Browse Source

update to 2.00

Waldemar Brodkorb 11 years ago
parent
commit
fcb8e56cdc
27 changed files with 84 additions and 453 deletions
  1. 23 10
      package/grub/Makefile
  2. 0 11
      package/grub/patches/patch-conf_common_mk
  3. 11 0
      package/grub/patches/patch-configure
  4. 14 0
      package/grub/patches/patch-grub-core_gnulib_stdio_in_h
  5. 36 0
      package/grub/patches/patch-grub-core_kern_emu_hostdisk_c
  6. 0 11
      package/grub/patches/patch-include_grub_i18n_h
  7. 0 17
      package/grub/patches/patch-include_grub_misc_h
  8. 0 54
      package/grub/patches/patch-kern_misc_c
  9. 0 29
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_camellia_c
  10. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_des_c
  11. 0 29
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_dsa_c
  12. 0 20
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_elgamal_c
  13. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_md4_c
  14. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_md5_c
  15. 0 38
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_primegen_c
  16. 0 53
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_rijndael_c
  17. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_rmd160_c
  18. 0 20
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_serpent_c
  19. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha1_c
  20. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha256_c
  21. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha512_c
  22. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_tiger_c
  23. 0 20
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_twofish_c
  24. 0 11
      package/grub/patches/patch-lib_libgcrypt-grub_cipher_whirlpool_c
  25. 0 11
      package/grub/patches/patch-util_grub-install_in
  26. 0 11
      package/grub/patches/patch-util_grub-mkconfig_lib_in
  27. 0 20
      package/grub/patches/patch-util_grub_d_10_linux_in

+ 23 - 10
package/grub/Makefile

@@ -4,37 +4,50 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=		grub
-PKG_VERSION:=		1.98
+PKG_VERSION:=		2.00
 PKG_RELEASE:=		1
-PKG_MD5SUM:=		c0bcf60e524739bb64e3a2d4e3732a59
+PKG_MD5SUM:=		e927540b6eda8b024fb0391eeaa4091c
 PKG_DESCR:=		GRUB2 bootloader (source package)
 PKG_SECTION:=		boot
+PKG_BUILDDEP:=		bison-host
 PKG_URL:=		http://www.gnu.org/software/grub
-PKG_SITES:=		ftp://alpha.gnu.org/gnu/grub/
+PKG_SITES:=		ftp://ftp.gnu.org/gnu/grub/
 
 PKG_HOST_DEPENDS:=	linux
-PKG_ARCH_DEPENDS:=	x86 x86_64
+PKG_ARCH_DEPENDS:=	x86 x86_64 mips
 PKG_NOPARALLEL:=	1
 
+PKG_CHOICES_GRUB:=	PC EFI
+PKGCD_PC:=		build for PC BIOS
+PKGCD_EFI:=		build for EFI
+
 include $(TOPDIR)/mk/package.mk
 
 $(eval $(call PKG_template,GRUB,grub,$(PKG_VERSION)-${PKG_RELEASE},${PKG_DEPENDS},${PKG_DESCR},${PKG_SECTION}))
 
+ifeq ($(ADK_PACKAGE_GRUB_PC),y)
+GRUB_ARCH:=		i386-pc
+CONFIGURE_ARGS+=	--with-platform=pc
+endif
+ifeq ($(ADK_PACKAGE_GRUB_EFI),y)
+GRUB_ARCH:=		x86_64-efi
+CONFIGURE_ARGS+=	--with-platform=efi
+endif
+
 ifeq ($(ADK_STATIC),y)
 TARGET_CFLAGS+=         -static
 TARGET_LDFLAGS+=        -static
 endif
 
-XAKE_FLAGS+=		GCC_HONOUR_COPTS=s  CPPFLAGS_FOR_BUILD="-I./include"
-CONFIGURE_ARGS+=	--disable-efiemu \
-			--disable-grub-mkfont \
-			--disable-grub-fstest
+XAKE_FLAGS+=		GCC_HONOUR_COPTS=s
 
 grub-install:
-	${INSTALL_DIR} $(IDIR_GRUB)/usr/{sbin,lib,bin}
+	${INSTALL_DIR} $(IDIR_GRUB)/usr/{sbin,bin}
+	${INSTALL_DIR} $(IDIR_GRUB)/usr/lib/grub/${GRUB_ARCH}/
 	${INSTALL_DIR} $(IDIR_GRUB)/etc
 	${CP} ${WRKINST}/etc/grub.d $(IDIR_GRUB)/etc
-	${CP} ${WRKINST}/usr/lib/* $(IDIR_GRUB)/usr/lib
+	${CP} ${WRKINST}/usr/lib/grub/${GRUB_ARCH}/*{mod,lst,img} \
+		$(IDIR_GRUB)/usr/lib/grub/${GRUB_ARCH}/
 	${INSTALL_BIN} ${WRKINST}/usr/bin/* $(IDIR_GRUB)/usr/bin
 	${INSTALL_BIN} ${WRKINST}/usr/sbin/* $(IDIR_GRUB)/usr/sbin
 

+ 0 - 11
package/grub/patches/patch-conf_common_mk

@@ -1,11 +0,0 @@
---- grub-1.98.orig/conf/common.mk	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/conf/common.mk	2012-02-22 13:20:42.022360300 +0100
-@@ -11159,7 +11159,7 @@ trigtables.c: gentrigtables
- 	./gentrigtables > $@
- DISTCLEANFILES += trigtables.c
- gentrigtables: gentrigtables.c
--	$(CC) -o $@ $^ $(CPPFLAGS) -lm
-+	$(CC_FOR_BUILD) -o $@ $^ $(CPPFLAGS_FOR_BUILD) -lm
- DISTCLEANFILES += gentrigtables
- 
- pkglib_MODULES += setjmp.mod

+ 11 - 0
package/grub/patches/patch-configure

@@ -0,0 +1,11 @@
+--- grub-2.00.orig/configure	2012-06-26 13:59:16.000000000 +0200
++++ grub-2.00/configure	2014-04-06 20:34:33.000000000 +0200
+@@ -3880,7 +3882,7 @@ TARGET_CPPFLAGS="$TARGET_CPPFLAGS -I\$(t
+ 
+ case "$target_cpu" in
+   i[3456]86)	target_cpu=i386 ;;
+-  amd64)	target_cpu=x86_64 ;;
++  amd64|x86_64)	target_cpu=x86_64 ;;
+   sparc)	target_cpu=sparc64 ;;
+   mipsel|mips64el)
+                 target_cpu=mipsel;

+ 14 - 0
package/grub/patches/patch-grub-core_gnulib_stdio_in_h

@@ -0,0 +1,14 @@
+--- grub-2.00.orig/grub-core/gnulib/stdio.in.h	2010-12-01 15:45:43.000000000 +0100
++++ grub-2.00/grub-core/gnulib/stdio.in.h	2014-04-05 10:02:52.000000000 +0200
+@@ -137,11 +137,6 @@ _GL_WARN_ON_USE (fflush, "fflush is not
+                  "use gnulib module fflush for portable POSIX compliance");
+ #endif
+ 
+-/* It is very rare that the developer ever has full control of stdin,
+-   so any use of gets warrants an unconditional warning.  Assume it is
+-   always declared, since it is required by C89.  */
+-#undef gets
+-_GL_WARN_ON_USE (gets, "gets is a security hole - use fgets instead");
+ 
+ #if @GNULIB_FOPEN@
+ # if @REPLACE_FOPEN@

+ 36 - 0
package/grub/patches/patch-grub-core_kern_emu_hostdisk_c

@@ -0,0 +1,36 @@
+--- grub-2.00.orig/grub-core/kern/emu/hostdisk.c	2012-06-25 10:32:04.000000000 +0200
++++ grub-2.00/grub-core/kern/emu/hostdisk.c	2014-04-06 13:14:06.000000000 +0200
+@@ -761,25 +761,6 @@ linux_find_partition (char *dev, grub_di
+ }
+ #endif /* __linux__ */
+ 
+-#if defined(__linux__) && (!defined(__GLIBC__) || \
+-        ((__GLIBC__ < 2) || ((__GLIBC__ == 2) && (__GLIBC_MINOR__ < 1))))
+-  /* Maybe libc doesn't have large file support.  */
+-grub_err_t
+-grub_util_fd_seek (int fd, const char *name, grub_uint64_t off)
+-{
+-  loff_t offset, result;
+-  static int _llseek (uint filedes, ulong hi, ulong lo,
+-		      loff_t *res, uint wh);
+-  _syscall5 (int, _llseek, uint, filedes, ulong, hi, ulong, lo,
+-	     loff_t *, res, uint, wh);
+-
+-  offset = (loff_t) off;
+-  if (_llseek (fd, offset >> 32, offset & 0xffffffff, &result, SEEK_SET))
+-    return grub_error (GRUB_ERR_BAD_DEVICE, N_("cannot seek `%s': %s"),
+-		       name, strerror (errno));
+-  return GRUB_ERR_NONE;
+-}
+-#else
+ grub_err_t
+ grub_util_fd_seek (int fd, const char *name, grub_uint64_t off)
+ {
+@@ -790,7 +771,6 @@ grub_util_fd_seek (int fd, const char *n
+ 		       name, strerror (errno));
+   return 0;
+ }
+-#endif
+ 
+ static void
+ flush_initial_buffer (const char *os_dev __attribute__ ((unused)))

+ 0 - 11
package/grub/patches/patch-include_grub_i18n_h

@@ -1,11 +0,0 @@
---- grub-1.98.orig/include/grub/i18n.h	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/include/grub/i18n.h	2010-06-26 15:31:22.860562533 +0200
-@@ -25,7 +25,7 @@
- extern const char *(*EXPORT_VAR(grub_gettext)) (const char *s);
- 
- /* NLS can be disabled through the configure --disable-nls option.  */
--#if ENABLE_NLS
-+#if defined(ENABLE_NLS)
- 
- # ifdef GRUB_UTIL
- 

+ 0 - 17
package/grub/patches/patch-include_grub_misc_h

@@ -1,17 +0,0 @@
---- grub-1.98.orig/include/grub/misc.h	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/include/grub/misc.h	2010-06-26 18:54:44.075171713 +0200
-@@ -91,14 +91,6 @@ grub_strncat (char *dest, const char *sr
-   return dest;
- }
- 
--/* Prototypes for aliases.  */
--#ifndef GRUB_UTIL
--int EXPORT_FUNC(memcmp) (const void *s1, const void *s2, grub_size_t n);
--void *EXPORT_FUNC(memmove) (void *dest, const void *src, grub_size_t n);
--void *EXPORT_FUNC(memcpy) (void *dest, const void *src, grub_size_t n);
--void *EXPORT_FUNC(memset) (void *s, int c, grub_size_t n);
--#endif
--
- int EXPORT_FUNC(grub_memcmp) (const void *s1, const void *s2, grub_size_t n);
- int EXPORT_FUNC(grub_strcmp) (const char *s1, const char *s2);
- int EXPORT_FUNC(grub_strncmp) (const char *s1, const char *s2, grub_size_t n);

+ 0 - 54
package/grub/patches/patch-kern_misc_c

@@ -1,54 +0,0 @@
---- grub-1.98.orig/kern/misc.c	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/kern/misc.c	2010-06-26 20:12:26.711214130 +0200
-@@ -64,23 +64,6 @@ grub_memmove (void *dest, const void *sr
-   return dest;
- }
- 
--#ifndef APPLE_CC
--void *memmove (void *dest, const void *src, grub_size_t n)
--  __attribute__ ((alias ("grub_memmove")));
--/* GCC emits references to memcpy() for struct copies etc.  */
--void *memcpy (void *dest, const void *src, grub_size_t n)
--  __attribute__ ((alias ("grub_memmove")));
--#else
--void *memcpy (void *dest, const void *src, grub_size_t n)
--{
--	return grub_memmove (dest, src, n);
--}
--void *memmove (void *dest, const void *src, grub_size_t n)
--{
--	return grub_memmove (dest, src, n);
--}
--#endif
--
- char *
- grub_strcpy (char *dest, const char *src)
- {
-@@ -516,15 +499,6 @@ grub_memset (void *s, int c, grub_size_t
- 
-   return s;
- }
--#ifndef APPLE_CC
--void *memset (void *s, int c, grub_size_t n)
--  __attribute__ ((alias ("grub_memset")));
--#else
--void *memset (void *s, int c, grub_size_t n)
--{
--  return grub_memset (s, c, n);
--}
--#endif
- 
- grub_size_t
- grub_strlen (const char *s)
-@@ -1053,11 +1027,6 @@ grub_abort (void)
-   grub_exit ();
- }
- 
--#ifndef APPLE_CC
--/* GCC emits references to abort().  */
--void abort (void) __attribute__ ((alias ("grub_abort")));
--#endif
--
- #ifdef NEED_ENABLE_EXECUTE_STACK
- /* Some gcc versions generate a call to this function
-    in trampolines for nested functions.  */

+ 0 - 29
package/grub/patches/patch-lib_libgcrypt-grub_cipher_camellia_c

@@ -1,29 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/camellia.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/camellia.c	2010-06-26 20:49:20.915278106 +0200
-@@ -26,6 +26,7 @@
-  */
- 
- 
-+#include <grub/misc.h>
- #include "camellia.h"
- 
- /* u32 must be 32bit word */
-@@ -946,13 +947,13 @@ void camellia_setup192(const unsigned ch
-     unsigned char kk[32];
-     u32 krll, krlr, krrl,krrr;
- 
--    memcpy(kk, key, 24);
--    memcpy((unsigned char *)&krll, key+16,4);
--    memcpy((unsigned char *)&krlr, key+20,4);
-+    grub_memcpy(kk, key, 24);
-+    grub_memcpy((unsigned char *)&krll, key+16,4);
-+    grub_memcpy((unsigned char *)&krlr, key+20,4);
-     krrl = ~krll;
-     krrr = ~krlr;
--    memcpy(kk+24, (unsigned char *)&krrl, 4);
--    memcpy(kk+28, (unsigned char *)&krrr, 4);
-+    grub_memcpy(kk+24, (unsigned char *)&krrl, 4);
-+    grub_memcpy(kk+28, (unsigned char *)&krrr, 4);
-     camellia_setup256(kk, subkey);
-     return;
- }

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_des_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/des.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/des.c	2010-06-26 20:35:49.335279651 +0200
-@@ -119,7 +119,7 @@
- #include "cipher.h"
- 
- #if defined(__GNUC__) && defined(__GNU_LIBRARY__)
--#define working_memcmp memcmp
-+#define working_memcmp grub_memcmp
- #else
- /*
-  * According to the SunOS man page, memcmp returns indeterminate sign

+ 0 - 29
package/grub/patches/patch-lib_libgcrypt-grub_cipher_dsa_c

@@ -1,29 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/dsa.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/dsa.c	2010-06-26 20:41:13.511279436 +0200
-@@ -157,7 +157,7 @@ gen_k( gcry_mpi_t q )
- 	     to get_random_bytes() and use this the here maybe it is
- 	     easier to do this directly in random.c. */
-           char *pp = gcry_random_bytes_secure( 4, GCRY_STRONG_RANDOM );
--          memcpy( rndbuf,pp, 4 );
-+          grub_memcpy( rndbuf,pp, 4 );
-           gcry_free(pp);
- 	}
-       _gcry_mpi_set_buffer( k, rndbuf, nbytes, 0 );
-@@ -337,7 +337,7 @@ generate (DSA_secret_key *sk, unsigned i
-       else 
-         { /* Change only some of the higher bits (= 2 bytes)*/
-           char *r = gcry_random_bytes_secure (2, random_level);
--          memcpy(rndbuf, r, 2 );
-+          grub_memcpy(rndbuf, r, 2 );
-           gcry_free(r);
-         }
- 
-@@ -713,7 +713,7 @@ dsa_generate_ext (int algo, unsigned int
-               gcry_sexp_release (l1);
-               return GPG_ERR_INV_OBJ; /* No value or value too large.  */
-             }
--          memcpy (buf, s, n);
-+          grub_memcpy (buf, s, n);
-           buf[n] = 0;
-           qbits = (unsigned int)strtoul (buf, NULL, 0);
-           gcry_sexp_release (l1);

+ 0 - 20
package/grub/patches/patch-lib_libgcrypt-grub_cipher_elgamal_c

@@ -1,20 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/elgamal.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/elgamal.c	2010-06-26 20:40:56.115156639 +0200
-@@ -212,7 +212,7 @@ gen_k( gcry_mpi_t p, int small_k )
-              easier to do this directly in random.c Anyway, it is
-              highly inlikely that we will ever reach this code. */
-           char *pp = gcry_random_bytes_secure( 4, GCRY_STRONG_RANDOM );
--          memcpy( rndbuf, pp, 4 );
-+          grub_memcpy( rndbuf, pp, 4 );
-           gcry_free(pp);
- 	}
-       _gcry_mpi_set_buffer( k, rndbuf, nbytes, 0 );
-@@ -308,7 +308,7 @@ generate ( ELG_secret_key *sk, unsigned 
-             {
-               char *r = gcry_random_bytes_secure( 2,
-                                                   GCRY_VERY_STRONG_RANDOM );
--              memcpy(rndbuf, r, 2 );
-+              grub_memcpy(rndbuf, r, 2 );
-               gcry_free(r);
-             }
- 	}

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_md4_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/md4.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/md4.c	2010-06-26 20:24:28.691278909 +0200
-@@ -109,7 +109,7 @@ transform ( MD4_CONTEXT *ctx, const unsi
-       }
-   }
- #else
--  memcpy (in, data, 64);
-+  grub_memcpy (in, data, 64);
- #endif
- 
-   /* Round 1.  */

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_md5_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/md5.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/md5.c	2010-06-26 20:24:19.631157281 +0200
-@@ -100,7 +100,7 @@ transform ( MD5_CONTEXT *ctx, const unsi
-       }
-   }
- #else
--  memcpy( correct_words, data, 64 );
-+  grub_memcpy( correct_words, data, 64 );
- #endif
- 
- 

+ 0 - 38
package/grub/patches/patch-lib_libgcrypt-grub_cipher_primegen_c

@@ -1,38 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/primegen.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/primegen.c	2010-06-26 20:42:06.831276628 +0200
-@@ -1478,7 +1478,7 @@ _gcry_generate_fips186_2_prime (unsigned
-         }
-       
-       /* Step 2: U = sha1(seed) ^ sha1((seed+1) mod 2^{qbits})  */
--      memcpy (seed_plus, seed, seedlen);
-+      grub_memcpy (seed_plus, seed, seedlen);
-       for (i=seedlen-1; i >= 0; i--)
-         {
-           seed_plus[i]++;
-@@ -1596,7 +1596,7 @@ _gcry_generate_fips186_2_prime (unsigned
-     *r_counter = counter;
-   if (r_seed && r_seedlen)
-     {
--      memcpy (seed_plus, seed, seedlen);
-+      grub_memcpy (seed_plus, seed, seedlen);
-       *r_seed = seed_plus;
-       seed_plus = NULL;
-       *r_seedlen = seedlen;
-@@ -1751,7 +1751,7 @@ _gcry_generate_fips186_3_prime (unsigned
-   
-   /* Step 11.  Note that we do no use an explicit offset but increment
-      SEED_PLUS accordingly.  */
--  memcpy (seed_plus, seed, seedlen);
-+  grub_memcpy (seed_plus, seed, seedlen);
-   counter = 0;
- 
-   /* Generate P. */
-@@ -1838,7 +1838,7 @@ _gcry_generate_fips186_3_prime (unsigned
-     *r_counter = counter;
-   if (r_seed && r_seedlen)
-     {
--      memcpy (seed_plus, seed, seedlen);
-+      grub_memcpy (seed_plus, seed, seedlen);
-       *r_seed = seed_plus;
-       seed_plus = NULL;
-       *r_seedlen = seedlen;

+ 0 - 53
package/grub/patches/patch-lib_libgcrypt-grub_cipher_rijndael_c

@@ -1,53 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/rijndael.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/rijndael.c	2010-06-26 20:23:29.463277513 +0200
-@@ -139,7 +139,7 @@ do_setkey (RIJNDAEL_context *ctx, const 
-       if ((_gcry_get_hw_features () & HWF_PADLOCK_AES))
-         {
-           ctx->use_padlock = 1;
--          memcpy (ctx->padlock_key, key, keylen);
-+          grub_memcpy (ctx->padlock_key, key, keylen);
-         }
- #endif
-     }
-@@ -411,9 +411,9 @@ do_encrypt (const RIJNDAEL_context *ctx,
-     byte b[16];
-   } b;
- 
--  memcpy (a.a, ax, 16);
-+  grub_memcpy (a.a, ax, 16);
-   do_encrypt_aligned (ctx, b.b, a.a);
--  memcpy (bx, b.b, 16);
-+  grub_memcpy (bx, b.b, 16);
- }
- 
- 
-@@ -440,7 +440,7 @@ do_padlock (const RIJNDAEL_context *ctx,
-   if (decrypt_flag)
-     cword[0] |= 0x00000200;
- 
--  memcpy (a, ax, 16);
-+  grub_memcpy (a, ax, 16);
-    
-   asm volatile 
-     ("pushfl\n\t"          /* Force key reload.  */            
-@@ -454,7 +454,7 @@ do_padlock (const RIJNDAEL_context *ctx,
-      : "%ecx", "cc", "memory"
-      );
- 
--  memcpy (bx, b, 16);
-+  grub_memcpy (bx, b, 16);
- 
- }
- #endif /*USE_PADLOCK*/
-@@ -609,9 +609,9 @@ do_decrypt (RIJNDAEL_context *ctx, byte 
-       ctx->decryption_prepared = 1;
-     }
- 
--  memcpy (a.a, ax, 16);
-+  grub_memcpy (a.a, ax, 16);
-   do_decrypt_aligned (ctx, b.b, a.a);
--  memcpy (bx, b.b, 16);
-+  grub_memcpy (bx, b.b, 16);
- #undef rk
- }
-     

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_rmd160_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/rmd160.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/rmd160.c	2010-06-26 20:23:39.319276778 +0200
-@@ -185,7 +185,7 @@ transform ( RMD160_CONTEXT *hd, const un
-    * executes on a 586-100 (39.73 bogomips) at about 1900kb/sec;
-    * [measured with a 4MB data and "gpgm --print-md rmd160"] */
-   u32 x[16];
--  memcpy( x, data, 64 );
-+  grub_memcpy( x, data, 64 );
- #endif
- 
- 

+ 0 - 20
package/grub/patches/patch-lib_libgcrypt-grub_cipher_serpent_c

@@ -1,20 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/serpent.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/serpent.c	2010-06-26 20:29:51.523275940 +0200
-@@ -917,7 +917,7 @@ serpent_test (void)
- 				(const u32 *) test_data[i].text_plain,
- 				(u32 *) scratch);
- 
--      if (memcmp (scratch, test_data[i].text_cipher, sizeof (serpent_block_t)))
-+      if (grub_memcmp (scratch, test_data[i].text_cipher, sizeof (serpent_block_t)))
- 	switch (test_data[i].key_length)
- 	  {
- 	  case 16:
-@@ -931,7 +931,7 @@ serpent_test (void)
-     serpent_decrypt_internal (&context,
- 			      (const u32 *) test_data[i].text_cipher,
- 			      (u32 *) scratch);
--    if (memcmp (scratch, test_data[i].text_plain, sizeof (serpent_block_t)))
-+    if (grub_memcmp (scratch, test_data[i].text_plain, sizeof (serpent_block_t)))
-       switch (test_data[i].key_length)
- 	{
- 	case 16:

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha1_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/sha1.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/sha1.c	2010-06-26 20:23:50.135168960 +0200
-@@ -114,7 +114,7 @@ transform (SHA1_CONTEXT *hd, const unsig
-   for ( ;nblocks; nblocks--)
-     {
- #ifdef WORDS_BIGENDIAN
--      memcpy (x, data, 64);
-+      grub_memcpy (x, data, 64);
-       data += 64;
- #else
-       {

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha256_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/sha256.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/sha256.c	2010-06-26 20:24:00.135274844 +0200
-@@ -150,7 +150,7 @@ transform (SHA256_CONTEXT *hd, const uns
-   h = hd->h7;
-   
- #ifdef WORDS_BIGENDIAN
--  memcpy (x, data, 64);
-+  grub_memcpy (x, data, 64);
- #else
-   { 
-     byte *p2;

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_sha512_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/sha512.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/sha512.c	2010-06-26 20:24:09.235288423 +0200
-@@ -162,7 +162,7 @@ transform (SHA512_CONTEXT *hd, const uns
-   h = hd->h7;
- 
- #ifdef WORDS_BIGENDIAN
--  memcpy (w, data, 128);
-+  grub_memcpy (w, data, 128);
- #else
-   {
-     int i;

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_tiger_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/tiger.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/tiger.c	2010-06-26 20:22:45.507277255 +0200
-@@ -685,7 +685,7 @@ transform ( TIGER_CONTEXT *hd, const uns
-   x[7] = MKWORD(data, 7);
- #undef MKWORD
- #else
--  memcpy( &x[0], data, 64 );
-+  grub_memcpy( &x[0], data, 64 );
- #endif
- 
-   /* save */

+ 0 - 20
package/grub/patches/patch-lib_libgcrypt-grub_cipher_twofish_c

@@ -1,20 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/twofish.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/twofish.c	2010-06-26 20:30:05.671278033 +0200
-@@ -932,7 +932,7 @@ main()
-         twofish_encrypt (&ctx, buffer[1], buffer[1]);
-       }
-     }
--  encrypt_msg = memcmp (buffer, test_encrypt, sizeof (test_encrypt)) ?
-+  encrypt_msg = grub_memcmp (buffer, test_encrypt, sizeof (test_encrypt)) ?
-     "encryption failure!\n" : "encryption OK!\n";
- 
-   /* Decryption test. */
-@@ -954,7 +954,7 @@ main()
-   /* Stop the timer, and print results. */
-   timer = clock () - timer;
-   printf (encrypt_msg);
--  printf (memcmp (buffer, test_decrypt, sizeof (test_decrypt)) ?
-+  printf (grub_memcmp (buffer, test_decrypt, sizeof (test_decrypt)) ?
-           "decryption failure!\n" : "decryption OK!\n");
-   printf ("elapsed time: %.1f s.\n", (float) timer / CLOCKS_PER_SEC);
- 

+ 0 - 11
package/grub/patches/patch-lib_libgcrypt-grub_cipher_whirlpool_c

@@ -1,11 +0,0 @@
---- grub-1.98.orig/lib/libgcrypt-grub/cipher/whirlpool.c	2010-03-06 21:52:26.000000000 +0100
-+++ grub-1.98/lib/libgcrypt-grub/cipher/whirlpool.c	2010-06-26 20:17:35.043170089 +0200
-@@ -1381,7 +1381,7 @@ whirlpool_final (void *ctx)
-     context->buffer[context->count++] = 0;
- 
-   /* Add length of message.  */
--  memcpy (context->buffer + context->count, context->length, 32);
-+  grub_memcpy (context->buffer + context->count, context->length, 32);
-   context->count += 32;
-   whirlpool_add (context, NULL, 0);
- 

+ 0 - 11
package/grub/patches/patch-util_grub-install_in

@@ -1,11 +0,0 @@
---- grub-1.98.orig/util/grub-install.in	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/util/grub-install.in	2010-06-26 21:16:50.031158562 +0200
-@@ -306,7 +306,7 @@ config_opt=
- 
- if [ "x${devabstraction_module}" = "x" ] ; then
-     if [ x"${install_device}" != x ]; then
--      if echo "${install_device}" | grep -qx "(.*)" ; then
-+      if echo "${install_device}" | grep -q "(.*)" ; then
-         install_drive="${install_device}"
-       else
-         install_drive="`$grub_probe --target=drive --device ${install_device}`"

+ 0 - 11
package/grub/patches/patch-util_grub-mkconfig_lib_in

@@ -1,11 +0,0 @@
---- grub-1.98.orig/util/grub-mkconfig_lib.in	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/util/grub-mkconfig_lib.in	2010-06-26 21:17:19.399157123 +0200
-@@ -154,7 +154,7 @@ version_test_numeric ()
-     a=$b
-     b=$c
-   fi
--  if (echo $a ; echo $b) | sort -n | head -n 1 | grep -qx $b ; then
-+  if (echo $a ; echo $b) | sort -n | head -n 1 | grep -q $b ; then
-     return 0
-   else
-     return 1

+ 0 - 20
package/grub/patches/patch-util_grub_d_10_linux_in

@@ -1,20 +0,0 @@
---- grub-1.98.orig/util/grub.d/10_linux.in	2010-03-06 21:51:37.000000000 +0100
-+++ grub-1.98/util/grub.d/10_linux.in	2010-06-26 21:18:10.803156350 +0200
-@@ -66,8 +66,8 @@ linux_entry ()
-   # Use ELILO's generic "efifb" when it's known to be available.
-   # FIXME: We need an interface to select vesafb in case efifb can't be used.
-   if [ "x$GRUB_GFXPAYLOAD_LINUX" = x ]; then
--      if grep -qx "CONFIG_FB_EFI=y" /boot/config-${version} 2> /dev/null \
--	  && grep -qx "CONFIG_VT_HW_CONSOLE_BINDING=y" /boot/config-${version} 2> /dev/null; then
-+      if grep -q "CONFIG_FB_EFI=y" /boot/config-${version} 2> /dev/null \
-+	  && grep -q "CONFIG_VT_HW_CONSOLE_BINDING=y" /boot/config-${version} 2> /dev/null; then
- 	  cat << EOF
- 	set gfxpayload=keep
- EOF
-@@ -135,5 +135,5 @@ while [ "x$list" != "x" ] ; do
- 	"single ${GRUB_CMDLINE_LINUX}"
-   fi
- 
--  list=`echo $list | tr ' ' '\n' | grep -vx $linux | tr '\n' ' '`
-+  list=`echo $list | tr ' ' '\n' | grep -v $linux | tr '\n' ' '`
- done