diff options
author | Nirbheek Chauhan <nirbheek@gentoo.org> | 2011-04-13 08:43:50 +0000 |
---|---|---|
committer | Nirbheek Chauhan <nirbheek@gentoo.org> | 2011-04-13 08:43:50 +0000 |
commit | 26c296247004aefd3ebc4a91d43c318be3f6a01c (patch) | |
tree | faa8d37aed82916c824479b05b3f38e6b20af530 /app-misc | |
parent | Version bump. Fix pdf installation and remove old. (diff) | |
download | historical-26c296247004aefd3ebc4a91d43c318be3f6a01c.tar.gz historical-26c296247004aefd3ebc4a91d43c318be3f6a01c.tar.bz2 historical-26c296247004aefd3ebc4a91d43c318be3f6a01c.zip |
Bringing in upstream CVS 1.57 of pwsafe.cpp plus upstream patches #3259375, #3259514, and #3259580.
Package-Manager: portage-2.1.9.45/cvs/Linux x86_64
Diffstat (limited to 'app-misc')
-rw-r--r-- | app-misc/pwsafe/ChangeLog | 12 | ||||
-rw-r--r-- | app-misc/pwsafe/Manifest | 35 | ||||
-rw-r--r-- | app-misc/pwsafe/files/pwsafe-0.2.0-cvs-1.57.patch | 57 | ||||
-rw-r--r-- | app-misc/pwsafe/files/pwsafe-0.2.0-fake-readline.patch | 107 | ||||
-rw-r--r-- | app-misc/pwsafe/files/pwsafe-0.2.0-man-page-option-syntax.patch | 30 | ||||
-rw-r--r-- | app-misc/pwsafe/files/pwsafe-0.2.0-printf.patch | 43 | ||||
-rw-r--r-- | app-misc/pwsafe/metadata.xml | 12 | ||||
-rw-r--r-- | app-misc/pwsafe/pwsafe-0.2.0-r1.ebuild | 46 |
8 files changed, 324 insertions, 18 deletions
diff --git a/app-misc/pwsafe/ChangeLog b/app-misc/pwsafe/ChangeLog index 7107298a7956..6f4144e77bf7 100644 --- a/app-misc/pwsafe/ChangeLog +++ b/app-misc/pwsafe/ChangeLog @@ -1,6 +1,16 @@ # ChangeLog for app-misc/pwsafe # Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-misc/pwsafe/ChangeLog,v 1.8 2011/03/27 20:49:53 nirbheek Exp $ +# $Header: /var/cvsroot/gentoo-x86/app-misc/pwsafe/ChangeLog,v 1.9 2011/04/13 08:43:50 nirbheek Exp $ + +*pwsafe-0.2.0-r1 (13 Apr 2011) + + 13 Apr 2011; Christopher Head (Hawk777) <headch@gmail.com> + +pwsafe-0.2.0-r1.ebuild, +files/pwsafe-0.2.0-cvs-1.57.patch, + +files/pwsafe-0.2.0-fake-readline.patch, + +files/pwsafe-0.2.0-man-page-option-syntax.patch, + +files/pwsafe-0.2.0-printf.patch, metadata.xml: + Bringing in upstream CVS 1.57 of pwsafe.cpp plus upstream patches + #3259375, #3259514, and #3259580. 27 Mar 2011; Nirbheek Chauhan <nirbheek@gentoo.org> metadata.xml: Add new maintainer + proxy-maintainer diff --git a/app-misc/pwsafe/Manifest b/app-misc/pwsafe/Manifest index 9cc9d596fb88..7e8f90a53a1a 100644 --- a/app-misc/pwsafe/Manifest +++ b/app-misc/pwsafe/Manifest @@ -1,24 +1,29 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 +AUX pwsafe-0.2.0-cvs-1.57.patch 1468 RMD160 a3b9a9b6cccc5cb47a46ab7a432debcb0983817e SHA1 dd0f758daccf6daaec9ff4cc5951311a55e082a2 SHA256 6e8b05d01293e936397d61656a5ba19787a52d2aa97004bfad03e0facc593acc +AUX pwsafe-0.2.0-fake-readline.patch 2667 RMD160 9b686dc4a7d913d3fc4f8cc9e7ee5181bc520a34 SHA1 ff9c2d472ecce5127dcc2fc36c3200fe11dee2f3 SHA256 918293edb9196efce2a75f6e4cf1fc59addd766aa515a158b14f9bc4c3bb2cdd +AUX pwsafe-0.2.0-man-page-option-syntax.patch 848 RMD160 5c0562a83972d3c5c900f796b91cb4b91428beda SHA1 2ae1cd3d28228692fe70124ac9053e00cbebc229 SHA256 858865706f8cdb30712f210bb7f03edf327934fe3e4ab04376b844de35aa4de3 +AUX pwsafe-0.2.0-printf.patch 1868 RMD160 c00fed82de68927bc681a3a72eadd734eee43c05 SHA1 8dc2124e3b72b2e2c43df98e41ce68a406f71c9b SHA256 927afd52a65d582cd089f1aba3298d17a7d356403ad323c3d2e7526db1279279 DIST pwsafe-0.2.0.tar.gz 127433 RMD160 5509379f0bb4acea855183e1249395cdc23954d2 SHA1 026643a391796a527a48ffccf93d542113ca79d4 SHA256 61e91dc5114fe014a49afabd574eda5ff49b36c81a6d492c03fcb10ba6af47b7 +EBUILD pwsafe-0.2.0-r1.ebuild 1059 RMD160 929cb9d100726673bf0a4958692e7883df04914e SHA1 c4ab658a1dcba0ca6f621a4901497da2d424faa0 SHA256 d74d3dc83d0e6dcb09930fe552aeaa4ef7ca2d3b686e2badb14ebca5d573311b EBUILD pwsafe-0.2.0.ebuild 784 RMD160 2229edcbf7f6b5362a142d2cf453574d0ad4b11e SHA1 c926d2442c468fd6c73bd31e3fa3752870c638ca SHA256 62ddb44fb74a6e2f1d09e64f166bf134aa47f2f208488c036aebd5e0bc39d79e -MISC ChangeLog 1209 RMD160 e68a1d2de3e6521d1383a1259aa4733a30edebea SHA1 7c0de40c18664fba87439b8380f00b37ab48a3a3 SHA256 a38fe216f5f788cfc6fbd9a487edb96f68547354f68a1dc9566cbf29448b8186 -MISC metadata.xml 698 RMD160 2d7104a93fa3df3d7bd03526b59ad88ef49eb136 SHA1 0bdb866bc90dc561df74df57141e03c618310812 SHA256 e061136e7d20bc6c72b5c8ec3d7461bd985b3053b5ad4e1e7eb67233186826a0 +MISC ChangeLog 1615 RMD160 3b070afd237c3521fdf15da42238274e7f65345d SHA1 283b6f785f3b94edbaafb0daf2fb8fbc056896a7 SHA256 6aea7ba5f5dc7c98f19d0508a53bae7b3ece8f78e11b27ce5d222ed79a1d5183 +MISC metadata.xml 892 RMD160 4ed5a56d4208bf0e0b0670bc2b3126055b14739f SHA1 ab5fc19b2c3ec1bcb50dc507b9ae2e0a0169981a SHA256 9fc3aaf3fc5f70a520cbb7e3617129dfe142a4de48f5e2f70912ab05f00ade67 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.17 (GNU/Linux) -iQIcBAEBAgAGBQJNj60CAAoJEO/kOhxWD91kwPoQAKo6e5n5CxMdL0zCMbybY5cC -odVUriL9ztKMAQ4ey73VhJ4bMj25LhBqT7gkF0g6U3oO4YTNwaGPHFMJUZdwx8su -X3F2q39l7VbCT1f2O3zacijo7KeDA+zi5CsqTHddkgfweozJl7ygy9WBD6cMPsEc -4+X5uh9DfUWoo2RYjwUjawUVQra+DXcYWTx//ElwM6lP8F42pVlv5IiCtN7vvAAf -sTeLm0UoT5XhQhvPdGWnWHgDz2sg2MLbut0cd3a8gJj5fhJ30WZuwIAZvHEFyq7R -r+dO47Bhf5Qt/8gNkAOnMCeeuX5vp0rwoMbM81KwV8zwd/hClnRO53o3pKUf769n -casX5JKQMHis0qP4Spiz8VZ/l3mdjfJ19/AVQI1xAtjnnL/oylzz9LHNu5+t/Nyo -/6WM5UdojACTRn5Jxff/SLMnyPS0vy7ZKy/lJ91L7DxFuwJ3ZlN6Gc1YUshm/gt6 -HFeG8AMsDme1gIw2qPyojIxGA9GRiMR1zoN9uDsgxvMuiNoD8w0KVrpuQtIypf6o -vuTulZISjrNyTnMpA40DqpLw6/IU663SOZo3cD1xb1hoPq21YAGGBW92H+7ED8au -qXQNg86F5W3CZ52ZRXsy0kSV2DOyRo4PuSCJUlQOCVqhJ3YSeee8aJcHicFs628s -xZlwAJt1Si/pOWCoGpLG -=GCXw +iQIcBAEBAgAGBQJNpWJCAAoJEO/kOhxWD91ko7EP/AxtFzYr3CjLcY1gxRz3jZ1I +HGa9l8ZQsOwR7Aw7Ni4wV29HauctM4xJ++WOpDC1GwhZ04OBGd2tVFA749PWUVaW +jehNf6vrN8J00UWxGxaGkm2gBlxRI7uzt8oWT4ljzcPAXNIqMavXgiryTlWLgl4O +JOt4TVyqYSj0RopfNUvNLiuDibEVlsAWhutlOXC8z5SswOhUAUkP3AJr4s6yKiAB +3NeHwvMF2tWJXn14C8mQCtgK/R2xKEJSlVdeJ+bQ5DDYtmRpHkyi0dXWl4rc7SXR +CsSdB5I//H/hnF7pafqlSFIUOjaEN3zBu+ZPnBaHBMMzKZU1Byk16V1KuRFP4/4F +PPiWVBnn88Xciaxc8b4Y+xbAeRUGehAccRgjGK7GsIbG17ARNkvYPMXg5XMGRHC9 +p2+oQNHY2nwwuYeZaWgmYzzyltEcv4v+2MFBHWyEvddg8UxAbFr601Rs1iKmNANp +6cHpF8w4JQ4hXsauC+3MatETQmkRaAac6yAu9QeuTBEdiQfyip69JbjzdGnpZFDw +9mf/d/GCQSVq5ngn+7Z02YplW9TaoOz9CT9gcyasy8cA7XWd2FgS5OURwldDPQpL +TvYF1l/nDLSENacLX71O5VnfJ7edvFk/Y/wKiFr76SgoXW8uuZHkaobfR9ScqlJ/ +pBYqtUn7BRhhPVFH71mk +=LSbn -----END PGP SIGNATURE----- diff --git a/app-misc/pwsafe/files/pwsafe-0.2.0-cvs-1.57.patch b/app-misc/pwsafe/files/pwsafe-0.2.0-cvs-1.57.patch new file mode 100644 index 000000000000..9119abed769e --- /dev/null +++ b/app-misc/pwsafe/files/pwsafe-0.2.0-cvs-1.57.patch @@ -0,0 +1,57 @@ +Index: pwsafe.cpp +=================================================================== +RCS file: /cvsroot/pwsafe/pwsafe/pwsafe.cpp,v +retrieving revision 1.56 +retrieving revision 1.57 +diff -u -r1.56 -r1.57 +--- pwsafe.cpp 30 Sep 2005 10:30:56 -0000 1.56 ++++ pwsafe.cpp 12 Aug 2007 12:33:06 -0000 1.57 +@@ -3,7 +3,7 @@ + + Copyright (C) 2004-2005 Nicolas S. Dade + +- $Id: pwsafe-0.2.0-cvs-1.57.patch,v 1.1 2011/04/13 08:43:49 nirbheek Exp $ ++ $Id: pwsafe-0.2.0-cvs-1.57.patch,v 1.1 2011/04/13 08:43:49 nirbheek Exp $ + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by +@@ -3346,6 +3346,12 @@ + } + + bufpos += rc; ++ buf[bufpos] = '\0'; ++ ++ if (rc == 0) { ++ // EOF (ctrl-D) ++ break; ++ } + + if (bufpos == buflen && !strchr(buf,'\n')) { + // we needed a bigger buffer +@@ -3354,6 +3360,7 @@ + fprintf(stderr, "Error: %s out of memory\n", program_name); + memset(buf,0,buflen); + free(buf); ++ throw FailEx(); + } + + memcpy(new_buf, buf, bufpos); +@@ -3364,9 +3371,15 @@ + } + } + +- int len = strchr(buf,'\n') - buf; +- saved.assign(buf+len+1, bufpos-(len+1)); +- buf[len] = '\0'; ++ char* lf = strchr(buf,'\n'); ++ if (lf) { ++ // save the rest of the input for later ++ saved.assign(lf+1); ++ *lf = '\0'; ++ } else { ++ saved.assign("",0); ++ } ++ + return buf; + } + #endif // WITH_READLINE diff --git a/app-misc/pwsafe/files/pwsafe-0.2.0-fake-readline.patch b/app-misc/pwsafe/files/pwsafe-0.2.0-fake-readline.patch new file mode 100644 index 000000000000..4e0f4ad4dfd6 --- /dev/null +++ b/app-misc/pwsafe/files/pwsafe-0.2.0-fake-readline.patch @@ -0,0 +1,107 @@ +Index: pwsafe.cpp +=================================================================== +RCS file: /cvsroot/pwsafe/pwsafe/pwsafe.cpp,v +retrieving revision 1.57 +diff -u -r1.57 pwsafe.cpp +--- pwsafe.cpp 12 Aug 2007 12:33:06 -0000 1.57 ++++ pwsafe.cpp 30 Mar 2011 07:22:11 -0000 +@@ -3325,61 +3325,48 @@ + static char* readline(const char* prompt) { + printf("%s", prompt); + fflush(stdout); +- +- static secstring saved; +- int buflen = saved.length() + 100; +- int bufpos = saved.length(); +- char* buf = reinterpret_cast<char*>(malloc(buflen+1)); +- if (!buf) +- throw FailEx(); +- memcpy(buf, saved.data(), saved.length()); +- buf[saved.length()] = '\0'; +- +- while (!strchr(buf,'\n')) { +- const int rc = ::read(STDIN_FILENO, buf+bufpos, buflen); +- +- if (rc == -1) { +- fprintf(stderr, "Error: %s read(STDIN) failed: %s\n", program_name, strerror(errno)); +- memset(buf,0,buflen); +- free(buf); +- throw FailEx(); +- } +- +- bufpos += rc; +- buf[bufpos] = '\0'; +- +- if (rc == 0) { +- // EOF (ctrl-D) +- break; +- } +- +- if (bufpos == buflen && !strchr(buf,'\n')) { +- // we needed a bigger buffer +- char* new_buf = reinterpret_cast<char*>(malloc(2*buflen+1)); +- if (!new_buf) { +- fprintf(stderr, "Error: %s out of memory\n", program_name); +- memset(buf,0,buflen); +- free(buf); +- throw FailEx(); +- } + +- memcpy(new_buf, buf, bufpos); +- memset(buf, 0, buflen); +- free(buf); +- buf = new_buf; +- buflen *= 2; +- } +- } ++ size_t buflen = 100; ++ size_t bufpos = 0; ++ char* buf = static_cast<char*>(malloc(buflen+1)); ++ if (!buf) ++ throw FailEx(); + +- char* lf = strchr(buf,'\n'); +- if (lf) { +- // save the rest of the input for later +- saved.assign(lf+1); +- *lf = '\0'; +- } else { +- saved.assign("",0); ++ for (;;) { ++ const ssize_t rc = ::read(STDIN_FILENO, buf+bufpos, 1); ++ if (rc == -1) { ++ fprintf(stderr, "Error: %s read(STDIN) failed: %s\n", program_name, strerror(errno)); ++ memset(buf,0,bufpos); ++ free(buf); ++ throw FailEx(); ++ } else if (rc == 0) { ++ // EOF (ctrl-D) ++ break; ++ } else if (buf[bufpos] == '\n') { ++ // end of line ++ break; ++ } ++ ++ ++bufpos; ++ ++ if (bufpos == buflen) { ++ // we need a bigger buffer ++ char* new_buf = static_cast<char*>(malloc(2*buflen+1)); ++ if (!new_buf) { ++ fprintf(stderr, "Error: %s out of memory\n", program_name); ++ memset(buf,0,bufpos); ++ free(buf); ++ throw FailEx(); ++ } ++ memcpy(new_buf, buf, bufpos); ++ memset(buf, 0, bufpos); ++ free(buf); ++ buf = new_buf; ++ buflen *= 2; ++ } + } + ++ buf[bufpos] = '\0'; + return buf; + } + #endif // WITH_READLINE diff --git a/app-misc/pwsafe/files/pwsafe-0.2.0-man-page-option-syntax.patch b/app-misc/pwsafe/files/pwsafe-0.2.0-man-page-option-syntax.patch new file mode 100644 index 000000000000..a83d3a83d8eb --- /dev/null +++ b/app-misc/pwsafe/files/pwsafe-0.2.0-man-page-option-syntax.patch @@ -0,0 +1,30 @@ +Index: pwsafe.1.in +=================================================================== +RCS file: /cvsroot/pwsafe/pwsafe/pwsafe.1.in,v +retrieving revision 1.8 +diff -u -r1.8 pwsafe.1.in +--- pwsafe.1.in 18 Mar 2006 14:17:41 -0000 1.8 ++++ pwsafe.1.in 30 Mar 2011 07:42:23 -0000 +@@ -52,18 +52,18 @@ + .B \-\-passwd + Change the database's passphrase. + .TP +-.B \-\-list[=REGEX] ++.B \-\-list [REGEX] + List all [matching] entries in database. + .BR + If \-u or \-p is given then REGEX must match only one entry, and only the requested field(s) are emitted. + .TP +-.B \-a, \-\-add[=NAME] ++.B \-a, \-\-add [NAME] + Add an entry to database. + .TP +-.B \-e, \-\-edit=REGEX ++.B \-e, \-\-edit REGEX + Edit an entry. + .TP +-.B \-\-delete=NAME ++.B \-\-delete NAME + Delete an entry from database. + .TP + If no command is given, an interactive mode is entered. diff --git a/app-misc/pwsafe/files/pwsafe-0.2.0-printf.patch b/app-misc/pwsafe/files/pwsafe-0.2.0-printf.patch new file mode 100644 index 000000000000..409f3a7220ed --- /dev/null +++ b/app-misc/pwsafe/files/pwsafe-0.2.0-printf.patch @@ -0,0 +1,43 @@ +Index: pwsafe.cpp +=================================================================== +RCS file: /cvsroot/pwsafe/pwsafe/pwsafe.cpp,v +retrieving revision 1.57 +diff -u -r1.57 pwsafe.cpp +--- pwsafe.cpp 12 Aug 2007 12:33:06 -0000 1.57 ++++ pwsafe.cpp 30 Mar 2011 05:44:07 -0000 +@@ -1619,7 +1619,7 @@ + snprintf(ent_buf, sizeof(ent_buf), "%d", entropy_needed); + ent_buf[sizeof(ent_buf)-1] = '\0'; + char len_buf[24]; +- snprintf(len_buf, sizeof(len_buf), "%d", pw.length()); ++ snprintf(len_buf, sizeof(len_buf), "%lu", static_cast<unsigned long>(pw.length())); + len_buf[sizeof(len_buf)-1] = '\0'; + switch (tolower(get1char("Use "+pw+"\ntype "+type_name+", length "+len_buf+", "+ent_buf+" bits of entropy [y/N/ /+/-/q/?] ? ", 'n'))) { + case 'y': +@@ -2380,7 +2380,7 @@ + version = VERSION_1_7; + } + +- if (arg_verbose > 1) printf("read in %u entries\n", entries.size()); ++ if (arg_verbose > 1) printf("read in %lu entries\n", static_cast<unsigned long>(entries.size())); + + opened = true; + return true; +@@ -2601,7 +2601,7 @@ + for (matches_t::const_iterator i=matches.begin(); i!=matches.end() && count < 3; ++i, ++count) + printf("%s%s", (count?", ":""), (*i)->groupname().c_str()); + if (count != matches.size()) +- printf(", ... (%u more) ", matches.size()-3); ++ printf(", ... (%lu more) ", static_cast<unsigned long>(matches.size()-3)); + printf(".\n"); + throw FailEx(); + } +@@ -2637,7 +2637,7 @@ + // print out the UUID too + fprintf(outfile, "%s\n", formatuuid(e.uuid).c_str()); + if (!e.extras.empty()) +- fprintf(outfile, "and %u unknown extra fields\n", e.extras.size()); ++ fprintf(outfile, "and %lu unknown extra fields\n", static_cast<unsigned long>(e.extras.size())); + } + } else + // just print out the name diff --git a/app-misc/pwsafe/metadata.xml b/app-misc/pwsafe/metadata.xml index c6c9ea091424..bb3559e6d4c9 100644 --- a/app-misc/pwsafe/metadata.xml +++ b/app-misc/pwsafe/metadata.xml @@ -13,7 +13,15 @@ </maintainer> <longdescription lang="en"> pwsafe is a commandline password database utility compatible with - Counterpane's Passwordsafe. It is compatible with Counterpane Passwordsafe - 1.9.x and 2.0 databases. It can interact with X11 selection and clipboard. + Counterpane's Password Safe. It is compatible with Counterpane Password + Safe 1.9.x and 2.0 databases. It can interact with X11 selection and + clipboard. </longdescription> + <upstream> + <maintainer> + <email>ndade@nsd.dyndns.org</email> + <name>Nicolas Dade</name> + </maintainer> + <remote-id type="sourceforge">pwsafe</remote-id> + </upstream> </pkgmetadata> diff --git a/app-misc/pwsafe/pwsafe-0.2.0-r1.ebuild b/app-misc/pwsafe/pwsafe-0.2.0-r1.ebuild new file mode 100644 index 000000000000..62f61a9e761c --- /dev/null +++ b/app-misc/pwsafe/pwsafe-0.2.0-r1.ebuild @@ -0,0 +1,46 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/pwsafe/pwsafe-0.2.0-r1.ebuild,v 1.1 2011/04/13 08:43:50 nirbheek Exp $ + +EAPI=2 +inherit eutils + +DESCRIPTION="A Password Safe compatible command-line password manager" +HOMEPAGE="http://nsd.dyndns.org/pwsafe/" +SRC_URI="http://nsd.dyndns.org/pwsafe/releases/${P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" + +IUSE="X readline" + +DEPEND="sys-libs/ncurses + dev-libs/openssl + readline? ( sys-libs/readline ) + X? ( x11-libs/libSM + x11-libs/libICE + x11-libs/libXmu + x11-libs/libX11 )" +RDEPEND="${DEPEND}" + +src_prepare() { + epatch "${FILESDIR}/${P}-cvs-1.57.patch" + epatch "${FILESDIR}/${P}-printf.patch" + epatch "${FILESDIR}/${P}-fake-readline.patch" + epatch "${FILESDIR}/${P}-man-page-option-syntax.patch" +} + +src_configure() { + econf $(use_with X x) $(use_with readline) || die +} + +src_compile() { + emake || die +} + +src_install() { + doman pwsafe.1 || die + dobin pwsafe || die + dodoc README NEWS || die +} |