From ee16dd8f483e40715aae74280e822dcea29b7331 Mon Sep 17 00:00:00 2001 From: Daniel Black Date: Thu, 23 Jun 2005 13:07:26 +0000 Subject: initial import (Portage version: 2.0.51.22-r1) --- app-crypt/tpm-emulator/ChangeLog | 11 ++ app-crypt/tpm-emulator/Manifest | 3 + .../tpm-emulator/files/digest-tpm-emulator-0.2a | 1 + .../files/tpm-emulator-0.2a-inline.patch | 148 +++++++++++++++++++++ app-crypt/tpm-emulator/metadata.xml | 9 ++ app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild | 43 ++++++ 6 files changed, 215 insertions(+) create mode 100644 app-crypt/tpm-emulator/ChangeLog create mode 100644 app-crypt/tpm-emulator/Manifest create mode 100644 app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a create mode 100644 app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch create mode 100644 app-crypt/tpm-emulator/metadata.xml create mode 100644 app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild (limited to 'app-crypt/tpm-emulator') diff --git a/app-crypt/tpm-emulator/ChangeLog b/app-crypt/tpm-emulator/ChangeLog new file mode 100644 index 000000000000..e27080e64190 --- /dev/null +++ b/app-crypt/tpm-emulator/ChangeLog @@ -0,0 +1,11 @@ +# ChangeLog for app-crypt/tpm-emulator +# Copyright 1999-2005 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/app-crypt/tpm-emulator/ChangeLog,v 1.1 2005/06/23 13:07:26 dragonheart Exp $ + +*tpm-emulator-0.2a (23 Jun 2005) + + 23 Jun 2005; Daniel Black + +files/tpm-emulator-0.2a-inline.patch, +metadata.xml, + +tpm-emulator-0.2a.ebuild: + initial import + diff --git a/app-crypt/tpm-emulator/Manifest b/app-crypt/tpm-emulator/Manifest new file mode 100644 index 000000000000..08aec170c57c --- /dev/null +++ b/app-crypt/tpm-emulator/Manifest @@ -0,0 +1,3 @@ +MD5 b911d9e591c4d65fc50476a61b4590c9 tpm-emulator-0.2a.ebuild 851 +MD5 b4b60f2d1cc35dd8e7c59c6762ef9468 files/digest-tpm-emulator-0.2a 69 +MD5 fd008890558a0afd90c7f0af8dcc3907 files/tpm-emulator-0.2a-inline.patch 5243 diff --git a/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a b/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a new file mode 100644 index 000000000000..ce23014d16c7 --- /dev/null +++ b/app-crypt/tpm-emulator/files/digest-tpm-emulator-0.2a @@ -0,0 +1 @@ +MD5 e58fc0cf77348d30ba7cbeacce20eefc tpm_emulator-0.2a.tar.gz 100306 diff --git a/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch b/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch new file mode 100644 index 000000000000..ebeb271db8c2 --- /dev/null +++ b/app-crypt/tpm-emulator/files/tpm-emulator-0.2a-inline.patch @@ -0,0 +1,148 @@ +--- tpm_marshalling.c.orig 2005-05-07 17:57:21.000000000 +1000 ++++ tpm_marshalling.c 2005-06-23 21:46:08.000000000 +1000 +@@ -20,7 +20,7 @@ + #include "crypto/rsa.h" + #include "linux_module.h" + +-inline int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v) ++ int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v) + { + if (*length < 1) return -1; + **ptr = v; +@@ -28,7 +28,7 @@ + return 0; + } + +-inline int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v) ++ int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v) + { + if (*length < 1) return -1; + *v = **ptr; +@@ -36,7 +36,7 @@ + return 0; + } + +-inline int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v) ++ int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v) + { + if (*length < 2) return -1; + **(UINT16**)ptr = CPU_TO_BE16(v); +@@ -44,7 +44,7 @@ + return 0; + } + +-inline int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v) ++ int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v) + { + if (*length < 2) return -1; + *v = BE16_TO_CPU(**(UINT16**)ptr); +@@ -52,7 +52,7 @@ + return 0; + } + +-inline int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v) ++ int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v) + { + if (*length < 4) return -1; + **(UINT32**)ptr = CPU_TO_BE32(v); +@@ -60,7 +60,7 @@ + return 0; + } + +-inline int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v) ++ int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v) + { + if (*length < 4) return -1; + *v = BE32_TO_CPU(**(UINT32**)ptr); +@@ -68,7 +68,7 @@ + return 0; + } + +-inline int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v) ++ int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v) + { + if (*length < 8) return -1; + **(UINT64**)ptr = CPU_TO_BE64(v); +@@ -76,7 +76,7 @@ + return 0; + } + +-inline int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v) ++ int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v) + { + if (*length < 8) return -1; + *v = BE64_TO_CPU(**(UINT64**)ptr); +@@ -84,7 +84,7 @@ + return 0; + } + +-inline int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, ++ int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, + BYTE *b, UINT32 b_length) + { + if (*ptr_length < b_length) return -1; +@@ -93,7 +93,7 @@ + return 0; + } + +-inline int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, ++ int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, + BYTE **b, UINT32 b_length) + { + if (*ptr_length < b_length) return -1; +@@ -102,7 +102,7 @@ + return 0; + } + +-inline int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, ++ int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, + BYTE *b, UINT32 b_length) + { + if (*ptr_length < b_length) return -1; +@@ -111,7 +111,7 @@ + return 0; + } + +-inline int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, ++ int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, + BYTE *b, UINT32 b_length) + { + if (*ptr_length < b_length) return -1; +--- tpm_marshalling.h.orig 2005-05-07 17:57:21.000000000 +1000 ++++ tpm_marshalling.h 2005-06-23 21:46:08.000000000 +1000 +@@ -56,23 +56,23 @@ + * returned and the values of ptr and length are undefined. + */ + +-inline int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v); +-inline int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v); ++ int tpm_marshal_BYTE(BYTE **ptr, UINT32 *length, BYTE v); ++ int tpm_unmarshal_BYTE(BYTE **ptr, UINT32 *length, BYTE *v); + +-inline int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v); +-inline int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v); ++ int tpm_marshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 v); ++ int tpm_unmarshal_UINT16(BYTE **ptr, UINT32 *length, UINT16 *v); + +-inline int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v); +-inline int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v); ++ int tpm_marshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 v); ++ int tpm_unmarshal_UINT32(BYTE **ptr, UINT32 *length, UINT32 *v); + +-inline int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v); +-inline int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v); ++ int tpm_marshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 v); ++ int tpm_unmarshal_UINT64(BYTE **ptr, UINT32 *length, UINT64 *v); + +-inline int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); +-inline int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE **b, UINT32 b_length); ++ int tpm_marshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); ++ int tpm_unmarshal_BLOB(BYTE **ptr, UINT32 *ptr_length, BYTE **b, UINT32 b_length); + +-inline int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); +-inline int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); ++ int tpm_marshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); ++ int tpm_unmarshal_BYTE_ARRAY(BYTE **ptr, UINT32 *ptr_length, BYTE *b, UINT32 b_length); + + #define tpm_marshal_BOOL tpm_marshal_BYTE + #define tpm_unmarshal_BOOL tpm_unmarshal_BYTE diff --git a/app-crypt/tpm-emulator/metadata.xml b/app-crypt/tpm-emulator/metadata.xml new file mode 100644 index 000000000000..61e19f95d1e7 --- /dev/null +++ b/app-crypt/tpm-emulator/metadata.xml @@ -0,0 +1,9 @@ + + + + crypto + + crypto@gentoo.org + Crypto Herd + + diff --git a/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild b/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild new file mode 100644 index 000000000000..41fb3d59efd4 --- /dev/null +++ b/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild @@ -0,0 +1,43 @@ +# Copyright 1999-2005 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-crypt/tpm-emulator/tpm-emulator-0.2a.ebuild,v 1.1 2005/06/23 13:07:26 dragonheart Exp $ + +inherit toolchain-funcs linux-mod eutils + +MY_P=${P/-/_} +DESCRIPTION="Emulator driver for tpm" +HOMEPAGE="https://developer.berlios.de/projects/tpm-emulator" + +SRC_URI="http://download.berlios.de/tpm-emulator/${MY_P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~x86" +IUSE="" +DEPEND="dev-libs/gmp" +RDEPEND="" +S=${WORKDIR}/${PN/-/_}-0.2 + + +MODULE_NAMES="tpm_emulator(crypt:)" +BUILD_TARGETS="all" +BUILD_PARAMS="-j1 CC=$(tc-getCC) MODULE=tpm_emulator.${KV_OBJ} USE_GMP=/usr/lib/libgmp.a" + +# INCLUDE="${CFLAGS}" + +src_unpack() { + unpack ${A} + cd ${S}/tpm + epatch ${FILESDIR}/${P}-inline.patch +} + +src_install() { + linux-mod_src_install + dodoc README +} + +pkg_postinst() { + linux-mod_pkg_postinst + einfo 'when starting for the first time:' + einfo 'modprobe tpm_emulator startup="clear"' +} -- cgit v1.2.3-65-gdbad