aboutsummaryrefslogtreecommitdiff
path: root/x11/kf5-kdelibs4support
diff options
context:
space:
mode:
authorTobias C. Berner <tcberner@FreeBSD.org>2023-06-06 06:23:30 +0000
committerTobias C. Berner <tcberner@FreeBSD.org>2023-06-29 17:56:44 +0000
commit5ab3f1019c15b138158370eb5bae8db87d98fecd (patch)
tree1ad7e926ba574f8a2db1f06ba5b28d942738ab0f /x11/kf5-kdelibs4support
parent690a4945d92024c4253fc9ec61ed6832eee2da13 (diff)
downloadports-5ab3f1019c15b138158370eb5bae8db87d98fecd.tar.gz
ports-5ab3f1019c15b138158370eb5bae8db87d98fecd.zip
KDE: Update KDE Frameworks to 5.107
Saturday, 10 June 2023 KDE today announces the release of KDE Frameworks 5.107.0. KDE Frameworks are 83 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the KDE Frameworks release announcement. This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner. PR: 272099 Exp-run by: antoine
Diffstat (limited to 'x11/kf5-kdelibs4support')
-rw-r--r--x11/kf5-kdelibs4support/distinfo6
-rw-r--r--x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp119
-rw-r--r--x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp11
3 files changed, 3 insertions, 133 deletions
diff --git a/x11/kf5-kdelibs4support/distinfo b/x11/kf5-kdelibs4support/distinfo
index 211a2d96cf9e..34571be404ef 100644
--- a/x11/kf5-kdelibs4support/distinfo
+++ b/x11/kf5-kdelibs4support/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1683711495
-SHA256 (KDE/frameworks/5.106.0/kdelibs4support-5.106.0.tar.xz) = ce71650a1c379bdb75726c508e60695855c158ce2e8ea44aacb69d787e2a9cab
-SIZE (KDE/frameworks/5.106.0/kdelibs4support-5.106.0.tar.xz) = 3721228
+TIMESTAMP = 1686028532
+SHA256 (KDE/frameworks/5.107.0/kdelibs4support-5.107.0.tar.xz) = ef94568b687230734725d2a74108ff869c0beeb6d3476503265719e182660c8f
+SIZE (KDE/frameworks/5.107.0/kdelibs4support-5.107.0.tar.xz) = 3721328
diff --git a/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp b/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp
deleted file mode 100644
index d989c72082a3..000000000000
--- a/x11/kf5-kdelibs4support/files/patch-src_kssl_kopenssl.cpp
+++ /dev/null
@@ -1,119 +0,0 @@
---- src/kssl/kopenssl.cpp.orig 2022-10-19 06:07:48 UTC
-+++ src/kssl/kopenssl.cpp
-@@ -978,7 +978,7 @@ void KOpenSSLProxy::X509_STORE_free(X509_STORE *v)
-
- void KOpenSSLProxy::X509_STORE_set_verify_cb(X509_STORE *store, int (*verify_cb)(int, X509_STORE_CTX *))
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- X509_STORE_set_verify_cb_func(store, verify_cb);
- #else
- if (K_X509_STORE_set_verify_cb) {
-@@ -1043,7 +1043,7 @@ X509_NAME *KOpenSSLProxy::X509_get_issuer_name(X509 *a
-
- void KOpenSSLProxy::X509_get0_signature(const ASN1_BIT_STRING **psig, const X509_ALGOR **algor, const X509 *x)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- if (psig) {
- *psig = x->signature;
- }
-@@ -1121,7 +1121,7 @@ X509 *KOpenSSLProxy::X509_dup(X509 *x509)
-
- ASN1_TIME *KOpenSSLProxy::X509_getm_notBefore(const X509 *x)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return X509_get_notBefore(x);
- #else
- if (K_X509_getm_notBefore) {
-@@ -1134,7 +1134,7 @@ ASN1_TIME *KOpenSSLProxy::X509_getm_notBefore(const X5
-
- ASN1_TIME *KOpenSSLProxy::X509_getm_notAfter(const X509 *x)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return X509_get_notAfter(x);
- #else
- if (K_X509_getm_notAfter) {
-@@ -1412,7 +1412,7 @@ void KOpenSSLProxy::X509_STORE_CTX_set_purpose(X509_ST
-
- X509 *KOpenSSLProxy::X509_STORE_CTX_get_current_cert(X509_STORE_CTX *v)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return v->current_cert;
- #else
- if (K_X509_STORE_CTX_get_current_cert) {
-@@ -1425,7 +1425,7 @@ X509 *KOpenSSLProxy::X509_STORE_CTX_get_current_cert(X
-
- void KOpenSSLProxy::X509_STORE_CTX_set_error(X509_STORE_CTX *v, int error)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- v->error = error;
- #else
- if (K_X509_STORE_CTX_set_error) {
-@@ -1436,7 +1436,7 @@ void KOpenSSLProxy::X509_STORE_CTX_set_error(X509_STOR
-
- int KOpenSSLProxy::X509_STORE_CTX_get_error(X509_STORE_CTX *v)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return v->error;
- #else
- if (K_X509_STORE_CTX_get_error) {
-@@ -1893,7 +1893,7 @@ int KOpenSSLProxy::EVP_PKEY_assign(EVP_PKEY *pkey, int
-
- int KOpenSSLProxy::EVP_PKEY_base_id(EVP_PKEY *pkey)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return pkey->type;
- #else
- if (K_EVP_PKEY_base_id) {
-@@ -1906,7 +1906,7 @@ int KOpenSSLProxy::EVP_PKEY_base_id(EVP_PKEY *pkey)
-
- RSA *KOpenSSLProxy::EVP_PKEY_get0_RSA(EVP_PKEY *pkey)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return pkey->pkey.rsa;
- #else
- if (K_EVP_PKEY_get0_RSA) {
-@@ -1919,7 +1919,7 @@ RSA *KOpenSSLProxy::EVP_PKEY_get0_RSA(EVP_PKEY *pkey)
-
- void KOpenSSLProxy::RSA_get0_key(RSA *rsa, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- if (n) {
- *n = rsa->n;
- }
-@@ -1938,7 +1938,7 @@ void KOpenSSLProxy::RSA_get0_key(RSA *rsa, const BIGNU
-
- DSA *KOpenSSLProxy::EVP_PKEY_get0_DSA(EVP_PKEY *pkey)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- return pkey->pkey.dsa;
- #else
- if (K_EVP_PKEY_get0_DSA) {
-@@ -1951,7 +1951,7 @@ DSA *KOpenSSLProxy::EVP_PKEY_get0_DSA(EVP_PKEY *pkey)
-
- void KOpenSSLProxy::DSA_get0_pqg(DSA *dsa, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- if (p) {
- *p = dsa->p;
- }
-@@ -1970,7 +1970,7 @@ void KOpenSSLProxy::DSA_get0_pqg(DSA *dsa, const BIGNU
-
- void KOpenSSLProxy::DSA_get0_key(DSA *dsa, const BIGNUM **pub_key, const BIGNUM **priv_key)
- {
--#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
-+#if OPENSSL_VERSION_NUMBER < 0x10100000L
- if (pub_key) {
- *pub_key = dsa->pub_key;
- }
diff --git a/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp b/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp
deleted file mode 100644
index f43c8e07ac38..000000000000
--- a/x11/kf5-kdelibs4support/files/patch-src_kssl_ksslcertificate.cpp
+++ /dev/null
@@ -1,11 +0,0 @@
---- src/kssl/ksslcertificate.cpp.orig 2022-10-19 06:09:59 UTC
-+++ src/kssl/ksslcertificate.cpp
-@@ -1222,7 +1222,7 @@ QByteArray KSSLCertificate::toNetscape()
- {
- QByteArray qba;
- // no equivalent in OpenSSL 1.1.0 (?), so behave as if we had no OpenSSL at all
--#if KSSL_HAVE_SSL && (OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER))
-+#if KSSL_HAVE_SSL && OPENSSL_VERSION_NUMBER < 0x10100000L
- NETSCAPE_X509 nx;
- ASN1_OCTET_STRING hdr;
- QTemporaryFile ktf;