summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Black <dragonheart@gentoo.org>2005-06-23 13:07:26 +0000
committerDaniel Black <dragonheart@gentoo.org>2005-06-23 13:07:26 +0000
commitee16dd8f483e40715aae74280e822dcea29b7331 (patch)
tree00f274355a3bd5b3edbd36a7b349db81c37fbac8 /app-crypt/tpm-emulator
parentCorrect dependency on lcms (#96851). (diff)
downloadgentoo-2-ee16dd8f483e40715aae74280e822dcea29b7331.tar.gz
gentoo-2-ee16dd8f483e40715aae74280e822dcea29b7331.tar.bz2
gentoo-2-ee16dd8f483e40715aae74280e822dcea29b7331.zip
initial import
(Portage version: 2.0.51.22-r1)
Diffstat (limited to 'app-crypt/tpm-emulator')
-rw-r--r--app-crypt/tpm-emulator/ChangeLog11
-rw-r--r--app-crypt/tpm-emulator/Manifest3
-rw-r--r--app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a1
-rw-r--r--app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch148
-rw-r--r--app-crypt/tpm-emulator/metadata.xml9
-rw-r--r--app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild43
6 files changed, 215 insertions, 0 deletions
diff --git a/app-crypt/tpm-emulator/ChangeLog b/app-crypt/tpm-emulator/ChangeLog
new file mode 100644
index 000000000000..e27080e64190
--- /dev/null
+++ b/app-crypt/tpm-emulator/ChangeLog
@@ -0,0 +1,11 @@
+# ChangeLog for app-crypt/tpm-emulator
+# Copyright 1999-2005 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/app-crypt/tpm-emulator/ChangeLog,v 1.1 2005/06/23 13:07:26 dragonheart Exp $
+
+*tpm-emulator-0.2a (23 Jun 2005)
+
+ 23 Jun 2005; Daniel Black <dragonheart@gentoo.org>
+ +files/tpm-emulator-0.2a-inline.patch, +metadata.xml,
+ +tpm-emulator-0.2a.ebuild:
+ initial import
+
diff --git a/app-crypt/tpm-emulator/Manifest b/app-crypt/tpm-emulator/Manifest
new file mode 100644
index 000000000000..08aec170c57c
--- /dev/null
+++ b/app-crypt/tpm-emulator/Manifest
@@ -0,0 +1,3 @@
+MD5 b911d9e591c4d65fc50476a61b4590c9 tpm-emulator-0.2a.ebuild 851
+MD5 b4b60f2d1cc35dd8e7c59c6762ef9468 files/digest-tpm-emulator-0.2a 69
+MD5 fd008890558a0afd90c7f0af8dcc3907 files/tpm-emulator-0.2a-inline.patch 5243
diff --git a/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a b/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a
new file mode 100644
index 000000000000..ce23014d16c7
--- /dev/null
+++ b/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a
@@ -0,0 +1 @@
+MD5 e58fc0cf77348d30ba7cbeacce20eefc tpm_emulator-0.2a.tar.gz 100306
diff --git a/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch b/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch
new file mode 100644
index 000000000000..ebeb271db8c2
--- /dev/null
+++ b/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch
@@ -0,0 +1,148 @@
+--- tpm_marshalling.c.orig 2005-05-07 17:57:21.000000000 +1000
++++ tpm_marshalling.c 2005-06-23 21:46:08.000000000 +1000
+@@ -20,7 +20,7 @@
+ #include "crypto/rsa.h"
+ #include "linux_module.h"
+
+-inline int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v)
++ int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v)
+ {
+ if (*length < 1) return -1;
+ **ptr = v;
+@@ -28,7 +28,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v)
++ int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v)
+ {
+ if (*length < 1) return -1;
+ *v = **ptr;
+@@ -36,7 +36,7 @@
+ return 0;
+ }
+
+-inline int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v)
++ int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v)
+ {
+ if (*length < 2) return -1;
+ **(UINT16**)ptr = CPU_TO_BE16(v);
+@@ -44,7 +44,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v)
++ int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v)
+ {
+ if (*length < 2) return -1;
+ *v = BE16_TO_CPU(**(UINT16**)ptr);
+@@ -52,7 +52,7 @@
+ return 0;
+ }
+
+-inline int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v)
++ int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v)
+ {
+ if (*length < 4) return -1;
+ **(UINT32**)ptr = CPU_TO_BE32(v);
+@@ -60,7 +60,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v)
++ int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v)
+ {
+ if (*length < 4) return -1;
+ *v = BE32_TO_CPU(**(UINT32**)ptr);
+@@ -68,7 +68,7 @@
+ return 0;
+ }
+
+-inline int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v)
++ int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v)
+ {
+ if (*length < 8) return -1;
+ **(UINT64**)ptr = CPU_TO_BE64(v);
+@@ -76,7 +76,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v)
++ int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v)
+ {
+ if (*length < 8) return -1;
+ *v = BE64_TO_CPU(**(UINT64**)ptr);
+@@ -84,7 +84,7 @@
+ return 0;
+ }
+
+-inline int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length,
++ int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length,
+ BYTE *b, UINT32 b_length)
+ {
+ if (*ptr_length < b_length) return -1;
+@@ -93,7 +93,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length,
++ int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length,
+ BYTE **b, UINT32 b_length)
+ {
+ if (*ptr_length < b_length) return -1;
+@@ -102,7 +102,7 @@
+ return 0;
+ }
+
+-inline int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length,
++ int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length,
+ BYTE *b, UINT32 b_length)
+ {
+ if (*ptr_length < b_length) return -1;
+@@ -111,7 +111,7 @@
+ return 0;
+ }
+
+-inline int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length,
++ int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length,
+ BYTE *b, UINT32 b_length)
+ {
+ if (*ptr_length < b_length) return -1;
+--- tpm_marshalling.h.orig 2005-05-07 17:57:21.000000000 +1000
++++ tpm_marshalling.h 2005-06-23 21:46:08.000000000 +1000
+@@ -56,23 +56,23 @@
+ * returned and the values of ptr and length are undefined.
+ */
+
+-inline int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v);
+-inline int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v);
++ int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v);
++ int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v);
+
+-inline int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v);
+-inline int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v);
++ int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v);
++ int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v);
+
+-inline int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v);
+-inline int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v);
++ int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v);
++ int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v);
+
+-inline int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v);
+-inline int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v);
++ int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v);
++ int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v);
+
+-inline int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
+-inline int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE **b, UINT32 b_length);
++ int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
++ int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE **b, UINT32 b_length);
+
+-inline int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
+-inline int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
++ int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
++ int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length);
+
+ #define tpm_marshal_BOOL tpm_marshal_BYTE
+ #define tpm_unmarshal_BOOL tpm_unmarshal_BYTE
diff --git a/app-crypt/tpm-emulator/metadata.xml b/app-crypt/tpm-emulator/metadata.xml
new file mode 100644
index 000000000000..61e19f95d1e7
--- /dev/null
+++ b/app-crypt/tpm-emulator/metadata.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <herd>crypto</herd>
+ <maintainer>
+ <email>crypto@gentoo.org</email>
+ <name>Crypto Herd</name>
+ </maintainer>
+</pkgmetadata>
diff --git a/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild b/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild
new file mode 100644
index 000000000000..41fb3d59efd4
--- /dev/null
+++ b/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild
@@ -0,0 +1,43 @@
+# Copyright 1999-2005 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild,v 1.1 2005/06/23 13:07:26 dragonheart Exp $
+
+inherit toolchain-funcs linux-mod eutils
+
+MY_P=${P/-/_}
+DESCRIPTION="Emulator driver for tpm"
+HOMEPAGE="https://developer.berlios.de/projects/tpm-emulator"
+
+SRC_URI="http://download.berlios.de/tpm-emulator/${MY_P}.tar.gz"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~x86"
+IUSE=""
+DEPEND="dev-libs/gmp"
+RDEPEND=""
+S=${WORKDIR}/${PN/-/_}-0.2
+
+
+MODULE_NAMES="tpm_emulator(crypt:)"
+BUILD_TARGETS="all"
+BUILD_PARAMS="-j1 CC=$(tc-getCC) MODULE=tpm_emulator.${KV_OBJ} USE_GMP=/usr/lib/libgmp.a"
+
+# INCLUDE="${CFLAGS}"
+
+src_unpack() {
+ unpack ${A}
+ cd ${S}/tpm
+ epatch ${FILESDIR}/${P}-inline.patch
+}
+
+src_install() {
+ linux-mod_src_install
+ dodoc README
+}
+
+pkg_postinst() {
+ linux-mod_pkg_postinst
+ einfo 'when starting for the first time:'
+ einfo 'modprobe tpm_emulator startup="clear"'
+}