diff options
author | root <root@rshg054.dnsready.net> | 2011-10-21 23:14:54 +0000 |
---|---|---|
committer | root <root@rshg054.dnsready.net> | 2011-10-21 23:14:54 +0000 |
commit | d3d0811e23787b5c66edf94b3351a1555eb5010f (patch) | |
tree | 5fb14b5a2d0bd5b526a58d27e6fb81f04977855a /community/clamz | |
parent | 1b21445a8e9097b0bb0542ed847fbb1eb832848f (diff) |
Fri Oct 21 23:14:53 UTC 2011
Diffstat (limited to 'community/clamz')
-rw-r--r-- | community/clamz/PKGBUILD | 10 | ||||
-rw-r--r-- | community/clamz/unencrypted-amz.patch | 27 |
2 files changed, 33 insertions, 4 deletions
diff --git a/community/clamz/PKGBUILD b/community/clamz/PKGBUILD index 3b784be5d..d08c07921 100644 --- a/community/clamz/PKGBUILD +++ b/community/clamz/PKGBUILD @@ -1,18 +1,20 @@ -# $Id: PKGBUILD 53892 2011-08-09 12:18:03Z lfleischer $ +# $Id: PKGBUILD 57080 2011-10-20 17:17:06Z lfleischer $ # Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> # Contributor: Daniel J Griffiths <ghost1227@archlinux.us> pkgname=clamz pkgver=0.4 -pkgrel=2 +pkgrel=3 pkgdesc="Command-line program to download MP3 files from Amazon.com's music store." arch=('i686' 'x86_64') url='http://code.google.com/p/clamz/' license=('GPL3') depends=('libgcrypt' 'curl' 'expat' 'shared-mime-info' 'desktop-file-utils') install='clamz.install' -source=("http://clamz.googlecode.com/files/clamz-${pkgver}.tar.gz") -md5sums=('ab7661340ee27d206f36064cfbd5bfa4') +source=("http://clamz.googlecode.com/files/clamz-${pkgver}.tar.gz" + 'unencrypted-amz.patch') +md5sums=('ab7661340ee27d206f36064cfbd5bfa4' + '603ef334d297614edabbd1bf5bfe585d') build() { cd "${srcdir}/${pkgname}-${pkgver}" diff --git a/community/clamz/unencrypted-amz.patch b/community/clamz/unencrypted-amz.patch new file mode 100644 index 000000000..49b03ba8a --- /dev/null +++ b/community/clamz/unencrypted-amz.patch @@ -0,0 +1,27 @@ +--- playlist.c 2010-04-19 16:01:59.000000000 -0700 ++++ clamz-0.4/playlist.c 2011-10-18 20:35:39.850146353 -0700 +@@ -499,12 +499,21 @@ + { + struct parseinfo pi; + unsigned char *decrypted, *xml; +- unsigned long decrypted_len; ++ unsigned long decrypted_len, i; + int xerr; + + decrypted = decrypt_amz_file(b64data, b64len, fname); +- if (!decrypted) +- return 1; ++ if (!decrypted){ ++ // XXX Perhaps the code file is unencrypted already. ++ decrypted = malloc((b64len + 1) * sizeof(char)); ++ if (!decrypted) { ++ print_error("Out of memory"); ++ return 1; ++ } ++ for (i = 0; i < b64len; i++) { ++ decrypted[i] = b64data[i]; ++ } ++ } + decrypted_len = strlen((char*) decrypted); + + pi.parser = XML_ParserCreate(NULL); |