[ecryptfs-utils/f15] updated to v. 93
Michal Hlavinka
mhlavink at fedoraproject.org
Tue Nov 1 09:59:12 UTC 2011
commit 7a8fc4cc5c65e88f9daa5d0bcca184ee079a9740
Author: Michal Hlavinka <mhlavink at redhat.com>
Date: Tue Nov 1 10:59:07 2011 +0100
updated to v. 93
.gitignore | 1 +
ecryptfs-utils-75-werror.patch | 67 ++++++------
ecryptfs-utils-87-autoload.patch | 22 ++--
ecryptfs-utils-87-fixpamfork.patch | 27 ++---
ecryptfs-utils-87-nozombies.patch | 28 ++---
ecryptfs-utils-87-pamdata.patch | 58 ++++------
ecryptfs-utils-87-syslog.patch | 216 +++++++++++++++++++++++------------
ecryptfs-utils.spec | 13 +-
sources | 2 +-
9 files changed, 243 insertions(+), 191 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index e927580..864694a 100644
--- a/.gitignore
+++ b/.gitignore
@@ -6,3 +6,4 @@ ecryptfs-mount-private.png
/ecryptfs-utils_86.orig.tar.gz
/ecryptfs-utils_87.orig.tar.gz
/ecryptfs-utils_90.orig.tar.gz
+/ecryptfs-utils_93.orig.tar.gz
diff --git a/ecryptfs-utils-75-werror.patch b/ecryptfs-utils-75-werror.patch
index fddf477..fa58946 100644
--- a/ecryptfs-utils-75-werror.patch
+++ b/ecryptfs-utils-75-werror.patch
@@ -1,6 +1,6 @@
-diff -up ecryptfs-utils-90/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror ecryptfs-utils-90/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
---- ecryptfs-utils-90/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror 2011-08-11 10:26:55.453235671 +0200
-+++ ecryptfs-utils-90/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c 2011-08-11 10:26:55.471235788 +0200
+diff -up ecryptfs-utils-93/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror ecryptfs-utils-93/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c
+--- ecryptfs-utils-93/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror 2011-10-31 14:18:18.136758412 +0100
++++ ecryptfs-utils-93/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c 2011-10-31 14:18:18.156758569 +0100
@@ -86,7 +86,7 @@ static int ecryptfs_pkcs11h_deserialize(
pkcs11h_data->serialized_id = NULL;
}
@@ -150,9 +150,9 @@ diff -up ecryptfs-utils-90/src/key_mod/ecryptfs_key_mod_pkcs11_helper.c.werror e
subgraph_key_ctx = (struct pkcs11h_subgraph_key_ctx *)(*foo);
-diff -up ecryptfs-utils-90/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils-90/src/libecryptfs/ecryptfs-stat.c
---- ecryptfs-utils-90/src/libecryptfs/ecryptfs-stat.c.werror 2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-90/src/libecryptfs/ecryptfs-stat.c 2011-08-11 10:26:55.472235795 +0200
+diff -up ecryptfs-utils-93/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils-93/src/libecryptfs/ecryptfs-stat.c
+--- ecryptfs-utils-93/src/libecryptfs/ecryptfs-stat.c.werror 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/libecryptfs/ecryptfs-stat.c 2011-10-31 14:18:18.157758576 +0100
@@ -146,7 +146,7 @@ int ecryptfs_parse_stat(struct ecryptfs_
if (buf_size < (ECRYPTFS_FILE_SIZE_BYTES
+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
@@ -162,9 +162,9 @@ diff -up ecryptfs-utils-90/src/libecryptfs/ecryptfs-stat.c.werror ecryptfs-utils
"bytes; there are only [%zu] bytes\n", __FUNCTION__,
(ECRYPTFS_FILE_SIZE_BYTES
+ MAGIC_ECRYPTFS_MARKER_SIZE_BYTES
-diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror 2011-02-06 03:44:30.000000000 +0100
-+++ ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c 2011-08-11 10:26:55.472235795 +0200
+diff -up ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.werror 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c 2011-10-31 14:18:29.644847653 +0100
@@ -39,35 +39,11 @@
#include <sys/stat.h>
#include <fcntl.h>
@@ -176,25 +176,25 @@ diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils
-static void error(const char *msg)
-{
-- syslog(LOG_ERR, "errno = [%i]; strerror = [%m]\n", errno);
+- syslog(LOG_ERR, "pam_ecryptfs: errno = [%i]; strerror = [%m]\n", errno);
- switch (errno) {
- case ENOKEY:
-- syslog(LOG_ERR, "%s: Requested key not available\n", msg);
+- syslog(LOG_ERR, "pam_ecryptfs: %s: Requested key not available\n", msg);
- return;
-
- case EKEYEXPIRED:
-- syslog(LOG_ERR, "%s: Key has expired\n", msg);
+- syslog(LOG_ERR, "pam_ecryptfs: %s: Key has expired\n", msg);
- return;
-
- case EKEYREVOKED:
-- syslog(LOG_ERR, "%s: Key has been revoked\n", msg);
+- syslog(LOG_ERR, "pam_ecryptfs: %s: Key has been revoked\n", msg);
- return;
-
- case EKEYREJECTED:
-- syslog(LOG_ERR, "%s: Key was rejected by service\n", msg);
+- syslog(LOG_ERR, "pam_ecryptfs: %s: Key was rejected by service\n", msg);
- return;
- default:
-- syslog(LOG_ERR, "%s: Unknown key error\n", msg);
+- syslog(LOG_ERR, "pam_ecryptfs: %s: Unknown key error\n", msg);
- return;
- }
-}
@@ -211,7 +211,7 @@ diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils
{
char *unwrapped_pw_filename = NULL;
struct stat s;
-@@ -201,8 +177,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+@@ -195,8 +171,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
if ((argc == 1)
&& (memcmp(argv[0], "unwrap\0", 7) == 0)) {
char *wrapped_pw_filename;
@@ -220,7 +220,7 @@ diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils
rc = asprintf(
&wrapped_pw_filename, "%s/.ecryptfs/%s",
-@@ -294,8 +268,6 @@ static int private_dir(pam_handle_t *pam
+@@ -282,8 +256,6 @@ static int private_dir(pam_handle_t *pam
char *autoumount = "auto-umount";
struct stat s;
pid_t pid;
@@ -229,7 +229,7 @@ diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils
if ((pwd = fetch_pwd(pamh)) == NULL) {
/* fetch_pwd() logged a message */
-@@ -342,7 +314,7 @@ static int private_dir(pam_handle_t *pam
+@@ -329,7 +301,7 @@ static int private_dir(pam_handle_t *pam
if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
/* User has not recorded their passphrase */
unlink("/var/lib/update-notifier/user.d/ecryptfs-record-passphrase");
@@ -238,32 +238,29 @@ diff -up ecryptfs-utils-90/src/pam_ecryptfs/pam_ecryptfs.c.werror ecryptfs-utils
fd = open("/var/lib/update-notifier/dpkg-run-stamp", O_WRONLY|O_CREAT|O_NONBLOCK, 0666);
close(fd);
}
-@@ -413,7 +385,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+@@ -398,7 +370,6 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
char *old_passphrase = NULL;
char *new_passphrase = NULL;
char *wrapped_pw_filename;
- char *name = NULL;
-+// char *name = NULL;
char salt[ECRYPTFS_SALT_SIZE];
char salt_hex[ECRYPTFS_SALT_SIZE_HEX];
pid_t child_pid, tmp_pid;
-@@ -427,11 +399,11 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+@@ -412,10 +383,9 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
if (pwd) {
uid = pwd->pw_uid;
homedir = pwd->pw_dir;
- name = pwd->pw_name;
-+// name = pwd->pw_name;
}
} else {
- syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
-- "rc = [%ld]\n", username, rc);
-+ "rc = [%d]\n", username, rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
++ syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%d]\n", username, rc);
goto out;
}
saved_uid = geteuid();
-diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-90/src/utils/mount.ecryptfs.c
---- ecryptfs-utils-90/src/utils/mount.ecryptfs.c.werror 2011-08-11 10:26:55.468235767 +0200
-+++ ecryptfs-utils-90/src/utils/mount.ecryptfs.c 2011-08-11 10:26:55.473235801 +0200
+diff -up ecryptfs-utils-93/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-93/src/utils/mount.ecryptfs.c
+--- ecryptfs-utils-93/src/utils/mount.ecryptfs.c.werror 2011-10-31 14:18:18.153758546 +0100
++++ ecryptfs-utils-93/src/utils/mount.ecryptfs.c 2011-10-31 14:18:18.158758583 +0100
@@ -461,7 +461,7 @@ static int ecryptfs_do_mount(int argc, c
{
int rc;
@@ -282,9 +279,9 @@ diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs.c.werror ecryptfs-utils-90/s
if (!(temp = strdup("ecryptfs_unlink_sigs"))) {
rc = -ENOMEM;
goto out;
-diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.werror ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c
---- ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.werror 2011-08-11 10:26:55.461235723 +0200
-+++ ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c 2011-08-11 10:27:23.264417014 +0200
+diff -up ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c.werror ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c
+--- ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c.werror 2011-10-31 14:18:18.146758491 +0100
++++ ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c 2011-10-31 14:18:18.158758583 +0100
@@ -95,7 +95,6 @@ int read_config(char *pw_dir, int uid, c
*s = strdup(e->mnt_fsname);
if (!*s)
@@ -293,7 +290,7 @@ diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.werror ecryptfs-ut
return 0;
}
-@@ -300,7 +299,7 @@ int update_mtab(char *dev, char *mnt, ch
+@@ -302,7 +301,7 @@ int update_mtab(char *dev, char *mnt, ch
goto fail_early;
}
@@ -302,9 +299,9 @@ diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.werror ecryptfs-ut
if (addmntent(new_mtab, old_ent) != 0) {
perror("addmntent");
goto fail;
-diff -up ecryptfs-utils-90/src/utils/test.c.werror ecryptfs-utils-90/src/utils/test.c
---- ecryptfs-utils-90/src/utils/test.c.werror 2010-12-17 18:34:04.000000000 +0100
-+++ ecryptfs-utils-90/src/utils/test.c 2011-08-11 10:26:55.474235807 +0200
+diff -up ecryptfs-utils-93/src/utils/test.c.werror ecryptfs-utils-93/src/utils/test.c
+--- ecryptfs-utils-93/src/utils/test.c.werror 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/utils/test.c 2011-10-31 14:18:18.159758591 +0100
@@ -281,7 +281,7 @@ int ecryptfs_encrypt_page(int page_cache
struct inode *lower_inode;
struct ecryptfs_crypt_stat *crypt_stat;
diff --git a/ecryptfs-utils-87-autoload.patch b/ecryptfs-utils-87-autoload.patch
index 344c9be..6d491f9 100644
--- a/ecryptfs-utils-87-autoload.patch
+++ b/ecryptfs-utils-87-autoload.patch
@@ -1,6 +1,6 @@
-diff -up ecryptfs-utils-90/src/utils/ecryptfs-mount-private.autoload ecryptfs-utils-90/src/utils/ecryptfs-mount-private
---- ecryptfs-utils-90/src/utils/ecryptfs-mount-private.autoload 2011-08-31 12:06:39.561319897 +0200
-+++ ecryptfs-utils-90/src/utils/ecryptfs-mount-private 2011-08-31 12:06:39.589319941 +0200
+diff -up ecryptfs-utils-93/src/utils/ecryptfs-mount-private.autoload ecryptfs-utils-93/src/utils/ecryptfs-mount-private
+--- ecryptfs-utils-93/src/utils/ecryptfs-mount-private.autoload 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/utils/ecryptfs-mount-private 2011-10-31 12:40:46.066315002 +0100
@@ -33,6 +33,9 @@ if /sbin/mount.ecryptfs_private >/dev/nu
exit 0
fi
@@ -11,9 +11,9 @@ diff -up ecryptfs-utils-90/src/utils/ecryptfs-mount-private.autoload ecryptfs-ut
# Otherwise, interactively prompt for the user's password
if [ -f "$WRAPPED_PASSPHRASE_FILE" -a -f "$MOUNT_PASSPHRASE_SIG_FILE" ]; then
tries=0
-diff -up ecryptfs-utils-90/src/utils/ecryptfs-setup-private.autoload ecryptfs-utils-90/src/utils/ecryptfs-setup-private
---- ecryptfs-utils-90/src/utils/ecryptfs-setup-private.autoload 2011-08-10 15:35:11.000000000 +0200
-+++ ecryptfs-utils-90/src/utils/ecryptfs-setup-private 2011-08-31 12:04:57.344158953 +0200
+diff -up ecryptfs-utils-93/src/utils/ecryptfs-setup-private.autoload ecryptfs-utils-93/src/utils/ecryptfs-setup-private
+--- ecryptfs-utils-93/src/utils/ecryptfs-setup-private.autoload 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/utils/ecryptfs-setup-private 2011-10-31 12:40:46.066315002 +0100
@@ -101,6 +101,7 @@ random_passphrase () {
}
@@ -22,10 +22,10 @@ diff -up ecryptfs-utils-90/src/utils/ecryptfs-setup-private.autoload ecryptfs-ut
version=$(cat /sys/fs/ecryptfs/version 2>/dev/null)
[ -z "$version" ] && error "$(gettext 'Cannot get ecryptfs version, ecryptfs kernel module not loaded?')"
[ $(($version & 0x100)) -eq 0 ] && return 1
-diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.autoload ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c
---- ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.autoload 2011-08-31 12:00:46.109786923 +0200
-+++ ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c 2011-08-31 12:00:46.116786934 +0200
-@@ -484,6 +484,13 @@ int main(int argc, char *argv[]) {
+diff -up ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c.autoload ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c
+--- ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c.autoload 2011-10-31 12:40:46.000000000 +0100
++++ ecryptfs-utils-93/src/utils/mount.ecryptfs_private.c 2011-10-31 13:40:14.990679286 +0100
+@@ -489,6 +489,13 @@ int main(int argc, char *argv[]) {
char *sig, *sig_fnek;
FILE *fh_counter = NULL;
@@ -37,5 +37,5 @@ diff -up ecryptfs-utils-90/src/utils/mount.ecryptfs_private.c.autoload ecryptfs-
+ }
+
uid = getuid();
+ gid = getgid();
/* Non-privileged effective uid is sufficient for all but the code
- * that mounts, unmounts, and updates /etc/mtab.
diff --git a/ecryptfs-utils-87-fixpamfork.patch b/ecryptfs-utils-87-fixpamfork.patch
index fe1d85d..3c9749c 100644
--- a/ecryptfs-utils-87-fixpamfork.patch
+++ b/ecryptfs-utils-87-fixpamfork.patch
@@ -1,7 +1,7 @@
-diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid 2011-07-21 13:35:47.968581526 +0200
-+++ ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c 2011-07-21 13:37:08.411188936 +0200
-@@ -217,7 +217,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+diff -up ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.fixpamfork ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.fixpamfork 2011-10-31 13:44:28.643925611 +0100
++++ ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c 2011-10-31 13:46:48.627152400 +0100
+@@ -207,7 +207,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
}
out_child:
free(auth_tok_sig);
@@ -10,19 +10,19 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid ecryptfs-utils
}
tmp_pid = waitpid(child_pid, NULL, 0);
if (tmp_pid == -1)
-@@ -309,7 +309,7 @@ static int private_dir(pam_handle_t *pam
+@@ -295,7 +295,7 @@ static int private_dir(pam_handle_t *pam
+ "%s/.ecryptfs/.wrapped-passphrase.recorded",
pwd->pw_dir) < 0) || recorded == NULL) {
- syslog(LOG_ERR,
- "Error allocating memory for recorded name");
+ syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for recorded name");
- return 1;
+ _exit(255);
}
if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
/* User has not recorded their passphrase */
-@@ -322,25 +322,27 @@ static int private_dir(pam_handle_t *pam
+@@ -307,24 +307,26 @@ static int private_dir(pam_handle_t *pam
+ if (stat(autofile, &s) != 0) {
/* User does not want to auto-mount */
- syslog(LOG_INFO,
- "Skipping automatic eCryptfs mount");
+ syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs mount");
- return 0;
+ _exit(0);
}
@@ -34,8 +34,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid ecryptfs-utils
} else {
if (stat(autofile, &s) != 0) {
/* User does not want to auto-unmount */
- syslog(LOG_INFO,
- "Skipping automatic eCryptfs unmount");
+ syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs unmount");
- return 0;
+ _exit(0);
}
@@ -50,7 +49,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid ecryptfs-utils
} else {
waitpid(pid, &rc, 0);
goto out;
-@@ -482,7 +484,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+@@ -455,7 +457,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
goto out_child;
}
out_child:
@@ -58,4 +57,4 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.fixgid ecryptfs-utils
+ _exit(0);
}
if ((tmp_pid = waitpid(child_pid, NULL, 0)) == -1)
- syslog(LOG_WARNING,
+ syslog(LOG_WARNING, "pam_ecryptfs: waitpid() returned with error condition\n");
diff --git a/ecryptfs-utils-87-nozombies.patch b/ecryptfs-utils-87-nozombies.patch
index 32b0147..94f1c6c 100644
--- a/ecryptfs-utils-87-nozombies.patch
+++ b/ecryptfs-utils-87-nozombies.patch
@@ -1,6 +1,6 @@
-diff -up ecryptfs-utils-87/src/include/ecryptfs.h.nozombies ecryptfs-utils-87/src/include/ecryptfs.h
---- ecryptfs-utils-87/src/include/ecryptfs.h.nozombies 2011-03-09 14:30:32.000000000 +0100
-+++ ecryptfs-utils-87/src/include/ecryptfs.h 2011-07-21 14:17:33.539120662 +0200
+diff -up ecryptfs-utils-93/src/include/ecryptfs.h.nozombies ecryptfs-utils-93/src/include/ecryptfs.h
+--- ecryptfs-utils-93/src/include/ecryptfs.h.nozombies 2011-10-27 17:53:07.000000000 +0200
++++ ecryptfs-utils-93/src/include/ecryptfs.h 2011-10-31 13:47:05.151296631 +0100
@@ -588,10 +588,6 @@ int ecryptfs_validate_keyring(void);
#define ECRYPTFS_SHM_KEY 0x3c81b7f5
#define ECRYPTFS_SEM_KEY 0x3c81b7f6
@@ -12,10 +12,10 @@ diff -up ecryptfs-utils-87/src/include/ecryptfs.h.nozombies ecryptfs-utils-87/sr
int ecryptfs_build_linear_subgraph_from_nvp(struct transition_node **trans_node,
struct ecryptfs_key_mod *key_mod);
int ecryptfs_build_linear_subgraph(struct transition_node **trans_node,
-diff -up ecryptfs-utils-87/src/libecryptfs/main.c.nozombies ecryptfs-utils-87/src/libecryptfs/main.c
---- ecryptfs-utils-87/src/libecryptfs/main.c.nozombies 2011-03-09 14:30:32.000000000 +0100
-+++ ecryptfs-utils-87/src/libecryptfs/main.c 2011-07-21 14:19:02.384364121 +0200
-@@ -480,487 +480,6 @@ out:
+diff -up ecryptfs-utils-93/src/libecryptfs/main.c.nozombies ecryptfs-utils-93/src/libecryptfs/main.c
+--- ecryptfs-utils-93/src/libecryptfs/main.c.nozombies 2011-10-31 13:47:05.098296169 +0100
++++ ecryptfs-utils-93/src/libecryptfs/main.c 2011-10-31 13:47:05.151296631 +0100
+@@ -484,487 +484,6 @@ out:
return rc;
}
@@ -503,18 +503,16 @@ diff -up ecryptfs-utils-87/src/libecryptfs/main.c.nozombies ecryptfs-utils-87/sr
static struct ecryptfs_ctx_ops ctx_ops;
struct ecryptfs_ctx_ops *cryptfs_get_ctx_opts (void)
-diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.nozombies ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.nozombies 2011-07-21 14:17:33.525120467 +0200
-+++ ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c 2011-07-21 14:17:33.541120690 +0200
-@@ -208,13 +208,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
- "user session keyring; rc = [%ld]\n", rc);
+diff -up ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.nozombies ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.nozombies 2011-10-31 13:47:05.000000000 +0100
++++ ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c 2011-10-31 13:47:30.931521410 +0100
+@@ -201,11 +201,6 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+ syslog(LOG_ERR, "pam_ecryptfs: Error adding passphrase key token to user session keyring; rc = [%ld]\n", rc);
goto out_child;
}
- if (fork() == 0) {
- if ((rc = ecryptfs_set_zombie_session_placeholder())) {
-- syslog(LOG_ERR, "Error attempting to create "
-- "and register zombie process; "
-- "rc = [%ld]\n", rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error attempting to create and register zombie process; rc = [%ld]\n", rc);
- }
- }
out_child:
diff --git a/ecryptfs-utils-87-pamdata.patch b/ecryptfs-utils-87-pamdata.patch
index 127499c..366d8b7 100644
--- a/ecryptfs-utils-87-pamdata.patch
+++ b/ecryptfs-utils-87-pamdata.patch
@@ -1,7 +1,7 @@
-diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata 2011-08-03 15:40:01.743949759 +0200
-+++ ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c 2011-08-03 15:52:05.676388743 +0200
-@@ -45,6 +45,25 @@
+diff -up ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.pamdata 2011-10-31 13:47:57.282750862 +0100
++++ ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c 2011-10-31 13:56:28.601144959 +0100
+@@ -44,6 +44,25 @@
#define PRIVATE_DIR "Private"
@@ -27,7 +27,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
/* returns: 0 if file does not exist, 1 if it exists, <0 for error */
static int file_exists_dotecryptfs(const char *homedir, char *filename)
{
-@@ -64,7 +83,7 @@ out:
+@@ -63,7 +82,7 @@ out:
return rc;
}
@@ -36,7 +36,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
{
char *unwrapped_pw_filename = NULL;
struct stat s;
-@@ -96,42 +115,43 @@ static int wrap_passphrase_if_necessary(
+@@ -95,37 +114,37 @@ static int wrap_passphrase_if_necessary(
PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc,
const char **argv)
{
@@ -55,9 +55,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
uint32_t version;
+ struct ecryptfs_pam_data *epd = {0,};
- syslog(LOG_INFO, "%s: Called\n", __FUNCTION__);
- rc = pam_get_user(pamh, &username, NULL);
-+
+ if ((epd = malloc(sizeof(struct ecryptfs_pam_data))) == NULL) {
+ syslog(LOG_ERR,"Memory allocation failed");
+ rc = -ENOMEM;
@@ -68,10 +66,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
if (rc == PAM_SUCCESS) {
struct passwd *pwd;
- syslog(LOG_INFO, "%s: username = [%s]\n", __FUNCTION__,
-- username);
- pwd = getpwnam(username);
-+ epd->username);
+ pwd = getpwnam(epd->username);
if (pwd) {
- uid = pwd->pw_uid;
@@ -80,9 +75,8 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
+ epd->homedir = pwd->pw_dir;
}
} else {
- syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
-- "rc = [%ld]\n", username, rc);
-+ "rc = [%ld]\n", epd->username, rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
++ syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", epd->username, rc);
goto out;
}
- if (!file_exists_dotecryptfs(homedir, "auto-mount"))
@@ -91,15 +85,14 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
- private_mnt = ecryptfs_fetch_private_mnt(homedir);
+ private_mnt = ecryptfs_fetch_private_mnt(epd->homedir);
if (ecryptfs_private_is_mounted(NULL, private_mnt, NULL, 1)) {
- syslog(LOG_INFO, "%s: %s is already mounted\n", __FUNCTION__,
-- homedir);
-+ epd->homedir);
+- syslog(LOG_DEBUG, "pam_ecryptfs: %s: %s is already mounted\n", __FUNCTION__, homedir);
++ syslog(LOG_DEBUG, "pam_ecryptfs: %s: %s is already mounted\n", __FUNCTION__, epd->homedir);
/* If private/home is already mounted, then we can skip
costly loading of keys */
goto out;
-@@ -141,82 +161,32 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+@@ -135,79 +154,29 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
if (ecryptfs_get_version(&version) != 0)
- syslog(LOG_WARNING, "Can't check if kernel supports ecryptfs\n");
+ syslog(LOG_WARNING, "pam_ecryptfs: Can't check if kernel supports ecryptfs\n");
saved_uid = geteuid();
- seteuid(uid);
- if(file_exists_dotecryptfs(homedir, "wrapping-independent") == 1)
@@ -113,17 +106,16 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
+ epd->passphrase = strdup(epd->passphrase);
seteuid(saved_uid);
if (rc != PAM_SUCCESS) {
- syslog(LOG_ERR, "Error retrieving passphrase; rc = [%ld]\n",
+ syslog(LOG_ERR, "pam_ecryptfs: Error retrieving passphrase; rc = [%ld]\n",
rc);
goto out;
}
- auth_tok_sig = malloc(ECRYPTFS_SIG_SIZE_HEX + 1);
- if (!auth_tok_sig) {
- rc = -ENOMEM;
-- syslog(LOG_ERR, "Out of memory\n");
+- syslog(LOG_ERR, "pam_ecryptfs: Out of memory\n");
- goto out;
- }
-+
rc = ecryptfs_read_salt_hex_from_rc(salt_hex);
if (rc) {
- from_hex(salt, ECRYPTFS_DEFAULT_SALT_HEX, ECRYPTFS_SALT_SIZE);
@@ -133,31 +125,29 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
- if ((child_pid = fork()) == 0) {
- setuid(uid);
- if (passphrase == NULL) {
-- syslog(LOG_ERR, "NULL passphrase; aborting\n");
+- syslog(LOG_ERR, "pam_ecryptfs: NULL passphrase; aborting\n");
- rc = -EINVAL;
- goto out_child;
- }
- if ((rc = ecryptfs_validate_keyring())) {
-- syslog(LOG_WARNING,
-- "Cannot validate keyring integrity\n");
+- syslog(LOG_WARNING, "pam_ecryptfs: Cannot validate keyring integrity\n");
- }
- rc = 0;
- if ((argc == 1)
- && (memcmp(argv[0], "unwrap\0", 7) == 0)) {
- char *wrapped_pw_filename;
-+ from_hex(epd->salt, salt_hex, ECRYPTFS_SALT_SIZE);
-
+-
- rc = asprintf(
- &wrapped_pw_filename, "%s/.ecryptfs/%s",
- homedir,
- ECRYPTFS_DEFAULT_WRAPPED_PASSPHRASE_FILENAME);
- if (rc == -1) {
-- syslog(LOG_ERR, "Unable to allocate memory\n");
+- syslog(LOG_ERR, "pam_ecryptfs: Unable to allocate memory\n");
- rc = -ENOMEM;
- goto out_child;
- }
- if (wrap_passphrase_if_necessary(username, uid, wrapped_pw_filename, passphrase, salt) == 0) {
-- syslog(LOG_INFO, "Passphrase file wrapped");
+- syslog(LOG_DEBUG, "pam_ecryptfs: Passphrase file wrapped");
- } else {
- goto out_child;
- }
@@ -173,13 +163,13 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
- goto out_child;
- }
- if (rc) {
-- syslog(LOG_ERR, "Error adding passphrase key token to "
-- "user session keyring; rc = [%ld]\n", rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error adding passphrase key token to user session keyring; rc = [%ld]\n", rc);
- goto out_child;
- }
-out_child:
- free(auth_tok_sig);
- _exit(0);
++ from_hex(epd->salt, salt_hex, ECRYPTFS_SALT_SIZE);
+ epd->unwrap = ((argc == 1) && (memcmp(argv[0], "unwrap\0", 7) == 0));
+ if ((rc=pam_set_data(pamh, ECRYPTFS_PAM_DATA, epd, pam_free_ecryptfsdata)) != PAM_SUCCESS) {
+
@@ -188,13 +178,11 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.pamdata ecryptfs-util
}
- tmp_pid = waitpid(child_pid, NULL, 0);
- if (tmp_pid == -1)
-- syslog(LOG_WARNING,
-- "waitpid() returned with error condition\n");
-+
+- syslog(LOG_WARNING, "pam_ecryptfs: waitpid() returned with error condition\n");
out:
if (private_mnt != NULL)
free(private_mnt);
-@@ -361,10 +331,88 @@ static int umount_private_dir(pam_handle
+@@ -347,10 +316,88 @@ static int umount_private_dir(pam_handle
return private_dir(pamh, 0);
}
diff --git a/ecryptfs-utils-87-syslog.patch b/ecryptfs-utils-87-syslog.patch
index b1d2382..d27fab8 100644
--- a/ecryptfs-utils-87-syslog.patch
+++ b/ecryptfs-utils-87-syslog.patch
@@ -1,6 +1,6 @@
-diff -up ecryptfs-utils-87/src/include/ecryptfs.h.syslog ecryptfs-utils-87/src/include/ecryptfs.h
---- ecryptfs-utils-87/src/include/ecryptfs.h.syslog 2011-08-09 14:38:08.941531270 +0200
-+++ ecryptfs-utils-87/src/include/ecryptfs.h 2011-08-09 14:38:08.951531067 +0200
+diff -up ecryptfs-utils-93/src/include/ecryptfs.h.syslog ecryptfs-utils-93/src/include/ecryptfs.h
+--- ecryptfs-utils-93/src/include/ecryptfs.h.syslog 2011-10-31 13:57:01.132420947 +0100
++++ ecryptfs-utils-93/src/include/ecryptfs.h 2011-10-31 13:57:01.135420971 +0100
@@ -143,7 +143,7 @@
#define ECRYPTFS_TAG_67_PACKET 0x43
@@ -10,86 +10,72 @@ diff -up ecryptfs-utils-87/src/include/ecryptfs.h.syslog ecryptfs-utils-87/src/i
#define ECRYPTFS_MAX_NUM_CIPHERS 64
#define ECRYPTFS_ECHO_ON 1
-diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c
---- ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog 2011-08-09 14:38:08.933531435 +0200
-+++ ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c 2011-08-09 14:38:08.955530985 +0200
-@@ -91,7 +91,7 @@ static int wrap_passphrase_if_necessary(
+diff -up ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c
+--- ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c.syslog 2011-10-31 13:57:01.129420920 +0100
++++ ecryptfs-utils-93/src/pam_ecryptfs/pam_ecryptfs.c 2011-10-31 13:59:35.090721614 +0100
+@@ -90,7 +90,7 @@ static int wrap_passphrase_if_necessary(
rc = asprintf(&unwrapped_pw_filename, "/dev/shm/.ecryptfs-%s", username);
if (rc == -1) {
-- syslog(LOG_ERR, "Unable to allocate memory\n");
-+ ecryptfs_syslog(LOG_ERR, "Unable to allocate memory\n");
+- syslog(LOG_ERR, "pam_ecryptfs: Unable to allocate memory\n");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Unable to allocate memory\n");
return -ENOMEM;
}
/* If /dev/shm/.ecryptfs-$USER exists and owned by the user
-@@ -105,7 +105,7 @@ static int wrap_passphrase_if_necessary(
+@@ -104,7 +104,7 @@ static int wrap_passphrase_if_necessary(
setuid(uid);
rc = ecryptfs_wrap_passphrase_file(wrapped_pw_filename, passphrase, salt, unwrapped_pw_filename);
if (rc != 0) {
-- syslog(LOG_ERR, "Error wrapping cleartext password; " "rc = [%d]\n", rc);
-+ ecryptfs_syslog(LOG_ERR, "Error wrapping cleartext password; " "rc = [%d]\n", rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error wrapping cleartext password; " "rc = [%d]\n", rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error wrapping cleartext password; " "rc = [%d]\n", rc);
}
return rc;
}
-@@ -122,10 +122,10 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
- uint32_t version;
+@@ -122,7 +122,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
struct ecryptfs_pam_data *epd = {0,};
-- syslog(LOG_INFO, "%s: Called\n", __FUNCTION__);
-+ ecryptfs_syslog(LOG_INFO, "pam auth stack calls pam_ecryptfs module");
-
if ((epd = malloc(sizeof(struct ecryptfs_pam_data))) == NULL) {
- syslog(LOG_ERR,"Memory allocation failed");
+ ecryptfs_syslog(LOG_ERR,"Memory allocation failed");
rc = -ENOMEM;
goto out;
}
-@@ -134,7 +134,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
- if (rc == PAM_SUCCESS) {
- struct passwd *pwd;
-
-- syslog(LOG_INFO, "%s: username = [%s]\n", __FUNCTION__,
-+ ecryptfs_syslog(LOG_INFO, "pam_ecryptfs: username = [%s]\n",
- epd->username);
- pwd = getpwnam(epd->username);
- if (pwd) {
-@@ -142,7 +142,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+@@ -137,14 +137,14 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
epd->homedir = pwd->pw_dir;
}
} else {
-- syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
-+ ecryptfs_syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
- "rc = [%ld]\n", epd->username, rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", epd->username, rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", epd->username, rc);
goto out;
}
-@@ -150,7 +150,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+ if (!file_exists_dotecryptfs(epd->homedir, "auto-mount"))
goto out;
private_mnt = ecryptfs_fetch_private_mnt(epd->homedir);
if (ecryptfs_private_is_mounted(NULL, private_mnt, NULL, 1)) {
-- syslog(LOG_INFO, "%s: %s is already mounted\n", __FUNCTION__,
-+ ecryptfs_syslog(LOG_INFO, "%s is already mounted",
- epd->homedir);
+- syslog(LOG_DEBUG, "pam_ecryptfs: %s: %s is already mounted\n", __FUNCTION__, epd->homedir);
++ ecryptfs_syslog(LOG_DEBUG, "pam_ecryptfs: %s: %s is already mounted\n", __FUNCTION__, epd->homedir);
/* If private/home is already mounted, then we can skip
costly loading of keys */
-@@ -159,7 +159,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+ goto out;
+@@ -152,7 +152,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
/* we need side effect of this check:
load ecryptfs module if not loaded already */
if (ecryptfs_get_version(&version) != 0)
-- syslog(LOG_WARNING, "Can't check if kernel supports ecryptfs\n");
-+ ecryptfs_syslog(LOG_WARNING, "Can't check if kernel supports ecryptfs\n");
+- syslog(LOG_WARNING, "pam_ecryptfs: Can't check if kernel supports ecryptfs\n");
++ ecryptfs_syslog(LOG_WARNING, "pam_ecryptfs: Can't check if kernel supports ecryptfs\n");
saved_uid = geteuid();
seteuid(epd->uid);
if(file_exists_dotecryptfs(epd->homedir, "wrapping-independent") == 1)
-@@ -169,7 +169,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+@@ -162,7 +162,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
epd->passphrase = strdup(epd->passphrase);
seteuid(saved_uid);
if (rc != PAM_SUCCESS) {
-- syslog(LOG_ERR, "Error retrieving passphrase; rc = [%ld]\n",
-+ ecryptfs_syslog(LOG_ERR, "Error retrieving passphrase; rc = [%ld]\n",
+- syslog(LOG_ERR, "pam_ecryptfs: Error retrieving passphrase; rc = [%ld]\n",
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error retrieving passphrase; rc = [%ld]\n",
rc);
goto out;
}
-@@ -183,7 +183,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
+@@ -174,7 +174,7 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
epd->unwrap = ((argc == 1) && (memcmp(argv[0], "unwrap\0", 7) == 0));
if ((rc=pam_set_data(pamh, ECRYPTFS_PAM_DATA, epd, pam_free_ecryptfsdata)) != PAM_SUCCESS) {
@@ -97,45 +83,44 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
+ ecryptfs_syslog(LOG_ERR, "Unable to store ecryptfs pam data : %s", pam_strerror(pamh, rc));
goto out;
}
-
-@@ -207,13 +207,13 @@ static struct passwd *fetch_pwd(pam_hand
+ out:
+@@ -197,12 +197,12 @@ static struct passwd *fetch_pwd(pam_hand
rc = pam_get_user(pamh, &username, NULL);
if (rc != PAM_SUCCESS || username == NULL) {
-- syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
-+ ecryptfs_syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
- "rc = [%ld]\n", username, rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
return NULL;
}
pwd = getpwnam(username);
if (pwd == NULL) {
-- syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
-+ ecryptfs_syslog(LOG_ERR, "Error getting passwd info for user [%s]; "
- "rc = [%ld]\n", username, rc);
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%ld]\n", username, rc);
return NULL;
}
-@@ -245,13 +245,13 @@ static int private_dir(pam_handle_t *pam
+ return pwd;
+@@ -233,13 +233,13 @@ static int private_dir(pam_handle_t *pam
if (
(asprintf(&autofile, "%s/.ecryptfs/%s", pwd->pw_dir, a) < 0)
|| autofile == NULL) {
-- syslog(LOG_ERR, "Error allocating memory for autofile name");
-+ ecryptfs_syslog(LOG_ERR, "Error allocating memory for autofile name");
+- syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for autofile name");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for autofile name");
return 1;
}
if (
(asprintf(&sigfile, "%s/.ecryptfs/%s.sig", pwd->pw_dir,
PRIVATE_DIR) < 0) || sigfile == NULL) {
-- syslog(LOG_ERR, "Error allocating memory for sigfile name");
-+ ecryptfs_syslog(LOG_ERR, "Error allocating memory for sigfile name");
+- syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for sigfile name");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for sigfile name");
return 1;
}
if (stat(sigfile, &s) != 0) {
-@@ -263,13 +263,13 @@ static int private_dir(pam_handle_t *pam
+@@ -251,13 +251,13 @@ static int private_dir(pam_handle_t *pam
goto out;
}
if ((pid = fork()) < 0) {
-- syslog(LOG_ERR, "Error setting up private mount");
-+ ecryptfs_syslog(LOG_ERR, "Error setting up private mount");
+- syslog(LOG_ERR, "pam_ecryptfs: Error setting up private mount");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error setting up private mount");
return 1;
}
if (pid == 0) {
@@ -146,25 +131,24 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
_exit(255);
}
-@@ -277,7 +277,7 @@ static int private_dir(pam_handle_t *pam
+@@ -265,7 +265,7 @@ static int private_dir(pam_handle_t *pam
if ((asprintf(&recorded,
"%s/.ecryptfs/.wrapped-passphrase.recorded",
pwd->pw_dir) < 0) || recorded == NULL) {
-- syslog(LOG_ERR,
-+ ecryptfs_syslog(LOG_ERR,
- "Error allocating memory for recorded name");
+- syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for recorded name");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error allocating memory for recorded name");
_exit(255);
}
-@@ -290,7 +290,7 @@ static int private_dir(pam_handle_t *pam
+ if (stat(recorded, &s) != 0 && stat("/usr/share/ecryptfs-utils/ecryptfs-record-passphrase", &s) == 0) {
+@@ -277,25 +277,25 @@ static int private_dir(pam_handle_t *pam
}
if (stat(autofile, &s) != 0) {
/* User does not want to auto-mount */
-- syslog(LOG_INFO,
-+ ecryptfs_syslog(LOG_INFO,
- "Skipping automatic eCryptfs mount");
+- syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs mount");
++ ecryptfs_syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs mount");
_exit(0);
}
-@@ -298,11 +298,11 @@ static int private_dir(pam_handle_t *pam
+ /* run mount.ecryptfs_private as the user */
setresuid(pwd->pw_uid, pwd->pw_uid, pwd->pw_uid);
execl("/sbin/mount.ecryptfs_private",
"mount.ecryptfs_private", NULL);
@@ -173,12 +157,11 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
} else {
if (stat(autofile, &s) != 0) {
/* User does not want to auto-unmount */
-- syslog(LOG_INFO,
-+ ecryptfs_syslog(LOG_INFO,
- "Skipping automatic eCryptfs unmount");
+- syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs unmount");
++ ecryptfs_syslog(LOG_DEBUG, "pam_ecryptfs: Skipping automatic eCryptfs unmount");
_exit(0);
}
-@@ -310,7 +310,7 @@ static int private_dir(pam_handle_t *pam
+ /* run umount.ecryptfs_private as the user */
setresuid(pwd->pw_uid, pwd->pw_uid, pwd->pw_uid);
execl("/sbin/umount.ecryptfs_private",
"umount.ecryptfs_private", NULL);
@@ -187,7 +170,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
}
_exit(255);
} else {
-@@ -339,25 +339,25 @@ static int fill_keyring(pam_handle_t *pa
+@@ -324,25 +324,25 @@ static int fill_keyring(pam_handle_t *pa
char *auth_tok_sig;
auth_tok_sig = malloc(ECRYPTFS_SIG_SIZE_HEX + 1);
if (!auth_tok_sig) {
@@ -217,7 +200,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
"Cannot validate keyring integrity\n");
}
rc = 0;
-@@ -369,12 +369,12 @@ static int fill_keyring(pam_handle_t *pa
+@@ -354,12 +354,12 @@ static int fill_keyring(pam_handle_t *pa
epd->homedir,
ECRYPTFS_DEFAULT_WRAPPED_PASSPHRASE_FILENAME);
if (rc == -1) {
@@ -232,7 +215,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
} else {
goto out_child;
}
-@@ -390,7 +390,7 @@ static int fill_keyring(pam_handle_t *pa
+@@ -375,7 +375,7 @@ static int fill_keyring(pam_handle_t *pa
goto out_child;
}
if (rc) {
@@ -241,7 +224,7 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
"user session keyring; rc = [%d]\n", rc);
goto out_child;
}
-@@ -400,7 +400,7 @@ out_child:
+@@ -385,7 +385,7 @@ out_child:
}
tmp_pid = waitpid(child_pid, NULL, 0);
if (tmp_pid == -1)
@@ -250,3 +233,88 @@ diff -up ecryptfs-utils-87/src/pam_ecryptfs/pam_ecryptfs.c.syslog ecryptfs-utils
"waitpid() returned with error condition\n");
+@@ -435,7 +435,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ homedir = pwd->pw_dir;
+ }
+ } else {
+- syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%d]\n", username, rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error getting passwd info for user [%s]; rc = [%d]\n", username, rc);
+ goto out;
+ }
+ saved_uid = geteuid();
+@@ -443,7 +443,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ if ((rc = pam_get_item(pamh, PAM_OLDAUTHTOK,
+ (const void **)&old_passphrase))
+ != PAM_SUCCESS) {
+- syslog(LOG_ERR, "pam_ecryptfs: Error retrieving old passphrase; rc = [%d]\n", rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error retrieving old passphrase; rc = [%d]\n", rc);
+ seteuid(saved_uid);
+ goto out;
+ }
+@@ -451,7 +451,7 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ if ((flags & PAM_PRELIM_CHECK)) {
+ if (!old_passphrase)
+ {
+- syslog(LOG_WARNING, "pam_ecryptfs: PAM passphrase change module retrieved a NULL passphrase; nothing to do\n");
++ ecryptfs_syslog(LOG_WARNING, "pam_ecryptfs: PAM passphrase change module retrieved a NULL passphrase; nothing to do\n");
+ rc = PAM_AUTHTOK_RECOVER_ERR;
+ }
+ seteuid(saved_uid);
+@@ -460,14 +460,14 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ if ((rc = pam_get_item(pamh, PAM_AUTHTOK,
+ (const void **)&new_passphrase))
+ != PAM_SUCCESS) {
+- syslog(LOG_ERR, "pam_ecryptfs: Error retrieving new passphrase; rc = [%d]\n", rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error retrieving new passphrase; rc = [%d]\n", rc);
+ seteuid(saved_uid);
+ goto out;
+ }
+ if ((rc = asprintf(&wrapped_pw_filename, "%s/.ecryptfs/%s", homedir,
+ ECRYPTFS_DEFAULT_WRAPPED_PASSPHRASE_FILENAME))
+ == -1) {
+- syslog(LOG_ERR, "pam_ecryptfs: Unable to allocate memory\n");
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Unable to allocate memory\n");
+ rc = -ENOMEM;
+ goto out;
+ }
+@@ -477,14 +477,14 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ from_hex(salt, salt_hex, ECRYPTFS_SALT_SIZE);
+ }
+ if (wrap_passphrase_if_necessary(username, uid, wrapped_pw_filename, new_passphrase, salt) == 0) {
+- syslog(LOG_DEBUG, "pam_ecryptfs: Passphrase file wrapped");
++ ecryptfs_syslog(LOG_DEBUG, "pam_ecryptfs: Passphrase file wrapped");
+ } else {
+ goto out;
+ }
+
+ seteuid(saved_uid);
+ if (!old_passphrase || !new_passphrase || *new_passphrase == '\0') {
+- syslog(LOG_WARNING, "pam_ecryptfs: PAM passphrase change module retrieved at least one NULL passphrase; nothing to do\n");
++ ecryptfs_syslog(LOG_WARNING, "pam_ecryptfs: PAM passphrase change module retrieved at least one NULL passphrase; nothing to do\n");
+ rc = PAM_AUTHTOK_RECOVER_ERR;
+ goto out;
+ }
+@@ -496,20 +496,20 @@ PAM_EXTERN int pam_sm_chauthtok(pam_hand
+ if ((rc = ecryptfs_unwrap_passphrase(passphrase,
+ wrapped_pw_filename,
+ old_passphrase, salt))) {
+- syslog(LOG_ERR, "pam_ecryptfs: Error attempting to unwrap passphrase; rc = [%d]\n", rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error attempting to unwrap passphrase; rc = [%d]\n", rc);
+ goto out_child;
+ }
+ if ((rc = ecryptfs_wrap_passphrase(wrapped_pw_filename,
+ new_passphrase, salt,
+ passphrase))) {
+- syslog(LOG_ERR, "pam_ecryptfs: Error attempting to wrap passphrase; rc = [%d]", rc);
++ ecryptfs_syslog(LOG_ERR, "pam_ecryptfs: Error attempting to wrap passphrase; rc = [%d]", rc);
+ goto out_child;
+ }
+ out_child:
+ _exit(0);
+ }
+ if ((tmp_pid = waitpid(child_pid, NULL, 0)) == -1)
+- syslog(LOG_WARNING, "pam_ecryptfs: waitpid() returned with error condition\n");
++ ecryptfs_syslog(LOG_WARNING, "pam_ecryptfs: waitpid() returned with error condition\n");
+ free(wrapped_pw_filename);
+ out:
+ return rc;
diff --git a/ecryptfs-utils.spec b/ecryptfs-utils.spec
index fdff58f..e4ca867 100644
--- a/ecryptfs-utils.spec
+++ b/ecryptfs-utils.spec
@@ -4,8 +4,8 @@
%global _sbindir /sbin
Name: ecryptfs-utils
-Version: 90
-Release: 2%{?dist}
+Version: 93
+Release: 1%{?dist}
Summary: The eCryptfs mount helper and support libraries
Group: System Environment/Base
License: GPLv2+
@@ -47,8 +47,6 @@ Patch12: ecryptfs-utils-87-memcpyfix.patch
# allow building with -Werror
Patch999: ecryptfs-utils-75-werror.patch
-Patch13: ecryptfs-utils-90-CVE-2011-3145.patch
-
# using return after fork() in pam module has some nasty side effects, rhbz#722445
Patch14: ecryptfs-utils-87-fixpamfork.patch
@@ -114,7 +112,6 @@ the interface supplied by the ecryptfs-utils library.
%patch11 -p1 -b .authconfig
%patch12 -p1 -b .memcpyfix
%patch999 -p1 -b .werror
-%patch13 -p1 -b .CVE-2011-3145
%patch14 -p1 -b .fixpamfork
%patch15 -p1 -b .fixexecgid
%patch16 -p1 -b .nozombies
@@ -198,6 +195,7 @@ rm -rf $RPM_BUILD_ROOT
%{_bindir}/ecryptfs-stat
%{_bindir}/ecryptfs-umount-private
%{_bindir}/ecryptfs-unwrap-passphrase
+%{_bindir}/ecryptfs-verify
%{_bindir}/ecryptfs-wrap-passphrase
%{_bindir}/ecryptfsd
%{_libdir}/ecryptfs
@@ -249,6 +247,9 @@ rm -rf $RPM_BUILD_ROOT
%{python_sitearch}/ecryptfs-utils/_libecryptfs.so
%changelog
+* Tue Nov 01 2011 Michal Hlavinka <mhlavink at redhat.com> - 93-1
+- updated to v. 93
+
* Wed Aug 31 2011 Michal Hlavinka <mhlavink at redhat.com> - 90-2
- set the group id in mount.ecryptfs_private (CVE-2011-3145)
@@ -290,7 +291,7 @@ rm -rf $RPM_BUILD_ROOT
- auto-load ecryptfs module in ecryptfs-setup-private
* Tue May 24 2011 Michal Hlavinka <mhlavink at redhat.com> - 87-1
-- updated tp v. 87
+- updated to v. 87
* Fri Mar 11 2011 Michal Hlavinka <mhlavink at redhat.com> - 86-3
- fix man pages
diff --git a/sources b/sources
index c36fcea..ab082b6 100644
--- a/sources
+++ b/sources
@@ -1,2 +1,2 @@
e612ddb9ccb17f8fec79df26e626a8c6 ecryptfs-mount-private.png
-a81621fb2f7ab4b81f9bffc020b181e2 ecryptfs-utils_90.orig.tar.gz
+7a162a2102a2c1701a156498d9218685 ecryptfs-utils_93.orig.tar.gz
More information about the scm-commits
mailing list