diff options
author | Tobias C. Berner <tcberner@FreeBSD.org> | 2023-06-06 06:23:30 +0000 |
---|---|---|
committer | Tobias C. Berner <tcberner@FreeBSD.org> | 2023-06-29 17:56:44 +0000 |
commit | 5ab3f1019c15b138158370eb5bae8db87d98fecd (patch) | |
tree | 1ad7e926ba574f8a2db1f06ba5b28d942738ab0f /x11/kf5-kdelibs4support | |
parent | 690a4945d92024c4253fc9ec61ed6832eee2da13 (diff) | |
download | ports-5ab3f1019c15b138158370eb5bae8db87d98fecd.tar.gz ports-5ab3f1019c15b138158370eb5bae8db87d98fecd.zip |
KDE: Update KDE Frameworks to 5.107
Saturday, 10 June 2023
KDE today announces the release of KDE Frameworks 5.107.0.
KDE Frameworks are 83 addon libraries to Qt which provide a wide variety
of commonly needed functionality in mature, peer reviewed and well
tested libraries with friendly licensing terms. For an introduction see
the KDE Frameworks release announcement.
This release is part of a series of planned monthly releases making
improvements available to developers in a quick and predictable manner.
PR: 272099
Exp-run by: antoine
Diffstat (limited to 'x11/kf5-kdelibs4support')
-rw-r--r-- | x11/kf5-kdelibs4support/distinfo | 6 | ||||
-rw-r--r-- | x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp | 119 | ||||
-rw-r--r-- | x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp | 11 |
3 files changed, 3 insertions, 133 deletions
diff --git a/x11/kf5-kdelibs4support/distinfo b/x11/kf5-kdelibs4support/distinfo index 211a2d96cf9e..34571be404ef 100644 --- a/x11/kf5-kdelibs4support/distinfo +++ b/x11/kf5-kdelibs4support/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1683711495 -SHA256 (KDE/frameworks/5.106.0/kdelibs4support-5.106.0.tar.xz) = ce71650a1c379bdb75726c508e60695855c158ce2e8ea44aacb69d787e2a9cab -SIZE (KDE/frameworks/5.106.0/kdelibs4support-5.106.0.tar.xz) = 3721228 +TIMESTAMP = 1686028532 +SHA256 (KDE/frameworks/5.107.0/kdelibs4support-5.107.0.tar.xz) = ef94568b687230734725d2a74108ff869c0beeb6d3476503265719e182660c8f +SIZE (KDE/frameworks/5.107.0/kdelibs4support-5.107.0.tar.xz) = 3721328 diff --git a/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp b/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp deleted file mode 100644 index d989c72082a3..000000000000 --- a/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp +++ /dev/null @@ -1,119 +0,0 @@ ---- src/kssl/kopenssl.cpp.orig 2022-10-19 06:07:48 UTC -+++ src/kssl/kopenssl.cpp -@@ -978,7 +978,7 @@ void KOpenSSLProxy::X509_STORE_free(X509_STORE *v) - - void KOpenSSLProxy::X509_STORE_set_verify_cb(X509_STORE *store, int (*verify_cb)(int, X509_STORE_CTX *)) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - X509_STORE_set_verify_cb_func(store, verify_cb); - #else - if (K_X509_STORE_set_verify_cb) { -@@ -1043,7 +1043,7 @@ X509_NAME *KOpenSSLProxy::X509_get_issuer_name(X509 *a - - void KOpenSSLProxy::X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **algor, const X509 *x) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if (psig) { - *psig = x->signature; - } -@@ -1121,7 +1121,7 @@ X509 *KOpenSSLProxy::X509_dup(X509 *x509) - - ASN1_TIME *KOpenSSLProxy::X509_getm_notBefore(const X509 *x) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return X509_get_notBefore(x); - #else - if (K_X509_getm_notBefore) { -@@ -1134,7 +1134,7 @@ ASN1_TIME *KOpenSSLProxy::X509_getm_notBefore(const X5 - - ASN1_TIME *KOpenSSLProxy::X509_getm_notAfter(const X509 *x) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return X509_get_notAfter(x); - #else - if (K_X509_getm_notAfter) { -@@ -1412,7 +1412,7 @@ void KOpenSSLProxy::X509_STORE_CTX_set_purpose(X509_ST - - X509 *KOpenSSLProxy::X509_STORE_CTX_get_current_cert(X509_STORE_CTX *v) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return v->current_cert; - #else - if (K_X509_STORE_CTX_get_current_cert) { -@@ -1425,7 +1425,7 @@ X509 *KOpenSSLProxy::X509_STORE_CTX_get_current_cert(X - - void KOpenSSLProxy::X509_STORE_CTX_set_error(X509_STORE_CTX *v, int error) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - v->error = error; - #else - if (K_X509_STORE_CTX_set_error) { -@@ -1436,7 +1436,7 @@ void KOpenSSLProxy::X509_STORE_CTX_set_error(X509_STOR - - int KOpenSSLProxy::X509_STORE_CTX_get_error(X509_STORE_CTX *v) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return v->error; - #else - if (K_X509_STORE_CTX_get_error) { -@@ -1893,7 +1893,7 @@ int KOpenSSLProxy::EVP_PKEY_assign(EVP_PKEY *pkey, int - - int KOpenSSLProxy::EVP_PKEY_base_id(EVP_PKEY *pkey) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return pkey->type; - #else - if (K_EVP_PKEY_base_id) { -@@ -1906,7 +1906,7 @@ int KOpenSSLProxy::EVP_PKEY_base_id(EVP_PKEY *pkey) - - RSA *KOpenSSLProxy::EVP_PKEY_get0_RSA(EVP_PKEY *pkey) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return pkey->pkey.rsa; - #else - if (K_EVP_PKEY_get0_RSA) { -@@ -1919,7 +1919,7 @@ RSA *KOpenSSLProxy::EVP_PKEY_get0_RSA(EVP_PKEY *pkey) - - void KOpenSSLProxy::RSA_get0_key(RSA *rsa, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if (n) { - *n = rsa->n; - } -@@ -1938,7 +1938,7 @@ void KOpenSSLProxy::RSA_get0_key(RSA *rsa, const BIGNU - - DSA *KOpenSSLProxy::EVP_PKEY_get0_DSA(EVP_PKEY *pkey) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - return pkey->pkey.dsa; - #else - if (K_EVP_PKEY_get0_DSA) { -@@ -1951,7 +1951,7 @@ DSA *KOpenSSLProxy::EVP_PKEY_get0_DSA(EVP_PKEY *pkey) - - void KOpenSSLProxy::DSA_get0_pqg(DSA *dsa, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if (p) { - *p = dsa->p; - } -@@ -1970,7 +1970,7 @@ void KOpenSSLProxy::DSA_get0_pqg(DSA *dsa, const BIGNU - - void KOpenSSLProxy::DSA_get0_key(DSA *dsa, const BIGNUM **pub_key, const BIGNUM **priv_key) - { --#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if (pub_key) { - *pub_key = dsa->pub_key; - } diff --git a/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp b/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp deleted file mode 100644 index f43c8e07ac38..000000000000 --- a/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp +++ /dev/null @@ -1,11 +0,0 @@ ---- src/kssl/ksslcertificate.cpp.orig 2022-10-19 06:09:59 UTC -+++ src/kssl/ksslcertificate.cpp -@@ -1222,7 +1222,7 @@ QByteArray KSSLCertificate::toNetscape() - { - QByteArray qba; - // no equivalent in OpenSSL 1.1.0 (?), so behave as if we had no OpenSSL at all --#if KSSL_HAVE_SSL && (OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)) -+#if KSSL_HAVE_SSL && OPENSSL_VERSION_NUMBER < 0x10100000L - NETSCAPE_X509 nx; - ASN1_OCTET_STRING hdr; - QTemporaryFile ktf; |