summaryrefslogtreecommitdiff
path: root/community/clamz
diff options
context:
space:
mode:
authorroot <root@rshg054.dnsready.net>2011-10-21 23:14:54 +0000
committerroot <root@rshg054.dnsready.net>2011-10-21 23:14:54 +0000
commitd3d0811e23787b5c66edf94b3351a1555eb5010f (patch)
tree5fb14b5a2d0bd5b526a58d27e6fb81f04977855a /community/clamz
parent1b21445a8e9097b0bb0542ed847fbb1eb832848f (diff)
Fri Oct 21 23:14:53 UTC 2011
Diffstat (limited to 'community/clamz')
-rw-r--r--community/clamz/PKGBUILD10
-rw-r--r--community/clamz/unencrypted-amz.patch27
2 files changed, 33 insertions, 4 deletions
diff --git a/community/clamz/PKGBUILD b/community/clamz/PKGBUILD
index 3b784be5d..d08c07921 100644
--- a/community/clamz/PKGBUILD
+++ b/community/clamz/PKGBUILD
@@ -1,18 +1,20 @@
-# $Id: PKGBUILD 53892 2011-08-09 12:18:03Z lfleischer $
+# $Id: PKGBUILD 57080 2011-10-20 17:17:06Z lfleischer $
# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
# Contributor: Daniel J Griffiths <ghost1227@archlinux.us>
pkgname=clamz
pkgver=0.4
-pkgrel=2
+pkgrel=3
pkgdesc="Command-line program to download MP3 files from Amazon.com's music store."
arch=('i686' 'x86_64')
url='http://code.google.com/p/clamz/'
license=('GPL3')
depends=('libgcrypt' 'curl' 'expat' 'shared-mime-info' 'desktop-file-utils')
install='clamz.install'
-source=("http://clamz.googlecode.com/files/clamz-${pkgver}.tar.gz")
-md5sums=('ab7661340ee27d206f36064cfbd5bfa4')
+source=("http://clamz.googlecode.com/files/clamz-${pkgver}.tar.gz"
+ 'unencrypted-amz.patch')
+md5sums=('ab7661340ee27d206f36064cfbd5bfa4'
+ '603ef334d297614edabbd1bf5bfe585d')
build() {
cd "${srcdir}/${pkgname}-${pkgver}"
diff --git a/community/clamz/unencrypted-amz.patch b/community/clamz/unencrypted-amz.patch
new file mode 100644
index 000000000..49b03ba8a
--- /dev/null
+++ b/community/clamz/unencrypted-amz.patch
@@ -0,0 +1,27 @@
+--- playlist.c 2010-04-19 16:01:59.000000000 -0700
++++ clamz-0.4/playlist.c 2011-10-18 20:35:39.850146353 -0700
+@@ -499,12 +499,21 @@
+ {
+ struct parseinfo pi;
+ unsigned char *decrypted, *xml;
+- unsigned long decrypted_len;
++ unsigned long decrypted_len, i;
+ int xerr;
+
+ decrypted = decrypt_amz_file(b64data, b64len, fname);
+- if (!decrypted)
+- return 1;
++ if (!decrypted){
++ // XXX Perhaps the code file is unencrypted already.
++ decrypted = malloc((b64len + 1) * sizeof(char));
++ if (!decrypted) {
++ print_error("Out of memory");
++ return 1;
++ }
++ for (i = 0; i < b64len; i++) {
++ decrypted[i] = b64data[i];
++ }
++ }
+ decrypted_len = strlen((char*) decrypted);
+
+ pi.parser = XML_ParserCreate(NULL);