-libs/libgcrypt[static-libs]
dev-libs/popt[static-libs]
)"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
if use dynamic ; then
ewarn "If you need cryptsetup for an initrd or initramfs then you"
ewarn "should NOT use the dynamic USE flag"
epause 5
fi
}
src_prepare() {
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
$(use_enable !dynamic static) \
--libdir=/usr/$(get_libdir) \
$(use_enable nls) \
$(use_enable selinux)
}
src_install() {
emake DESTDIR="${D}" install || die
dodoc TODO ChangeLog # README NEWS # last ones are empty
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View file

@ -1,100 +0,0 @@
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild,v 1.5 2011/01/17 19:51:48 vapier Exp $
EAPI="2"
inherit linux-info eutils multilib libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
IUSE="+static nls selinux"
S=${WORKDIR}/${MY_P}
RDEPEND=">=sys-fs/lvm2-2.02.64
>=dev-libs/libgcrypt-1.1.42
!static? ( dev-libs/libgpg-error )
>=dev-libs/popt-1.7
>=sys-fs/udev-124
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
DEPEND="${RDEPEND}
static? (
|| ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 )
dev-libs/libgcrypt[static-libs]
)"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
}
src_prepare() {
sed -i '/enable_static_cryptsetup=yes/d' configure #350463
sed -i '/^LOOPDEV=/s:=.*:=`losetup -f` || exit 0:' tests/{compat,mode}-test
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
--libdir=/usr/$(get_libdir) \
$(use_enable static static-cryptsetup) \
$(use_enable nls) \
$(use_enable selinux)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
default
}
src_install() {
emake DESTDIR="${D}" install || die
use static && { mv "${D}"/sbin/cryptsetup{.static,} || die ; }
dodoc TODO ChangeLog README NEWS
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View file

@ -1,101 +0,0 @@
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/cryptsetup-1.2.0-r1.ebuild,v 1.5 2011/01/17 19:51:48 vapier Exp $
EAPI="2"
inherit linux-info eutils multilib libtool
MY_P=${P/_rc/-rc}
DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
HOMEPAGE="http://code.google.com/p/cryptsetup/"
SRC_URI="http://cryptsetup.googlecode.com/files/${MY_P}.tar.bz2"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86"
IUSE="+static nls selinux"
S=${WORKDIR}/${MY_P}
RDEPEND=">=sys-fs/lvm2-2.02.64
>=dev-libs/libgcrypt-1.1.42
!static? ( dev-libs/libgpg-error )
>=dev-libs/popt-1.7
>=sys-fs/udev-124
|| ( >=sys-libs/e2fsprogs-libs-1.41 <sys-fs/e2fsprogs-1.41 )
selinux? ( sys-libs/libselinux )
!sys-fs/cryptsetup-luks"
DEPEND="${RDEPEND}
static? (
|| ( >=dev-libs/libgpg-error-1.10[static-libs] <dev-libs/libgpg-error-1.10 )
dev-libs/libgcrypt[static-libs]
sys-apps/util-linux[static-libs]
)"
pkg_setup() {
local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC"
local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for cryptsetup)\n"
local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for kernel 2.6.19)\n"
local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for cryptsetup)\n"
check_extra_config
}
src_prepare() {
sed -i '/enable_static_cryptsetup=yes/d' configure #350463
sed -i '/^LOOPDEV=/s:=.*:=`losetup -f` || exit 0:' tests/{compat,mode}-test
elibtoolize
}
src_configure() {
econf \
--sbindir=/sbin \
--enable-shared \
--libdir=/usr/$(get_libdir) \
$(use_enable static static-cryptsetup) \
$(use_enable nls) \
$(use_enable selinux)
}
src_test() {
if [[ ! -e /dev/mapper/control ]] ; then
ewarn "No /dev/mapper/control found -- skipping tests"
return 0
fi
default
}
src_install() {
emake DESTDIR="${D}" install || die
use static && { mv "${D}"/sbin/cryptsetup{.static,} || die ; }
dodoc TODO ChangeLog README NEWS
insinto /$(get_libdir)/rcscripts/addons
newins "${FILESDIR}"/1.1.3-dm-crypt-start.sh dm-crypt-start.sh || die
newins "${FILESDIR}"/1.1.3-dm-crypt-stop.sh dm-crypt-stop.sh || die
newconfd "${FILESDIR}"/1.0.6-dmcrypt.confd dmcrypt || die
newinitd "${FILESDIR}"/1.0.5-dmcrypt.rc dmcrypt || die
}
pkg_postinst() {
ewarn "This ebuild introduces a new set of scripts and configuration"
ewarn "than the last version. If you are currently using /etc/conf.d/cryptfs"
ewarn "then you *MUST* copy your old file to:"
ewarn "/etc/conf.d/dmcrypt"
ewarn "Or your encrypted partitions will *NOT* work."
elog "Please see the example for configuring a LUKS mountpoint"
elog "in /etc/conf.d/dmcrypt"
elog
elog "If you are using baselayout-2 then please do:"
elog "rc-update add dmcrypt boot"
elog "This version introduces a command line arguement 'key_timeout'."
elog "If you want the search for the removable key device to timeout"
elog "after 10 seconds add the following to your bootloader config:"
elog "key_timeout=10"
elog "A timeout of 0 will mean it will wait indefinitely."
elog
elog "Users using cryptsetup-1.0.x (dm-crypt plain) volumes must use"
elog "a compatibility mode when using cryptsetup-1.1.x. This can be"
elog "done by specifying the cipher (-c), key size (-s) and hash (-h)."
elog "For more info, see http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions#6._Issues_with_Specific_Versions_of_cryptsetup"
}

View file

@ -1,40 +0,0 @@
# /lib/rcscripts/addons/dm-crypt-stop.sh
# Try to remove any dm-crypt mappings
csetup=/sbin/cryptsetup
if [ -f /etc/conf.d/dmcrypt ] && [ -x "$csetup" ]
then
einfo "Removing dm-crypt mappings"
/bin/egrep "^(target|swap)" /etc/conf.d/dmcrypt | \
while read targetline
do
target=
swap=
eval ${targetline}
[ -n "${swap}" ] && target=${swap}
[ -z "${target}" ] && ewarn "Invalid line in /etc/conf.d/dmcrypt: ${targetline}"
ebegin "Removing dm-crypt mapping for: ${target}"
${csetup} remove ${target}
eend $? "Failed to remove dm-crypt mapping for: ${target}"
done
if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" /etc/conf.d/dmcrypt) ]] ; then
einfo "Taking down any dm-crypt loop devices"
/bin/egrep -e "^(source)" /etc/conf.d/dmcrypt | while read sourceline
do
source=
eval ${sourceline}
if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
ebegin " Taking down ${source}"
/sbin/losetup -d ${source}
eend $? " Failed to remove loop"
fi
done
fi
fi
# vim:ts=4

View file

@ -1,26 +0,0 @@
#!/sbin/runscript
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/cryptsetup/files/1.0.5-dmcrypt.rc,v 1.4 2011/01/18 20:05:18 vapier Exp $
depend() {
before checkfs fsck
}
start() {
if [ ! -e /lib/librc.so ]; then
eerror "The ${myservice} init script is written for baselayout-2"
eerror "Please do not use it with baselayout-1"
return 1
fi
. /lib/rcscripts/addons/dm-crypt-start.sh
}
stop() {
if [ ! -e /lib/librc.so ]; then
return 0
fi
. /lib/rcscripts/addons/dm-crypt-stop.sh
}

View file

@ -1,98 +0,0 @@
# /etc/conf.d/dmcrypt
# For people who run dmcrypt on top of some other layer (like raid),
# use rc_need to specify that requirement. See the runscript(8) man
# page for more information.
#--------------------
# Instructions
#--------------------
# Note regarding the syntax of this file. This file is *almost* bash,
# but each line is evaluated separately. Separate swaps/targets can be
# specified. The init-script which reads this file assumes that a
# swap= or target= line starts a new section, similar to lilo or grub
# configuration.
# Note when using gpg keys and /usr on a separate partition, you will
# have to copy /usr/bin/gpg to /bin/gpg so that it will work properly
# and ensure that gpg has been compiled statically.
# See http://bugs.gentoo.org/90482 for more information.
# Note that the init-script which reads this file detects whether your
# partition is LUKS or not. No mkfs is run unless you specify a makefs
# option.
# Global options:
#----------------
# Max number of checks to perform (1 per second)
#dmcrypt_max_timeout=120
# Arguments:
#-----------
# target=<name> == Mapping name for partition.
# swap=<name> == Mapping name for swap partition.
# source='<dev>' == Real device for partition.
# key='</path/to/keyfile>[:<mode>]' == Fullpath from / or from inside removable media.
# remdev='<dev>' == Device that will be assigned to removable media.
# gpg_options='<opts>' == Default are --quiet --decrypt
# options='<opts>' == cryptsetup, for LUKS you can only use --readonly
# loop_file='<file>' == Loopback file.
# pre_mount='cmds' == commands to execute before mounting partition.
# post_mount='cmds' == commands to execute after mounting partition.
#-----------
# Supported Modes
# gpg == decrypt and pipe key into cryptsetup.
# Note: new-line character must not be part of key.
# Command to erase \n char: 'cat key | tr -d '\n' > cleanKey'
#--------------------
# dm-crypt examples
#--------------------
## swap
# Swap partitions. These should come first so that no keys make their
# way into unencrypted swap.
# If no options are given, they will default to: -c aes -h sha1 -d /dev/urandom
# If no makefs is given then mkswap will be assumed
#swap=crypt-swap
#source='/dev/hda2'
## /home with passphrase
#target=crypt-home
#source='/dev/hda5'
## /home with regular keyfile
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey'
## /home with gpg protected key
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey:gpg'
## /home with regular keyfile on removable media(such as usb-stick)
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey'
#remdev='/dev/sda1'
##/home with gpg protected key on removable media(such as usb-stick)
#target=crypt-home
#source='/dev/hda5'
#key='/full/path/to/homekey:gpg'
#remdev='/dev/sda1'
##/tmp with regular keyfile
#target=crypt-tmp
#source='/dev/hda6'
#key='/full/path/to/tmpkey'
#pre_mount='/sbin/mkreiserfs -f -f ${dev}'
#post_mount='chown root:root ${mount_point}; chmod 1777 ${mount_point}'
## Loopback file example
#mount='crypt-loop-home'
#source='/dev/loop0'
#loop_file='/mnt/crypt/home'

View file

@ -1,294 +0,0 @@
# /lib/rcscripts/addons/dm-crypt-start.sh
# For backwards compatability with baselayout < 1.13.0
dm_crypt_execute_checkfs() {
dm_crypt_execute_dmcrypt
}
dm_crypt_execute_volumes() {
dm_crypt_execute_dmcrypt
}
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
# some colors
local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
if [ -n "$target" ]; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "$swap" ]; then
einfo "Checking swap is not LUKS"
cryptsetup isLuks ${source} 2>/dev/null
foo="$?"
if [ "${foo}" -eq 0 ]; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ -z "$source" ] && [ ! -e "$source" ]; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [[ -n ${loop_file} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
/sbin/losetup ${source} ${loop_file}
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="$target" arg3="$source" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
if /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "$key" ]; then
read_abort() {
local ans
local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
shift
echo -n -e "${prompt}"
if ! read -n 1 $* ans ; then
local back=${prompt//?/\\b}
echo -n -e "${back}"
else
echo
fi
case $ans in
[yY]|[yY][eE][sS]) return 0;;
*) return 1;;
esac
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
key=${key/:*/}
case "$mode" in
gpg|reg)
# handle key on removable device
if [ -n "$remdev" ]; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ]; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
((++i))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "$key" ]; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin "dm-crypt map ${target}"
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
if [ "$mode" == "gpg" ]; then
: ${gpg_options:='-q -d'}
# gpg available ?
if type -p gpg >/dev/null ; then
for (( i = 0 ; i < 3 ; i++ ))
do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
[ "$ret" -eq 0 ] && break
done
eend "${ret}" "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "$mode" == "reg" ]; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
fi
fi
if [ -d "$mntrem" ]; then
umount -n ${mntrem} 2>/dev/null >/dev/null
rmdir ${mntrem} 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [[ ${ret} != 0 ]] ; then
cryptfs_status=1
else
if [[ -n ${pre_mount} ]] ; then
dev="/dev/mapper/${target}"
ebegin " Running pre_mount commands for ${target}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "$target" ] && [ -z "$post_mount" ] && return
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [[ -z ${mount_point} ]] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [[ -n ${post_mount} ]] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Determine string lengths
strlen() {
if [ -z "$1" ]
then
echo "usage: strlen <variable_name>"
die
fi
eval echo "\${#${1}}"
}
# Lookup optional bootparams
parse_opt() {
case "$1" in
*\=*)
local key_name="`echo "$1" | cut -f1 -d=`"
local key_len=`strlen key_name`
local value_start=$((key_len+2))
echo "$1" | cut -c ${value_start}-
;;
esac
}
local cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
CMDLINE="`cat /proc/cmdline`"
for x in ${CMDLINE}
do
case "${x}" in
key_timeout\=*)
KEY_TIMEOUT=`parse_opt "${x}"`
if [ ${KEY_TIMEOUT} -gt 0 ]; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
if [[ -f /etc/conf.d/dmcrypt ]] && [[ -x /sbin/cryptsetup ]] ; then
ebegin "Setting up dm-crypt mappings"
# Fix for baselayout-1.12.10 (bug 174256)
[ -z ${SVCNAME} ] && SVCNAME="${myservice}"
while read -u 3 targetline ; do
# skip comments and blank lines
[[ ${targetline}\# == \#* ]] && continue
# check for the start of a new target/swap
case ${targetline} in
target=*|swap=*)
# If we have a target queued up, then execute it
dm_crypt_execute_${SVCNAME}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [[ -z ${target} && -z ${swap} ]] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
*)
ewarn "Skipping invalid line in /etc/conf.d/dmcrypt: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_${SVCNAME}
eval "${targetline}"
done 3< /etc/conf.d/dmcrypt
# If we have a target queued up, then execute it
dm_crypt_execute_${SVCNAME}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
fi
# vim:ts=4

View file

@ -1,26 +0,0 @@
diff -ur cryptsetup-1.1.0.orig/configure.in cryptsetup-1.1.0/configure.in
--- cryptsetup-1.1.0.orig/configure.in 2010-04-23 21:39:29.000000000 +0300
+++ cryptsetup-1.1.0/configure.in 2010-04-23 21:38:18.000000000 +0300
@@ -62,6 +62,11 @@
dnl ==========================================================================
+saved_LIBS=$LIBS
+AC_CHECK_LIB([udev], [udev_queue_get_udev_is_active])
+AC_SUBST(UDEV_LIBS, $LIBS)
+LIBS=$saved_LIBS
+
AC_ARG_ENABLE(shared-library,
[ --disable-shared-library
disable building of shared cryptsetup library],,
diff -ur cryptsetup-1.1.0.orig/lib/Makefile.am cryptsetup-1.1.0/lib/Makefile.am
--- cryptsetup-1.1.0.orig/lib/Makefile.am 2009-12-30 18:29:28.000000000 +0200
+++ cryptsetup-1.1.0/lib/Makefile.am 2010-04-23 21:41:34.000000000 +0300
@@ -33,6 +33,7 @@
libcryptsetup_la_LIBADD = \
@UUID_LIBS@ \
@DEVMAPPER_LIBS@ \
+ @UDEV_LIBS@ \
@LIBGCRYPT_LIBS@ \
../luks/libluks.la

View file

@ -1,18 +0,0 @@
diff -Naur cryptsetup-1.1.0-rc3/configure.in cryptsetup-1.1.0-rc3-areyoufuckingserious/configure.in
--- cryptsetup-1.1.0-rc3/configure.in 2009-11-16 17:39:37.000000000 -0500
+++ cryptsetup-1.1.0-rc3-areyoufuckingserious/configure.in 2009-11-17 19:49:08.000000000 -0500
@@ -93,9 +93,11 @@
saved_LIBS2=$LIBS
LIBS="$LIBS -static"
# Check if it there is still not some missing dependency like static selinux libs
- AC_SEARCH_LIBS([dm_set_selinux_context], [devmapper],,
- [AC_MSG_ERROR([Your system requires SElinux libraries for static compilation.])])
- LIBS=$saved_LIBS2
+ if test "x$enable_selinux" != xno; then
+ AC_SEARCH_LIBS([dm_set_selinux_context], [devmapper],,
+ [AC_MSG_ERROR([Your system requires SElinux libraries for static compilation.])])
+ LIBS=$saved_LIBS2
+ fi
fi
LIBS=$saved_LIBS

View file

@ -1,330 +0,0 @@
# /lib/rcscripts/addons/dm-crypt-start.sh
# For backwards compatibility with baselayout < 1.13.0 #174256
: ${SVCNAME:=${myservice}}
# We might be hooked into init.d scripts (ala baselayout-1), or we might
# be a standalone dmcrypt script. We support multiple dmcrypt instances,
# but they must start with "dmcrypt." to be detected that way. It keeps
# our lives much simpler with this multiplexed arrangement.
execute_hook="dm_crypt_execute_dmcrypt"
conf_file="dmcrypt"
case ${SVCNAME} in
localmount) execute_hook="dm_crypt_execute_localmount" ;;
dmcrypt.*) conf_file="${SVCNAME}" ;;
esac
conf_file="/etc/conf.d/${conf_file}"
# Setup mappings for an individual target/swap
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
# some colors
local red='\033[31;01m' green='\033[32;01m' off='\033[0;0m'
if [ -n "$target" ]; then
# let user set options, otherwise leave empty
: ${options:=' '}
elif [ -n "$swap" ]; then
einfo "Checking swap is not LUKS"
cryptsetup isLuks ${source} 2>/dev/null
foo="$?"
if [ "${foo}" -eq 0 ]; then
ewarn "The swap you have defined is a LUKS partition. Aborting crypt-swap setup."
return
fi
target=${swap}
# swap contents do not need to be preserved between boots, luks not required.
# suspend2 users should have initramfs's init handling their swap partition either way.
: ${options:='-c aes -h sha1 -d /dev/urandom'}
: ${pre_mount:='mkswap ${dev}'}
else
return
fi
if [ -z "$source" ] && [ ! -e "$source" ]; then
ewarn "source \"${source}\" for ${target} missing, skipping..."
return
fi
if [ -n "${loop_file}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
/sbin/losetup "${source}" "${loop_file}"
fi
# cryptsetup:
# luksOpen <device> <name> # <device> is $source
# create <name> <device> # <name> is $target
local arg1="create" arg2="$target" arg3="$source" luks=0
cryptsetup isLuks ${source} 2>/dev/null && { arg1="luksOpen"; arg2="$source"; arg3="$target"; luks=1; }
# Older versions reported:
# ${target} is active:
# Newer versions report:
# ${target} is active[ and is in use.]
if cryptsetup status ${target} | egrep -q ' is active' ; then
einfo "dm-crypt mapping ${target} is already configured"
return
fi
splash svc_input_begin ${SVCNAME} >/dev/null 2>&1
# Handle keys
if [ -n "$key" ]; then
reset_stty() {
stty ${savestty}
trap - EXIT HUP INT TERM
}
read_abort() {
local ans a b back
printf " ${green}*${off} %s? (${red}yes${off}/${green}No${off}) " "$1"
back=" * $1? (yes/No) "
shift
savestty=`stty -g`
trap reset_stty EXIT HUP INT TERM
stty -icanon -echo
if [ "$1" = '-t' ] && [ "$2" -gt 0 ]; then
stty min 0 time "$(( $2 * 10 ))"
fi
ans=`dd count=1 bs=1 2>/dev/null` || ans=''
reset_stty
if [ -z "${ans}" ]; then
a=''
b=''
while [ -n "${back}" ]; do
a="${a}"'\b'
b="${b} "
back=${back%?}
done
printf "${a}${b}${a}"
return 1
fi
case "${ans}" in
y*|Y*) printf "${red}YES${off}\n"; return 0;;
esac
printf "${green}No${off}\n"
return 1
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
mode=${key##*:} && ( [ "$mode" = "$key" ] || [ -z "$mode" ] ) && mode=reg
key=${key%%:*}
case "$mode" in
gpg|reg)
# handle key on removable device
if [ -n "$remdev" ]; then
# temp directory to mount removable device
local mntrem="${RC_SVCDIR}/dm-crypt-remdev.$$"
if [ ! -d "${mntrem}" ] ; then
if ! mkdir -p "${mntrem}" ; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: Unable to create temporary mount point '${mntrem}'"
return
fi
fi
i=0
einfo "Please insert removable device for ${target}"
while [ ${i} -lt ${dmcrypt_max_timeout:-120} ] ; do
foo=""
if mount -n -o ro "${remdev}" "${mntrem}" 2>/dev/null >/dev/null ; then
# keyfile exists?
if [ ! -e "${mntrem}${key}" ]; then
umount -n "${mntrem}"
rmdir "${mntrem}"
einfo "Cannot find ${key} on removable media."
read_abort "Abort" ${read_timeout:--t 1} && return
else
key="${mntrem}${key}"
break
fi
else
[ -e "${remdev}" ] \
&& foo="mount failed" \
|| foo="mount source not found"
fi
i=$(( $i + 1 ))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
if [ ! -e "$key" ]; then
ewarn "${source} will not be decrypted ..."
einfo "Reason: keyfile ${key} does not exist."
return
fi
fi
;;
*)
ewarn "${source} will not be decrypted ..."
einfo "Reason: mode ${mode} is invalid."
return
;;
esac
else
mode=none
fi
ebegin "dm-crypt map ${target}"
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
if [ "$mode" = "gpg" ]; then
: ${gpg_options:='-q -d'}
# gpg available ?
if command -v gpg >/dev/null 2>&1; then
local i=0
while [ $i -lt 3 ]
do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
[ "$ret" -eq 0 ] && break
i=$(( $i + 1 ))
done
eend "${ret}" "failure running cryptsetup"
else
ewarn "${source} will not be decrypted ..."
einfo "Reason: cannot find gpg application."
einfo "You have to install app-crypt/gnupg first."
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
if [ "$mode" = "reg" ]; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
else
cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
fi
fi
if [ -d "$mntrem" ]; then
umount -n "${mntrem}" 2>/dev/null >/dev/null
rmdir "${mntrem}" 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
if [ "${ret}" -ne 0 ] ; then
cryptfs_status=1
else
if [ -n "${pre_mount}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Running pre_mount commands for ${target}"
eval "${pre_mount}" > /dev/null
ewend $? || cryptfs_status=1
fi
fi
}
# Run any post_mount commands for an individual mount
#
# Note: This relies on variables localized in the main body below.
dm_crypt_execute_localmount() {
local mount_point
[ -z "$target" ] && [ -z "$post_mount" ] && return
if ! /sbin/cryptsetup status ${target} | egrep -q '\<active:' ; then
ewarn "Skipping unmapped target ${target}"
cryptfs_status=1
return
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
if [ -z "${mount_point}" ] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
if [ -n "${post_mount}" ] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
fi
}
# Determine string lengths
strlen() {
if [ -z "$1" ]
then
echo "usage: strlen <variable_name>"
die
fi
eval echo "\${#${1}}"
}
# Lookup optional bootparams
parse_opt() {
case "$1" in
*\=*)
local key_name=${1%%=*}
local key_len=`strlen key_name`
local value_start=$(( $key_len + 2 ))
echo "$1" | cut -c ${value_start}-
;;
esac
}
local cryptfs_status=0
local gpg_options key loop_file target targetline options pre_mount post_mount source swap remdev
CMDLINE="`cat /proc/cmdline`"
for x in ${CMDLINE}
do
case "${x}" in
key_timeout\=*)
KEY_TIMEOUT=`parse_opt "${x}"`
if [ ${KEY_TIMEOUT} -gt 0 ]; then
read_timeout="-t ${KEY_TIMEOUT}"
fi
;;
esac
done
if [ -f "${conf_file}" ] && [ -x /sbin/cryptsetup ] ; then
ebegin "Setting up dm-crypt mappings"
while read targetline <&3 ; do
# skip comments and blank lines
# [[ ${targetline}\# == \#* ]] && continue
# check for the start of a new target/swap
case ${targetline} in
''|'#'*)
# skip comments and blank lines
continue
;;
target=*|swap=*)
# If we have a target queued up, then execute it
${execute_hook}
# Prepare for the next target/swap by resetting variables
unset gpg_options key loop_file target options pre_mount post_mount source swap remdev
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
if [ -z "${target}" ] && [ -z "${swap}" ] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
;;
dmcrypt_max_timeout=*)
# ignore global options
continue
;;
*)
ewarn "Skipping invalid line in ${conf_file}: ${targetline}"
;;
esac
# Queue this setting for the next call to dm_crypt_execute_xxx
eval "${targetline}"
done 3< "${conf_file}"
# If we have a target queued up, then execute it
${execute_hook}
ewend ${cryptfs_status} "Failed to setup dm-crypt devices"
fi
# vim:ts=4

View file

@ -1,53 +0,0 @@
# /lib/rcscripts/addons/dm-crypt-stop.sh
# For backwards compatibility with baselayout < 1.13.0 #174256
: ${SVCNAME:=${myservice}}
# See notes in dm-crypt-start.sh
execute_hook="dm_crypt_execute_dmcrypt"
conf_file="dmcrypt"
case ${SVCNAME} in
dmcrypt.*) conf_file="${SVCNAME}" ;;
esac
conf_file="/etc/conf.d/${conf_file}"
# Try to remove any dm-crypt mappings
csetup=/sbin/cryptsetup
if [ -f "${conf_file}" ] && [ -x "$csetup" ]
then
einfo "Removing dm-crypt mappings"
/bin/egrep "^(target|swap)" "${conf_file}" | \
while read targetline
do
target=
swap=
eval ${targetline}
[ -n "${swap}" ] && target=${swap}
[ -z "${target}" ] && ewarn "Invalid line in ${conf_file}: ${targetline}"
ebegin "Removing dm-crypt mapping for: ${target}"
${csetup} remove ${target}
eend $? "Failed to remove dm-crypt mapping for: ${target}"
done
if /bin/egrep -q -e "^(source=)./dev/loop" "${conf_file}"; then
einfo "Taking down any dm-crypt loop devices"
/bin/egrep -e "^(source)" "${conf_file}" | while read sourceline
do
source=
eval "${sourceline}"
case "${source}" in
*/dev/loop*)
ebegin " Taking down ${source}"
/sbin/losetup -d ${source}
eend $? " Failed to remove loop"
;;
esac
done
fi
fi
# vim:ts=4

View file

@ -1,21 +0,0 @@
2008-09-13 Doug Goldstein <cardoe@gentoo.org>
* switch to udevadm settle since udevsettle has been deprecated
and finally removed with udev 126.
--- cryptsetup-1.0.6/lib/libdevmapper.c
+++ cryptsetup-1.0.6/lib/libdevmapper.c
@@ -18,11 +18,11 @@
#define CRYPT_TARGET "crypt"
-#define UDEVSETTLE "/sbin/udevsettle"
+#define UDEVSETTLE "/sbin/udevadm settle"
-static void run_udevsettle(void)
+static int run_udevsettle(void)
{
- system(UDEVSETTLE);
+ return system(UDEVSETTLE);
}
static void set_dm_error(int level, const char *file, int line,

View file

@ -1,251 +0,0 @@
--- 1.1.3-dm-crypt-start.sh
+++ 1.1.3-dm-crypt-start.sh
@@ -20,7 +20,7 @@
dm_crypt_execute_dmcrypt() {
local dev ret mode foo
# some colors
- local red='\x1b[31;01m' green='\x1b[32;01m' off='\x1b[0;0m'
+ local red='\033[31;01m' green='\033[32;01m' off='\033[0;0m'
if [ -n "$target" ]; then
# let user set options, otherwise leave empty
@@ -46,10 +46,10 @@
return
fi
- if [[ -n ${loop_file} ]] ; then
+ if [ -n "${loop_file}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Setting up loop device ${source}"
- /sbin/losetup ${source} ${loop_file}
+ /sbin/losetup "${source}" "${loop_file}"
fi
# cryptsetup:
@@ -71,26 +71,44 @@
# Handle keys
if [ -n "$key" ]; then
+ reset_stty() {
+ stty ${savestty}
+ trap - EXIT HUP INT TERM
+ }
read_abort() {
- local ans
- local prompt=" ${green}*${off} $1? (${red}yes${off}/${green}No${off}) "
+ local ans a b back
+ printf " ${green}*${off} %s? (${red}yes${off}/${green}No${off}) " "$1"
+ back=" * $1? (yes/No) "
shift
- echo -n -e "${prompt}"
- if ! read -n 1 $* ans ; then
- local back=${prompt//?/\\b}
- echo -n -e "${back}"
- else
- echo
+ savestty=`stty -g`
+ trap reset_stty EXIT HUP INT TERM
+ stty -icanon -echo
+ if [ "$1" = '-t' ] && [ "$2" -gt 0 ]; then
+ stty min 0 time "$(( $2 * 10 ))"
+ fi
+ ans=`dd count=1 bs=1 2>/dev/null` || ans=''
+ reset_stty
+ if [ -z "${ans}" ]; then
+ a=''
+ b=''
+ while [ -n "${back}" ]; do
+ a="${a}"'\b'
+ b="${b} "
+ back=${back%?}
+ done
+ printf "${a}${b}${a}"
+ return 1
fi
- case $ans in
- [yY]|[yY][eE][sS]) return 0;;
- *) return 1;;
+ case "${ans}" in
+ y*|Y*) printf "${red}YES${off}\n"; return 0;;
esac
+ printf "${green}No${off}\n"
+ return 1
}
# Notes: sed not used to avoid case where /usr partition is encrypted.
- mode=${key/*:/} && ( [ "$mode" == "$key" ] || [ -z "$mode" ] ) && mode=reg
- key=${key/:*/}
+ mode=${key##*:} && ( [ "$mode" = "$key" ] || [ -z "$mode" ] ) && mode=reg
+ key=${key%%:*}
case "$mode" in
gpg|reg)
# handle key on removable device
@@ -124,7 +142,7 @@
&& foo="mount failed" \
|| foo="mount source not found"
fi
- ((++i))
+ i=$(( $i + 1 ))
read_abort "Stop waiting after $i attempts (${foo})" -t 1 && return
done
else # keyfile ! on removable device
@@ -146,17 +164,19 @@
fi
ebegin "dm-crypt map ${target}"
einfo "cryptsetup will be called with : ${options} ${arg1} ${arg2} ${arg3}"
- if [ "$mode" == "gpg" ]; then
+ if [ "$mode" = "gpg" ]; then
: ${gpg_options:='-q -d'}
# gpg available ?
- if type -p gpg >/dev/null ; then
- for (( i = 0 ; i < 3 ; i++ ))
+ if command -v gpg >/dev/null 2>&1; then
+ local i=0
+ while [ $i -lt 3 ]
do
# paranoid, don't store key in a variable, pipe it so it stays very little in ram unprotected.
# save stdin stdout stderr "values"
gpg ${gpg_options} ${key} 2>/dev/null | cryptsetup ${options} ${arg1} ${arg2} ${arg3}
ret="$?"
[ "$ret" -eq 0 ] && break
+ i=$(( $i + 1 ))
done
eend "${ret}" "failure running cryptsetup"
else
@@ -166,7 +186,7 @@
einfo "If you have /usr on its own partition, try copying gpg to /bin ."
fi
else
- if [ "$mode" == "reg" ]; then
+ if [ "$mode" = "reg" ]; then
cryptsetup ${options} -d ${key} ${arg1} ${arg2} ${arg3}
ret="$?"
eend "${ret}" "failure running cryptsetup"
@@ -177,15 +197,15 @@
fi
fi
if [ -d "$mntrem" ]; then
- umount -n ${mntrem} 2>/dev/null >/dev/null
- rmdir ${mntrem} 2>/dev/null >/dev/null
+ umount -n "${mntrem}" 2>/dev/null >/dev/null
+ rmdir "${mntrem}" 2>/dev/null >/dev/null
fi
splash svc_input_end ${SVCNAME} >/dev/null 2>&1
- if [[ ${ret} != 0 ]] ; then
+ if [ "${ret}" -ne 0 ] ; then
cryptfs_status=1
else
- if [[ -n ${pre_mount} ]] ; then
+ if [ -n "${pre_mount}" ] ; then
dev="/dev/mapper/${target}"
ebegin " Running pre_mount commands for ${target}"
eval "${pre_mount}" > /dev/null
@@ -209,12 +229,12 @@
fi
mount_point=$(grep "/dev/mapper/${target}" /proc/mounts | cut -d' ' -f2)
- if [[ -z ${mount_point} ]] ; then
+ if [ -z "${mount_point}" ] ; then
ewarn "Failed to find mount point for ${target}, skipping"
cryptfs_status=1
fi
- if [[ -n ${post_mount} ]] ; then
+ if [ -n "${post_mount}" ] ; then
ebegin "Running post_mount commands for target ${target}"
eval "${post_mount}" >/dev/null
eend $? || cryptfs_status=1
@@ -235,9 +255,9 @@
parse_opt() {
case "$1" in
*\=*)
- local key_name="`echo "$1" | cut -f1 -d=`"
+ local key_name=${1%%=*}
local key_len=`strlen key_name`
- local value_start=$((key_len+2))
+ local value_start=$(( $key_len + 2 ))
echo "$1" | cut -c ${value_start}-
;;
esac
@@ -259,15 +279,19 @@
esac
done
-if [[ -f ${conf_file} ]] && [[ -x /sbin/cryptsetup ]] ; then
+if [ -f "${conf_file}" ] && [ -x /sbin/cryptsetup ] ; then
ebegin "Setting up dm-crypt mappings"
- while read -u 3 targetline ; do
+ while read targetline <&3 ; do
# skip comments and blank lines
[[ ${targetline}\# == \#* ]] && continue
# check for the start of a new target/swap
case ${targetline} in
+ ''|'#'*)
+ # skip comments and blank lines
+ continue
+ ;;
target=*|swap=*)
# If we have a target queued up, then execute it
${execute_hook}
@@ -277,7 +301,7 @@
;;
gpg_options=*|remdev=*|key=*|loop_file=*|options=*|pre_mount=*|post_mount=*|source=*)
- if [[ -z ${target} && -z ${swap} ]] ; then
+ if [ -z "${target}" ] && [ -z "${swap}" ] ; then
ewarn "Ignoring setting outside target/swap section: ${targetline}"
continue
fi
@@ -295,7 +319,7 @@
# Queue this setting for the next call to dm_crypt_execute_xxx
eval "${targetline}"
- done 3< ${conf_file}
+ done 3< "${conf_file}"
# If we have a target queued up, then execute it
${execute_hook}
--- 1.1.3-dm-crypt-stop.sh
+++ 1.1.3-dm-crypt-stop.sh
@@ -13,11 +13,11 @@
# Try to remove any dm-crypt mappings
csetup=/sbin/cryptsetup
-if [ -f ${conf_file} ] && [ -x "$csetup" ]
+if [ -f "${conf_file}" ] && [ -x "$csetup" ]
then
einfo "Removing dm-crypt mappings"
- /bin/egrep "^(target|swap)" ${conf_file} | \
+ /bin/egrep "^(target|swap)" "${conf_file}" | \
while read targetline
do
target=
@@ -33,17 +33,19 @@
eend $? "Failed to remove dm-crypt mapping for: ${target}"
done
- if [[ -n $(/bin/egrep -e "^(source=)./dev/loop*" ${conf_file}) ]] ; then
+ if /bin/egrep -q -e "^(source=)./dev/loop" "${conf_file}"; then
einfo "Taking down any dm-crypt loop devices"
- /bin/egrep -e "^(source)" ${conf_file} | while read sourceline
+ /bin/egrep -e "^(source)" "${conf_file}" | while read sourceline
do
source=
- eval ${sourceline}
- if [[ -n $(echo ${source} | grep /dev/loop) ]] ; then
+ eval "${sourceline}"
+ case "${source}" in
+ */dev/loop*)
ebegin " Taking down ${source}"
/sbin/losetup -d ${source}
eend $? " Failed to remove loop"
- fi
+ ;;
+ esac
done
fi
fi

View file

@ -1,8 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>base-system</herd>
<use>
<flag name='dynamic'>Build cryptsetup dynamically</flag>
</use>
</pkgmetadata>