aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHeinz Wiesinger <pprkut@slackbuilds.org>2017-06-03 15:09:14 +0200
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2017-06-06 07:56:51 +0700
commit7a9b43f88b923b1a3a104f3981c2500fc63b8f25 (patch)
tree5f269441f8dd697c37e29df5b169db34d886cd7e
parentfde650ea487bb7e68c37ce8714d8915d36e0ab18 (diff)
system/encfs: Updated for version 1.9.1.
Signed-off-by: Heinz Wiesinger <pprkut@slackbuilds.org>
-rw-r--r--system/encfs/encfs-openssl-1.1.patch350
-rw-r--r--system/encfs/encfs.SlackBuild38
-rw-r--r--system/encfs/encfs.info8
3 files changed, 375 insertions, 21 deletions
diff --git a/system/encfs/encfs-openssl-1.1.patch b/system/encfs/encfs-openssl-1.1.patch
new file mode 100644
index 0000000000000..95d57bf235fcf
--- /dev/null
+++ b/system/encfs/encfs-openssl-1.1.patch
@@ -0,0 +1,350 @@
+diff --git a/encfs/SSL_Cipher.cpp b/encfs/SSL_Cipher.cpp
+index e9ba424..4d14755 100644
+--- a/encfs/SSL_Cipher.cpp
++++ b/encfs/SSL_Cipher.cpp
+@@ -36,6 +36,7 @@
+ #include "Interface.h"
+ #include "Mutex.h"
+ #include "Range.h"
++#include "SSL_Compat.h"
+ #include "SSL_Cipher.h"
+ #include "intl/gettext.h"
+
+@@ -74,19 +75,19 @@ int BytesToKey(int keyLen, int ivLen, const EVP_MD *md,
+ int nkey = key ? keyLen : 0;
+ int niv = iv ? ivLen : 0;
+
+- EVP_MD_CTX cx;
+- EVP_MD_CTX_init(&cx);
++ EVP_MD_CTX *cx = EVP_MD_CTX_new();
++ EVP_MD_CTX_init(cx);
+
+ for (;;) {
+- EVP_DigestInit_ex(&cx, md, NULL);
+- if (addmd++) EVP_DigestUpdate(&cx, mdBuf, mds);
+- EVP_DigestUpdate(&cx, data, dataLen);
+- EVP_DigestFinal_ex(&cx, mdBuf, &mds);
++ EVP_DigestInit_ex(cx, md, NULL);
++ if (addmd++) EVP_DigestUpdate(cx, mdBuf, mds);
++ EVP_DigestUpdate(cx, data, dataLen);
++ EVP_DigestFinal_ex(cx, mdBuf, &mds);
+
+ for (unsigned int i = 1; i < rounds; ++i) {
+- EVP_DigestInit_ex(&cx, md, NULL);
+- EVP_DigestUpdate(&cx, mdBuf, mds);
+- EVP_DigestFinal_ex(&cx, mdBuf, &mds);
++ EVP_DigestInit_ex(cx, md, NULL);
++ EVP_DigestUpdate(cx, mdBuf, mds);
++ EVP_DigestFinal_ex(cx, mdBuf, &mds);
+ }
+
+ int offset = 0;
+@@ -106,7 +107,7 @@ int BytesToKey(int keyLen, int ivLen, const EVP_MD *md,
+ }
+ if ((nkey == 0) && (niv == 0)) break;
+ }
+- EVP_MD_CTX_cleanup(&cx);
++ EVP_MD_CTX_free(cx);
+ OPENSSL_cleanse(mdBuf, sizeof(mdBuf));
+
+ return keyLen;
+@@ -229,12 +230,12 @@ class SSLKey : public AbstractCipherKey {
+ // followed by iv of _ivLength bytes,
+ unsigned char *buffer;
+
+- EVP_CIPHER_CTX block_enc;
+- EVP_CIPHER_CTX block_dec;
+- EVP_CIPHER_CTX stream_enc;
+- EVP_CIPHER_CTX stream_dec;
++ EVP_CIPHER_CTX *block_enc;
++ EVP_CIPHER_CTX *block_dec;
++ EVP_CIPHER_CTX *stream_enc;
++ EVP_CIPHER_CTX *stream_dec;
+
+- HMAC_CTX mac_ctx;
++ HMAC_CTX *mac_ctx;
+
+ SSLKey(int keySize, int ivLength);
+ ~SSLKey();
+@@ -251,11 +252,16 @@ SSLKey::SSLKey(int keySize_, int ivLength_) {
+ // kernel patch is applied..
+ mlock(buffer, keySize + ivLength);
+
+- EVP_CIPHER_CTX_init(&block_enc);
+- EVP_CIPHER_CTX_init(&block_dec);
+- EVP_CIPHER_CTX_init(&stream_enc);
+- EVP_CIPHER_CTX_init(&stream_dec);
+- HMAC_CTX_init(&mac_ctx);
++ block_enc = EVP_CIPHER_CTX_new();
++ EVP_CIPHER_CTX_init(block_enc);
++ block_dec = EVP_CIPHER_CTX_new();
++ EVP_CIPHER_CTX_init(block_dec);
++ stream_enc = EVP_CIPHER_CTX_new();
++ EVP_CIPHER_CTX_init(stream_enc);
++ stream_dec = EVP_CIPHER_CTX_new();
++ EVP_CIPHER_CTX_init(stream_dec);
++ mac_ctx = HMAC_CTX_new();
++ HMAC_CTX_reset(mac_ctx);
+ }
+
+ SSLKey::~SSLKey() {
+@@ -268,12 +274,11 @@ SSLKey::~SSLKey() {
+ ivLength = 0;
+ buffer = 0;
+
+- EVP_CIPHER_CTX_cleanup(&block_enc);
+- EVP_CIPHER_CTX_cleanup(&block_dec);
+- EVP_CIPHER_CTX_cleanup(&stream_enc);
+- EVP_CIPHER_CTX_cleanup(&stream_dec);
+-
+- HMAC_CTX_cleanup(&mac_ctx);
++ EVP_CIPHER_CTX_free(block_enc);
++ EVP_CIPHER_CTX_free(block_dec);
++ EVP_CIPHER_CTX_free(stream_enc);
++ EVP_CIPHER_CTX_free(stream_dec);
++ HMAC_CTX_free(mac_ctx);
+
+ pthread_mutex_destroy(&mutex);
+ }
+@@ -290,27 +295,27 @@ void initKey(const std::shared_ptr<SSLKey> &key, const EVP_CIPHER *_blockCipher,
+ Lock lock(key->mutex);
+ // initialize the cipher context once so that we don't have to do it for
+ // every block..
+- EVP_EncryptInit_ex(&key->block_enc, _blockCipher, NULL, NULL, NULL);
+- EVP_DecryptInit_ex(&key->block_dec, _blockCipher, NULL, NULL, NULL);
+- EVP_EncryptInit_ex(&key->stream_enc, _streamCipher, NULL, NULL, NULL);
+- EVP_DecryptInit_ex(&key->stream_dec, _streamCipher, NULL, NULL, NULL);
+-
+- EVP_CIPHER_CTX_set_key_length(&key->block_enc, _keySize);
+- EVP_CIPHER_CTX_set_key_length(&key->block_dec, _keySize);
+- EVP_CIPHER_CTX_set_key_length(&key->stream_enc, _keySize);
+- EVP_CIPHER_CTX_set_key_length(&key->stream_dec, _keySize);
+-
+- EVP_CIPHER_CTX_set_padding(&key->block_enc, 0);
+- EVP_CIPHER_CTX_set_padding(&key->block_dec, 0);
+- EVP_CIPHER_CTX_set_padding(&key->stream_enc, 0);
+- EVP_CIPHER_CTX_set_padding(&key->stream_dec, 0);
+-
+- EVP_EncryptInit_ex(&key->block_enc, NULL, NULL, KeyData(key), NULL);
+- EVP_DecryptInit_ex(&key->block_dec, NULL, NULL, KeyData(key), NULL);
+- EVP_EncryptInit_ex(&key->stream_enc, NULL, NULL, KeyData(key), NULL);
+- EVP_DecryptInit_ex(&key->stream_dec, NULL, NULL, KeyData(key), NULL);
+-
+- HMAC_Init_ex(&key->mac_ctx, KeyData(key), _keySize, EVP_sha1(), 0);
++ EVP_EncryptInit_ex(key->block_enc, _blockCipher, NULL, NULL, NULL);
++ EVP_DecryptInit_ex(key->block_dec, _blockCipher, NULL, NULL, NULL);
++ EVP_EncryptInit_ex(key->stream_enc, _streamCipher, NULL, NULL, NULL);
++ EVP_DecryptInit_ex(key->stream_dec, _streamCipher, NULL, NULL, NULL);
++
++ EVP_CIPHER_CTX_set_key_length(key->block_enc, _keySize);
++ EVP_CIPHER_CTX_set_key_length(key->block_dec, _keySize);
++ EVP_CIPHER_CTX_set_key_length(key->stream_enc, _keySize);
++ EVP_CIPHER_CTX_set_key_length(key->stream_dec, _keySize);
++
++ EVP_CIPHER_CTX_set_padding(key->block_enc, 0);
++ EVP_CIPHER_CTX_set_padding(key->block_dec, 0);
++ EVP_CIPHER_CTX_set_padding(key->stream_enc, 0);
++ EVP_CIPHER_CTX_set_padding(key->stream_dec, 0);
++
++ EVP_EncryptInit_ex(key->block_enc, NULL, NULL, KeyData(key), NULL);
++ EVP_DecryptInit_ex(key->block_dec, NULL, NULL, KeyData(key), NULL);
++ EVP_EncryptInit_ex(key->stream_enc, NULL, NULL, KeyData(key), NULL);
++ EVP_DecryptInit_ex(key->stream_dec, NULL, NULL, KeyData(key), NULL);
++
++ HMAC_Init_ex(key->mac_ctx, KeyData(key), _keySize, EVP_sha1(), 0);
+ }
+
+ SSL_Cipher::SSL_Cipher(const Interface &iface_, const Interface &realIface_,
+@@ -451,8 +456,8 @@ static uint64_t _checksum_64(SSLKey *key, const unsigned char *data,
+ unsigned char md[EVP_MAX_MD_SIZE];
+ unsigned int mdLen = EVP_MAX_MD_SIZE;
+
+- HMAC_Init_ex(&key->mac_ctx, 0, 0, 0, 0);
+- HMAC_Update(&key->mac_ctx, data, dataLen);
++ HMAC_Init_ex(key->mac_ctx, 0, 0, 0, 0);
++ HMAC_Update(key->mac_ctx, data, dataLen);
+ if (chainedIV) {
+ // toss in the chained IV as well
+ uint64_t tmp = *chainedIV;
+@@ -462,10 +467,10 @@ static uint64_t _checksum_64(SSLKey *key, const unsigned char *data,
+ tmp >>= 8;
+ }
+
+- HMAC_Update(&key->mac_ctx, h, 8);
++ HMAC_Update(key->mac_ctx, h, 8);
+ }
+
+- HMAC_Final(&key->mac_ctx, md, &mdLen);
++ HMAC_Final(key->mac_ctx, md, &mdLen);
+
+ rAssert(mdLen >= 8);
+
+@@ -636,10 +641,10 @@ void SSL_Cipher::setIVec(unsigned char *ivec, uint64_t seed,
+ }
+
+ // combine ivec and seed with HMAC
+- HMAC_Init_ex(&key->mac_ctx, 0, 0, 0, 0);
+- HMAC_Update(&key->mac_ctx, ivec, _ivLength);
+- HMAC_Update(&key->mac_ctx, md, 8);
+- HMAC_Final(&key->mac_ctx, md, &mdLen);
++ HMAC_Init_ex(key->mac_ctx, 0, 0, 0, 0);
++ HMAC_Update(key->mac_ctx, ivec, _ivLength);
++ HMAC_Update(key->mac_ctx, md, 8);
++ HMAC_Final(key->mac_ctx, md, &mdLen);
+ rAssert(mdLen >= _ivLength);
+
+ memcpy(ivec, md, _ivLength);
+@@ -731,17 +736,17 @@ bool SSL_Cipher::streamEncode(unsigned char *buf, int size, uint64_t iv64,
+ shuffleBytes(buf, size);
+
+ setIVec(ivec, iv64, key);
+- EVP_EncryptInit_ex(&key->stream_enc, NULL, NULL, NULL, ivec);
+- EVP_EncryptUpdate(&key->stream_enc, buf, &dstLen, buf, size);
+- EVP_EncryptFinal_ex(&key->stream_enc, buf + dstLen, &tmpLen);
++ EVP_EncryptInit_ex(key->stream_enc, NULL, NULL, NULL, ivec);
++ EVP_EncryptUpdate(key->stream_enc, buf, &dstLen, buf, size);
++ EVP_EncryptFinal_ex(key->stream_enc, buf + dstLen, &tmpLen);
+
+ flipBytes(buf, size);
+ shuffleBytes(buf, size);
+
+ setIVec(ivec, iv64 + 1, key);
+- EVP_EncryptInit_ex(&key->stream_enc, NULL, NULL, NULL, ivec);
+- EVP_EncryptUpdate(&key->stream_enc, buf, &dstLen, buf, size);
+- EVP_EncryptFinal_ex(&key->stream_enc, buf + dstLen, &tmpLen);
++ EVP_EncryptInit_ex(key->stream_enc, NULL, NULL, NULL, ivec);
++ EVP_EncryptUpdate(key->stream_enc, buf, &dstLen, buf, size);
++ EVP_EncryptFinal_ex(key->stream_enc, buf + dstLen, &tmpLen);
+
+ dstLen += tmpLen;
+ if (dstLen != size) {
+@@ -765,17 +770,17 @@ bool SSL_Cipher::streamDecode(unsigned char *buf, int size, uint64_t iv64,
+ int dstLen = 0, tmpLen = 0;
+
+ setIVec(ivec, iv64 + 1, key);
+- EVP_DecryptInit_ex(&key->stream_dec, NULL, NULL, NULL, ivec);
+- EVP_DecryptUpdate(&key->stream_dec, buf, &dstLen, buf, size);
+- EVP_DecryptFinal_ex(&key->stream_dec, buf + dstLen, &tmpLen);
++ EVP_DecryptInit_ex(key->stream_dec, NULL, NULL, NULL, ivec);
++ EVP_DecryptUpdate(key->stream_dec, buf, &dstLen, buf, size);
++ EVP_DecryptFinal_ex(key->stream_dec, buf + dstLen, &tmpLen);
+
+ unshuffleBytes(buf, size);
+ flipBytes(buf, size);
+
+ setIVec(ivec, iv64, key);
+- EVP_DecryptInit_ex(&key->stream_dec, NULL, NULL, NULL, ivec);
+- EVP_DecryptUpdate(&key->stream_dec, buf, &dstLen, buf, size);
+- EVP_DecryptFinal_ex(&key->stream_dec, buf + dstLen, &tmpLen);
++ EVP_DecryptInit_ex(key->stream_dec, NULL, NULL, NULL, ivec);
++ EVP_DecryptUpdate(key->stream_dec, buf, &dstLen, buf, size);
++ EVP_DecryptFinal_ex(key->stream_dec, buf + dstLen, &tmpLen);
+
+ unshuffleBytes(buf, size);
+
+@@ -796,7 +801,7 @@ bool SSL_Cipher::blockEncode(unsigned char *buf, int size, uint64_t iv64,
+ rAssert(key->ivLength == _ivLength);
+
+ // data must be integer number of blocks
+- const int blockMod = size % EVP_CIPHER_CTX_block_size(&key->block_enc);
++ const int blockMod = size % EVP_CIPHER_CTX_block_size(key->block_enc);
+ if (blockMod != 0)
+ throw Error("Invalid data size, not multiple of block size");
+
+@@ -807,9 +812,9 @@ bool SSL_Cipher::blockEncode(unsigned char *buf, int size, uint64_t iv64,
+ int dstLen = 0, tmpLen = 0;
+ setIVec(ivec, iv64, key);
+
+- EVP_EncryptInit_ex(&key->block_enc, NULL, NULL, NULL, ivec);
+- EVP_EncryptUpdate(&key->block_enc, buf, &dstLen, buf, size);
+- EVP_EncryptFinal_ex(&key->block_enc, buf + dstLen, &tmpLen);
++ EVP_EncryptInit_ex(key->block_enc, NULL, NULL, NULL, ivec);
++ EVP_EncryptUpdate(key->block_enc, buf, &dstLen, buf, size);
++ EVP_EncryptFinal_ex(key->block_enc, buf + dstLen, &tmpLen);
+ dstLen += tmpLen;
+
+ if (dstLen != size) {
+@@ -828,7 +833,7 @@ bool SSL_Cipher::blockDecode(unsigned char *buf, int size, uint64_t iv64,
+ rAssert(key->ivLength == _ivLength);
+
+ // data must be integer number of blocks
+- const int blockMod = size % EVP_CIPHER_CTX_block_size(&key->block_dec);
++ const int blockMod = size % EVP_CIPHER_CTX_block_size(key->block_dec);
+ if (blockMod != 0)
+ throw Error("Invalid data size, not multiple of block size");
+
+@@ -839,9 +844,9 @@ bool SSL_Cipher::blockDecode(unsigned char *buf, int size, uint64_t iv64,
+ int dstLen = 0, tmpLen = 0;
+ setIVec(ivec, iv64, key);
+
+- EVP_DecryptInit_ex(&key->block_dec, NULL, NULL, NULL, ivec);
+- EVP_DecryptUpdate(&key->block_dec, buf, &dstLen, buf, size);
+- EVP_DecryptFinal_ex(&key->block_dec, buf + dstLen, &tmpLen);
++ EVP_DecryptInit_ex(key->block_dec, NULL, NULL, NULL, ivec);
++ EVP_DecryptUpdate(key->block_dec, buf, &dstLen, buf, size);
++ EVP_DecryptFinal_ex(key->block_dec, buf + dstLen, &tmpLen);
+ dstLen += tmpLen;
+
+ if (dstLen != size) {
+diff --git a/encfs/SSL_Compat.h b/encfs/SSL_Compat.h
+new file mode 100644
+index 0000000..f7b1629
+--- /dev/null
++++ b/encfs/SSL_Compat.h
+@@ -0,0 +1,52 @@
++/*****************************************************************************
++ * Author: Rogelio Dominguez Hernandez <rogelio.dominguez@gmail.com>
++ *
++ *****************************************************************************
++ * Copyright (c) 2016, Rogelio Dominguez Hernandez
++ *
++ * This program is free software: you can redistribute it and/or modify it
++ * under the terms of the GNU Lesser General Public License as published by the
++ * Free Software Foundation, either version 3 of the License, or (at your
++ * option) any later version.
++ *
++ * This program is distributed in the hope that it will be useful, but WITHOUT
++ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
++ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
++ * for more details.
++ *
++ * You should have received a copy of the GNU Lesser General Public License
++ * along with this program. If not, see <http://www.gnu.org/licenses/>.
++ */
++
++#ifndef _SSL_Compat_incl_
++#define _SSL_Compat_incl_
++
++// OpenSSL < 1.1.0
++#if OPENSSL_VERSION_NUMBER < 0x10100000L
++
++// Equivalent methods
++#define EVP_MD_CTX_new EVP_MD_CTX_create
++#define EVP_MD_CTX_free EVP_MD_CTX_destroy
++#define HMAC_CTX_reset HMAC_CTX_cleanup
++
++// Missing methods (based on 1.1.0 versions)
++HMAC_CTX *HMAC_CTX_new(void)
++{
++ HMAC_CTX *ctx = (HMAC_CTX *)OPENSSL_malloc(sizeof(HMAC_CTX));
++ if (ctx != NULL) {
++ memset(ctx, 0, sizeof(HMAC_CTX));
++ HMAC_CTX_reset(ctx);
++ }
++ return ctx;
++}
++
++void HMAC_CTX_free(HMAC_CTX *ctx)
++{
++ if (ctx != NULL) {
++ HMAC_CTX_cleanup(ctx);
++ OPENSSL_free(ctx);
++ }
++}
++#endif
++
++#endif
+diff --git a/encfs/encfssh b/encfs/encfssh
+old mode 100755
+new mode 100644
+
diff --git a/system/encfs/encfs.SlackBuild b/system/encfs/encfs.SlackBuild
index 01958f3b0f28e..aaf0e3538f7fd 100644
--- a/system/encfs/encfs.SlackBuild
+++ b/system/encfs/encfs.SlackBuild
@@ -2,7 +2,7 @@
# Slackware build script for encfs
-# Copyright 2007-2016 Heinz Wiesinger, Amsterdam, The Netherlands
+# Copyright 2007-2017 Heinz Wiesinger, Amsterdam, The Netherlands
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
@@ -23,7 +23,7 @@
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
PRGNAM=encfs
-VERSION=${VERSION:-1.8.1}
+VERSION=${VERSION:-1.9.1}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
@@ -69,28 +69,32 @@ find -L . \
\( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
-o -perm 440 -o -perm 400 \) -exec chmod 644 {} \;
-autoreconf -vif
+# Fix building against openssl 1.1
+patch -p1 -i $CWD/encfs-openssl-1.1.patch
-CFLAGS="$SLKCFLAGS" \
-CXXFLAGS="$SLKCFLAGS" \
-./configure \
- --prefix=/usr \
- --libdir=/usr/lib$LIBDIRSUFFIX \
- --sysconfdir=/etc \
- --localstatedir=/var \
- --mandir=/usr/man \
- --with-boost-libdir=/usr/lib$LIBDIRSUFFIX \
- --disable-static \
- --build=$ARCH-slackware-linux
+mkdir -p build
+cd build
+ cmake \
+ -DCMAKE_C_FLAGS:STRING="$SLKCFLAGS" \
+ -DCMAKE_CXX_FLAGS:STRING="$SLKCFLAGS" \
+ -DCMAKE_INSTALL_PREFIX=/usr \
+ -DLIB_INSTALL_DIR=lib$LIBDIRSUFFIX \
+ -DCMAKE_BUILD_TYPE=Release \
+ -DUSE_INTERNAL_TINYXML=OFF \
+ -DINSTALL_LIBENCFS=ON \
+ -DBUILD_SHARED_LIBS=ON \
+ ..
+ make
+ make install/strip DESTDIR=$PKG
+cd -
-make
-make install-strip DESTDIR=$PKG
+mv $PKG/usr/share/man $PKG/usr/man
find $PKG/usr/man -type f -exec gzip -9 {} \;
mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
cp -a AUTHORS ChangeLog COPYING* INSTALL.md PERFORMANCE.md README.md \
- README-NLS TRANSLATORS \
+ README-NLS \
$PKG/usr/doc/$PRGNAM-$VERSION
cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
diff --git a/system/encfs/encfs.info b/system/encfs/encfs.info
index 6db8540003b50..dbdbeeeaa909a 100644
--- a/system/encfs/encfs.info
+++ b/system/encfs/encfs.info
@@ -1,10 +1,10 @@
PRGNAM="encfs"
-VERSION="1.8.1"
+VERSION="1.9.1"
HOMEPAGE="https://vgough.github.io/encfs/"
-DOWNLOAD="https://github.com/vgough/encfs/releases/download/v1.8.1/encfs-1.8.1.tar.gz"
-MD5SUM="f8365378ab7c0d493e04f4e98ae7eb4e"
+DOWNLOAD="https://github.com/vgough/encfs/releases/download/v1.9.1/encfs-1.9.1.tar.gz"
+MD5SUM="7cbf9cc3c5af49b46703ce6ba70d22a4"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
-REQUIRES="rlog"
+REQUIRES="tinyxml2"
MAINTAINER="Heinz Wiesinger"
EMAIL="pprkut@liwjatan.at"