Mon Jul 14 17:20:35 2008 UTC ()
update to 2.22.3
changes:
-Better initization of (non-crypto) random number generator
-Build fixes


(drochner)
diff -r1.37 -r1.38 pkgsrc/security/gnome-keyring/Makefile
diff -r1.27 -r1.28 pkgsrc/security/gnome-keyring/distinfo
diff -r1.4 -r1.5 pkgsrc/security/gnome-keyring/patches/patch-ad

cvs diff -r1.37 -r1.38 pkgsrc/security/gnome-keyring/Makefile (expand / switch to unified diff)

--- pkgsrc/security/gnome-keyring/Makefile 2008/05/29 10:47:52 1.37
+++ pkgsrc/security/gnome-keyring/Makefile 2008/07/14 17:20:35 1.38
@@ -1,16 +1,16 @@ @@ -1,16 +1,16 @@
1# $NetBSD: Makefile,v 1.37 2008/05/29 10:47:52 drochner Exp $ 1# $NetBSD: Makefile,v 1.38 2008/07/14 17:20:35 drochner Exp $
2 2
3DISTNAME= gnome-keyring-2.22.2 3DISTNAME= gnome-keyring-2.22.3
4CATEGORIES= security gnome 4CATEGORIES= security gnome
5MASTER_SITES= ${MASTER_SITE_GNOME:=sources/gnome-keyring/2.22/} 5MASTER_SITES= ${MASTER_SITE_GNOME:=sources/gnome-keyring/2.22/}
6EXTRACT_SUFX= .tar.bz2 6EXTRACT_SUFX= .tar.bz2
7 7
8MAINTAINER= pkgsrc-users@NetBSD.org 8MAINTAINER= pkgsrc-users@NetBSD.org
9HOMEPAGE= http://www.gnome.org/ 9HOMEPAGE= http://www.gnome.org/
10COMMENT= GNOME password and secret manager 10COMMENT= GNOME password and secret manager
11 11
12PKG_DESTDIR_SUPPORT= user-destdir 12PKG_DESTDIR_SUPPORT= user-destdir
13 13
14USE_TOOLS+= gmake intltool msgfmt pkg-config 14USE_TOOLS+= gmake intltool msgfmt pkg-config
15GNU_CONFIGURE= YES 15GNU_CONFIGURE= YES
16USE_LIBTOOL= YES 16USE_LIBTOOL= YES

cvs diff -r1.27 -r1.28 pkgsrc/security/gnome-keyring/distinfo (expand / switch to unified diff)

--- pkgsrc/security/gnome-keyring/distinfo 2008/05/30 13:55:48 1.27
+++ pkgsrc/security/gnome-keyring/distinfo 2008/07/14 17:20:35 1.28
@@ -1,9 +1,9 @@ @@ -1,9 +1,9 @@
1$NetBSD: distinfo,v 1.27 2008/05/30 13:55:48 tron Exp $ 1$NetBSD: distinfo,v 1.28 2008/07/14 17:20:35 drochner Exp $
2 2
3SHA1 (gnome-keyring-2.22.2.tar.bz2) = b3276e2c349b761d167df9bdbb9c19268af2bd4b 3SHA1 (gnome-keyring-2.22.3.tar.bz2) = 0f52095590a684920cc683d1985ac66263702114
4RMD160 (gnome-keyring-2.22.2.tar.bz2) = 9fcf9bee654050ca7f762b5d50e98ef690e8409e 4RMD160 (gnome-keyring-2.22.3.tar.bz2) = 551f4a4d734e0196522be9276ae7e76110a96556
5Size (gnome-keyring-2.22.2.tar.bz2) = 904890 bytes 5Size (gnome-keyring-2.22.3.tar.bz2) = 894308 bytes
6SHA1 (patch-aa) = fff624c298f901bb1a81ac7ad4d781cae5a4cff2 6SHA1 (patch-aa) = fff624c298f901bb1a81ac7ad4d781cae5a4cff2
7SHA1 (patch-ab) = c6fc864a34ae6ccb0fdf891082146f451203494c 7SHA1 (patch-ab) = c6fc864a34ae6ccb0fdf891082146f451203494c
8SHA1 (patch-ac) = 550b4ebfdf9ae7653d0174e6857e32c8453f2ca7 8SHA1 (patch-ac) = 550b4ebfdf9ae7653d0174e6857e32c8453f2ca7
9SHA1 (patch-ad) = 469c84aa349e015675848e8dff6bb3b0e4a888b6 9SHA1 (patch-ad) = b251bb0479a527f18822de67a0cb0af267f5ee60

cvs diff -r1.4 -r1.5 pkgsrc/security/gnome-keyring/patches/Attic/patch-ad (expand / switch to unified diff)

--- pkgsrc/security/gnome-keyring/patches/Attic/patch-ad 2008/05/30 13:55:48 1.4
+++ pkgsrc/security/gnome-keyring/patches/Attic/patch-ad 2008/07/14 17:20:35 1.5
@@ -1,23 +1,12 @@ @@ -1,23 +1,12 @@
1$NetBSD: patch-ad,v 1.4 2008/05/30 13:55:48 tron Exp $ 1$NetBSD: patch-ad,v 1.5 2008/07/14 17:20:35 drochner Exp $
2 2
3--- common/gkr-unix-credentials.c.orig 2008-05-26 17:03:16.000000000 +0100 3--- common/gkr-unix-credentials.c.orig 2008-06-30 17:27:42.000000000 +0200
4+++ common/gkr-unix-credentials.c 2008-05-30 14:38:01.000000000 +0100 4+++ common/gkr-unix-credentials.c
5@@ -126,7 +126,6 @@ 5@@ -126,7 +126,6 @@ gkr_unix_credentials_read (int sock, pid
6 cred = (struct sockcred *) CMSG_DATA (&cmsg.hdr); 6 cred = (struct sockcred *) CMSG_DATA (&cmsg.hdr);
7 *pid = 0; 7 *pid = 0;
8 *uid = cred->sc_euid; 8 *uid = cred->sc_euid;
9- set_local_creds(sock, FALSE); 9- set_local_creds(sock, 0);
10 #elif defined(HAVE_GETPEEREID) /* OpenBSD */ 10 #elif defined(HAVE_GETPEEREID) /* OpenBSD */
11 uid_t euid; 11 uid_t euid;
12 gid_t egid; 12 gid_t egid;
13@@ -135,8 +134,8 @@ 
14 if (getpeereid (sock, &euid, &egid) == 0) { 
15 *uid = euid; 
16 } else { 
17- g_warning ("getpeereid() failed: %s", strerror (errno)); 
18- return FALSE; 
19+ fprintf (stderr, "getpeereid() failed: %s", strerror (errno)); 
20+ return -1; 
21 } 
22 #elif defined(HAVE_GETPEERUCRED) 
23 ucred_t *uc = NULL;