summaryrefslogtreecommitdiff
path: root/security/gringotts/files
diff options
context:
space:
mode:
authorAnders Nordby <anders@FreeBSD.org>2002-07-06 16:54:46 +0000
committerAnders Nordby <anders@FreeBSD.org>2002-07-06 16:54:46 +0000
commit000c89ee2ea50a57623fd5554053da50e10696c4 (patch)
treee0300b6981c1476a4bf8b9e494379561911b46cf /security/gringotts/files
parentfix MAINTAINER (diff)
Add gringotts, a GTK application for securely storing sensitive data.
Notes
Notes: svn path=/head/; revision=62522
Diffstat (limited to 'security/gringotts/files')
-rw-r--r--security/gringotts/files/gnomeless-Makefile.in11
-rw-r--r--security/gringotts/files/patch-Makefile.in16
-rw-r--r--security/gringotts/files/patch-grg_safe.c49
-rw-r--r--security/gringotts/files/patch-gringotts.in10
-rw-r--r--security/gringotts/files/patch-src-Makefile.in10
5 files changed, 96 insertions, 0 deletions
diff --git a/security/gringotts/files/gnomeless-Makefile.in b/security/gringotts/files/gnomeless-Makefile.in
new file mode 100644
index 000000000000..2716116e739e
--- /dev/null
+++ b/security/gringotts/files/gnomeless-Makefile.in
@@ -0,0 +1,11 @@
+--- Makefile.in.orig Sat Jul 6 16:04:36 2002
++++ Makefile.in Sat Jul 6 16:05:17 2002
+@@ -366,7 +366,7 @@
+ install-data: install-data-recursive
+
+ install-am: all-am
+- @$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
++ @$(MAKE) $(AM_MAKEFLAGS) install-exec-am
+ install: install-recursive
+ uninstall-am: uninstall-DsktpDATA uninstall-local
+ uninstall: uninstall-recursive
diff --git a/security/gringotts/files/patch-Makefile.in b/security/gringotts/files/patch-Makefile.in
new file mode 100644
index 000000000000..deeb568ee4be
--- /dev/null
+++ b/security/gringotts/files/patch-Makefile.in
@@ -0,0 +1,16 @@
+--- Makefile.in.orig Sun Jun 16 19:04:42 2002
++++ Makefile.in Fri Jul 5 18:39:27 2002
+@@ -440,10 +440,10 @@
+ @echo
+ @echo
+ @echo ----------------------------------------------------------------------
+- @echo md5sum of relevant files:
++ @echo md5 checksum of relevant files:
+ @echo
+- @md5sum $(DESTDIR)$(bindir)/gringotts-bin|(read A B; echo $$B ": " $$A)
+- @md5sum $(DESTDIR)$(libdir)/libgringotts.so|(read A B; echo $$B ": " $$A)
++ @md5 $(DESTDIR)$(bindir)/gringotts-bin|(read A B; echo $$B ": " $$A)
++ @md5 $(DESTDIR)$(libdir)/libgringotts.so|(read A B; echo $$B ": " $$A)
+ @echo
+ @echo use these values to check program integrity at any time
+ @echo ----------------------------------------------------------------------
diff --git a/security/gringotts/files/patch-grg_safe.c b/security/gringotts/files/patch-grg_safe.c
new file mode 100644
index 000000000000..eb2e024ffdaf
--- /dev/null
+++ b/security/gringotts/files/patch-grg_safe.c
@@ -0,0 +1,49 @@
+--- src/grg_safe.c.orig Sun Jun 16 18:41:21 2002
++++ src/grg_safe.c Fri Jul 5 19:12:36 2002
+@@ -24,13 +24,16 @@
+ #include <stdlib.h>
+ #include <stdio.h>
+ #include <string.h>
++#include <sys/types.h>
+ #include <regex.h>
+ #include <unistd.h>
+ #include <fcntl.h>
+ #include <unistd.h>
+ #include <sys/mman.h>
++#ifdef HAVE_SYS_FSUID_H
+ #include <sys/fsuid.h>
+-#include <sys/types.h>
++#endif
++#include <sys/mman.h>
+
+ #include <gtk/gtk.h>
+ #include <gdk-pixbuf/gdk-pixbuf.h>
+@@ -131,12 +134,12 @@
+ if (!geteuid())
+ //the process is SUID root. I can mlockall() the memory in order to avoid swapping.
+ {
+- gint res = mlockall (MCL_FUTURE);
++// gint res = mlockall (MCL_FUTURE);
+
+- if (res)
+- g_critical ("%s", _("The process is setuid root, but I can't lock memory paging"));
+- else
+- mem_safe = TRUE;
++// if (res)
++// g_critical ("%s", _("The process is setuid root, but I can't lock memory paging"));
++// else
++// mem_safe = TRUE;
+
+ //drop root privileges
+ setuid(getuid());
+@@ -181,8 +184,8 @@
+
+ if (ulimit != '0')
+ {
+- g_critical ("%s", _("Your shell is configured to produce core dumps. I cannot go on. Please run gringotts via its shell script."));
+- return FALSE;
++ g_critical ("%s", _("Your shell is configured to produce core dumps."));
++// return FALSE;
+ }
+
+ //checks that stderr, stdin & stdout are opened
diff --git a/security/gringotts/files/patch-gringotts.in b/security/gringotts/files/patch-gringotts.in
new file mode 100644
index 000000000000..39352c86647d
--- /dev/null
+++ b/security/gringotts/files/patch-gringotts.in
@@ -0,0 +1,10 @@
+--- src/gringotts.in.orig Sat Apr 20 14:49:15 2002
++++ src/gringotts.in Fri Jul 5 19:09:14 2002
+@@ -1,5 +1,5 @@
+-#! /bin/bash
++#! /bin/sh
+ CORE_LIMIT=`ulimit -Sc`
+ ulimit -Sc 0
+-@bindir@/gringotts-bin "$@"
++gringotts-bin "$@"
+ ulimit -Sc $CORE_LIMIT
diff --git a/security/gringotts/files/patch-src-Makefile.in b/security/gringotts/files/patch-src-Makefile.in
new file mode 100644
index 000000000000..7973324e8880
--- /dev/null
+++ b/security/gringotts/files/patch-src-Makefile.in
@@ -0,0 +1,10 @@
+--- src/Makefile.in.orig Sun Jun 16 19:04:43 2002
++++ src/Makefile.in Sat Jul 6 16:55:20 2002
+@@ -417,7 +417,6 @@
+ install-exec-local: gringotts
+ strip $(DESTDIR)$(bindir)/gringotts-bin
+ cp gringotts $(DESTDIR)$(bindir)
+- chmod u+s $(DESTDIR)$(bindir)/gringotts-bin
+
+ uninstall-local:
+ rm -f $(DESTDIR)$(bindir)/gringotts