summaryrefslogtreecommitdiff
path: root/dev-libs/beecrypt
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2017-12-01 23:54:25 +0000
committerV3n3RiX <venerix@redcorelinux.org>2017-12-01 23:54:25 +0000
commitf443475c824b4b5c086e6d040961cb35ad81bc60 (patch)
tree6a6b4078e5565d11ab153a37a39af2d57becea34 /dev-libs/beecrypt
parent407525b571b48cfd65e1ad7a02d250a927c967c9 (diff)
gentoo resync : 02.12.2017
Diffstat (limited to 'dev-libs/beecrypt')
-rw-r--r--dev-libs/beecrypt/Manifest5
-rw-r--r--dev-libs/beecrypt/beecrypt-4.2.1-r4.ebuild1
-rw-r--r--dev-libs/beecrypt/files/beecrypt-4.2.1-cast-uchar.patch214
3 files changed, 218 insertions, 2 deletions
diff --git a/dev-libs/beecrypt/Manifest b/dev-libs/beecrypt/Manifest
index 8334c240bd8d..af099409eb9f 100644
--- a/dev-libs/beecrypt/Manifest
+++ b/dev-libs/beecrypt/Manifest
@@ -1,6 +1,7 @@
AUX beecrypt-4.2.1-build-system.patch 3796 BLAKE2B 2b89dcd9c8c06420100d9c59e75c07368705f853e3cfe1f301fb4c1c2246545d55ae64f10ced7b3a1d8772b5b8ce2ff1dac86a157b9f715fbe131ef3e98fb9cc SHA512 6f13707e238cd2602c1482554381fc4ffb59d367fc095453ae05c7bc17438552745b304ce2ad5c071a367a0a90809173682676a392396521e20006f214db0c46
AUX beecrypt-4.2.1-c++11-allow-throw-in-destructors.patch 734 BLAKE2B a0997dde4da38d681fc8cb2858eaf40e8e4ce6b90aafb0c53fb2b268cad41eefb8a0fce5d708bdd5509357ca77d52cec0dbbf2455f3498a08743db7ea37b53a9 SHA512 b6963a089587ecb495f097a890b57375f4580308f935424883ec0e694bf88848cded2e8108edc01f0887b6a8151437c94b7a2cd5bbdc48df151e16ea4755d2e4
+AUX beecrypt-4.2.1-cast-uchar.patch 8230 BLAKE2B ee94bf2e741e2c250ac4dbd6dbc7b2f5af4bbec8db5c87f7faefa381e8d973159f2b1a5e74189511eb43d200b7617cafd5cec18e23eaa69c99b68113fcf5998f SHA512 d344979022ea1e7ed2b7894bf9015996488cb5ec7c458aaad93a639ce457a1b790ba9e51b5369318566eb9ffc0df12d0b4108fd2997aa21c886dc079b836e973
AUX beecrypt-4.2.1-gcc-4.7.patch 262 BLAKE2B a99fa0e61728bd38510622a1770c3ecad156654dd79a2e380a0aaf48cd895d1308964a4dbc0ebcbbed978f78c066e4e480e193eeeb9b0e941828301256b0cabb SHA512 908d688ae29f23a3f67cb1ddf8d2f5277853abbf6fe291e371fa8595b8c6c5e4293c1c15b80171270639b9d4f092b4602bbd5144448c4f19ff958d5522edbc77
-DIST beecrypt-4.2.1.tar.gz 882758 SHA256 286f1f56080d1a6b1d024003a5fa2158f4ff82cae0c6829d3c476a4b5898c55d SHA512 59995d53c024efe6344a21ac0d6d55fbe652488a4a22cc6719f9fc3851d56697fa8738937d48aa1e6f9ebe749de61ac3c79a5f0cea793872213c3bdf922e71bc WHIRLPOOL c4a0371d8e2cf37194800867c58e77d72bb59ab464fdff9c561230ece0f288dabdebfdd0ac13382c9ebe45b455ffbfdd81e6a15969dcb86d3d8c8e6635e294bb
-EBUILD beecrypt-4.2.1-r4.ebuild 2054 BLAKE2B 30e178a7d9abd163a206d175c6b54b5e4466a9e63e6978555d3e5c38228f6487b993a674cf78dd2badf7b792837b8d7b4e4398363e230bc71ec0c1b64e782c4e SHA512 b131f25372dec86dd22c57163a855d560db8b28a222711b40827e4b156c3469c8900fcc77386a36602068661cd0733e08358de52608aeafe656969bf6f59a289
+DIST beecrypt-4.2.1.tar.gz 882758 BLAKE2B 7ca25613cf95df8657c762d932618979783ea2ddfbaecdf066701d61a5f9ac76bd474a51eb65e140c83ef01880477cb7104e3d67c2fc078ae7b710637d18bb53 SHA512 59995d53c024efe6344a21ac0d6d55fbe652488a4a22cc6719f9fc3851d56697fa8738937d48aa1e6f9ebe749de61ac3c79a5f0cea793872213c3bdf922e71bc
+EBUILD beecrypt-4.2.1-r4.ebuild 2099 BLAKE2B 8ba4066a84105a8e6c90cf0baef87d96764eb89f611438b0fe8579d549003cc31ebde98519fdc77475ef46b5f143e10b040209ff9621cb0749d44e61f79526cb SHA512 34a7f2c9a0fb97b69b62db41e587872e80cac7d4b6733dd6084ff99cf53c5e7b213925abc53821fcd5a579bd40cdc07219e4a27315d6fef4f41161671f5fc809
MISC metadata.xml 245 BLAKE2B a937157650e974ab296da9c19930deffad940d0c256541ea0338121f36fde942eb41529c5f3f39d37fdd3fe6e30eb8e9b987a0cb5c2b7736ff837c2e332ddf95 SHA512 7da531ddd382748b46b2be3d6324c0f654e772ca0d1b87884a5de0ae1f4cf8a6e32d9cd0e4b87b7fd632aa176f873d7e315adbb974c367b4539045fdeffde98b
diff --git a/dev-libs/beecrypt/beecrypt-4.2.1-r4.ebuild b/dev-libs/beecrypt/beecrypt-4.2.1-r4.ebuild
index 4d835cb2cd94..69a3ccb8f34f 100644
--- a/dev-libs/beecrypt/beecrypt-4.2.1-r4.ebuild
+++ b/dev-libs/beecrypt/beecrypt-4.2.1-r4.ebuild
@@ -38,6 +38,7 @@ PATCHES=(
# Fixes bug 596904
"${FILESDIR}"/${P}-c++11-allow-throw-in-destructors.patch
+ "${FILESDIR}"/${P}-cast-uchar.patch #618676
)
pkg_setup() {
diff --git a/dev-libs/beecrypt/files/beecrypt-4.2.1-cast-uchar.patch b/dev-libs/beecrypt/files/beecrypt-4.2.1-cast-uchar.patch
new file mode 100644
index 000000000000..8efedc01e4aa
--- /dev/null
+++ b/dev-libs/beecrypt/files/beecrypt-4.2.1-cast-uchar.patch
@@ -0,0 +1,214 @@
+beecrypt's c++ api uses jchar arrays for strings, while ICU 59 expects
+char16_t type
+
+In practice these both seem to be defined as short int on amd64 so it
+might be okay to just reinterpret_cast them? There's probably no easy
+way out on a platform where char16_t won't match jchar
+
+Patch by Valeriy Malov <jazzvoid@gmail.com>
+https://bugs.gentoo.org/618676
+
+--- a/c++/io/DataInputStream.cxx
++++ b/c++/io/DataInputStream.cxx
+@@ -201,7 +201,7 @@ String DataInputStream::readUTF() throw (IOException)
+ jchar* buffer = new jchar[ulen+1];
+
+ status = U_ZERO_ERROR;
+- ucnv_toUChars(_utf, buffer, ulen+1, (const char*) data, (jint) utflen, &status);
++ ucnv_toUChars(_utf, reinterpret_cast<UChar*>(buffer), ulen+1, (const char*) data, (jint) utflen, &status);
+
+ delete[] data;
+
+@@ -232,7 +232,7 @@ String DataInputStream::readLine() throw (IOException)
+
+ array<jchar> target_buffer(80);
+ jint target_offset = 0;
+- UChar* target = target_buffer.data();
++ UChar* target = reinterpret_cast<UChar*>(target_buffer.data());
+ const UChar* target_limit = target+1;
+ char source_buffer[MAX_BYTES_PER_CHARACTER];
+ const char* source = source_buffer;
+--- a/c++/io/DataOutputStream.cxx
++++ b/c++/io/DataOutputStream.cxx
+@@ -187,7 +187,7 @@ void DataOutputStream::writeUTF(const String& str) throw (IOException)
+ const array<jchar>& src = str.toCharArray();
+
+ // the expected status code here is U_BUFFER_OVERFLOW_ERROR
+- jint need = ucnv_fromUChars(_utf, 0, 0, src.data(), src.size(), &status);
++ jint need = ucnv_fromUChars(_utf, 0, 0, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (U_FAILURE(status))
+ if (status != U_BUFFER_OVERFLOW_ERROR)
+ throw IOException("ucnv_fromUChars failed");
+@@ -200,7 +200,7 @@ void DataOutputStream::writeUTF(const String& str) throw (IOException)
+ status = U_ZERO_ERROR;
+
+ // the expected status code here is U_STRING_NOT_TERMINATED_WARNING
+- ucnv_fromUChars(_utf, (char*) buffer, need, src.data(), src.size(), &status);
++ ucnv_fromUChars(_utf, (char*) buffer, need, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (status != U_STRING_NOT_TERMINATED_WARNING)
+ {
+ delete[] buffer;
+--- a/c++/io/PrintStream.cxx
++++ b/c++/io/PrintStream.cxx
+@@ -191,7 +191,7 @@ void PrintStream::print(jchar ch) throw ()
+ UErrorCode status = U_ZERO_ERROR;
+
+ // do conversion of one character
+- size_t used = ucnv_fromUChars(_loc, buffer, 8, &ch, 1, &status);
++ size_t used = ucnv_fromUChars(_loc, buffer, 8, reinterpret_cast<UChar*>(&ch), 1, &status);
+ if (U_FAILURE(status))
+ throw IOException("failure in ucnv_fromUChars");
+
+@@ -268,14 +268,14 @@ void PrintStream::print(jlong x) throw ()
+
+ void PrintStream::print(const array<jchar>& chars) throw ()
+ {
+- print(chars.data(), chars.size());
++ print(reinterpret_cast<const UChar*>(chars.data()), chars.size());
+ }
+
+ void PrintStream::print(const String& str) throw ()
+ {
+ const array<jchar>& tmp = str.toCharArray();
+
+- print(tmp.data(), tmp.size());
++ print(reinterpret_cast<const UChar*>(tmp.data()), tmp.size());
+ }
+
+ void PrintStream::println() throw ()
+--- a/c++/lang/String.cxx
++++ b/c++/lang/String.cxx
+@@ -33,6 +33,8 @@ using namespace beecrypt::lang;
+ #include <unicode/ustdio.h>
+ #include <unicode/ustring.h>
+
++static_assert(sizeof(jchar) == sizeof(UChar), "jchar and UChar sizes mismatch");
++
+ String::String(array<jchar>& swapWith)
+ {
+ assert(swapWith.size() <= Integer::MAX_VALUE);
+@@ -56,7 +58,7 @@ String::String()
+
+ String::String(char c) : _value(1)
+ {
+- u_charsToUChars(&c, _value.data(), 1);
++ u_charsToUChars(&c, reinterpret_cast<UChar*>(_value.data()), 1);
+ }
+
+ String::String(jchar c) : _value(&c, 1)
+@@ -67,7 +69,7 @@ String::String(const char* value) : _value(::strlen(value))
+ {
+ assert(_value.size() <= Integer::MAX_VALUE);
+
+- u_charsToUChars(value, _value.data(), _value.size());
++ u_charsToUChars(value, reinterpret_cast<UChar*>(_value.data()), _value.size());
+ }
+
+ String::String(const jchar* value, int offset, int length) : _value(value+offset, length)
+@@ -449,7 +451,7 @@ std::ostream& beecrypt::lang::operator<<(std::ostream& stream, const String& str
+ if (U_FAILURE(status))
+ throw RuntimeException("ucnv_open failed");
+
+- int need = ucnv_fromUChars(loc, 0, 0, src.data(), src.size(), &status);
++ int need = ucnv_fromUChars(loc, 0, 0, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (U_FAILURE(status))
+ if (status != U_BUFFER_OVERFLOW_ERROR)
+ throw RuntimeException("ucnv_fromUChars failed");
+@@ -458,7 +460,7 @@ std::ostream& beecrypt::lang::operator<<(std::ostream& stream, const String& str
+
+ status = U_ZERO_ERROR;
+
+- ucnv_fromUChars(loc, out, need+1, src.data(), src.size(), &status);
++ ucnv_fromUChars(loc, out, need+1, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (U_FAILURE(status))
+ throw RuntimeException("ucnv_fromUChars failed");
+
+--- a/c++/lang/StringBuffer.cxx
++++ b/c++/lang/StringBuffer.cxx
+@@ -35,7 +35,7 @@ StringBuffer::StringBuffer() : _buffer(16)
+
+ StringBuffer::StringBuffer(const char* s) : _buffer(16 + strlen(s))
+ {
+- u_charsToUChars(s, _buffer.data(), _used = strlen(s));
++ u_charsToUChars(s, reinterpret_cast<UChar*>(_buffer.data()), _used = strlen(s));
+ }
+
+ StringBuffer::StringBuffer(const String& s) : _buffer(16 + s._value.size())
+@@ -53,7 +53,7 @@ StringBuffer& StringBuffer::append(char c)
+ synchronized (this)
+ {
+ core_ensureCapacity(_used+1);
+- u_charsToUChars(&c, _buffer.data() + _used++, 1);
++ u_charsToUChars(&c, reinterpret_cast<UChar*>(_buffer.data() + _used++), 1);
+ }
+ return *this;
+ }
+@@ -88,7 +88,7 @@ StringBuffer& StringBuffer::append(const char* s)
+ jint need = strlen(s);
+
+ core_ensureCapacity(_used + need);
+- u_charsToUChars(s, _buffer.data() + _used, need);
++ u_charsToUChars(s, reinterpret_cast<UChar*>(_buffer.data() + _used), need);
+
+ _used += need;
+ }
+--- a/c++/lang/StringBuilder.cxx
++++ b/c++/lang/StringBuilder.cxx
+@@ -38,7 +38,7 @@ StringBuilder::StringBuilder() : _buffer(16)
+
+ StringBuilder::StringBuilder(const char* s) : _buffer(16 + strlen(s))
+ {
+- u_charsToUChars(s, _buffer.data(), _used = strlen(s));
++ u_charsToUChars(s, reinterpret_cast<UChar*>(_buffer.data()), _used = strlen(s));
+ }
+
+ StringBuilder::StringBuilder(const String& s) : _buffer(16 + s._value.size())
+@@ -55,7 +55,7 @@ StringBuilder& StringBuilder::append(char c)
+ {
+ ensureCapacity(_used+1);
+
+- u_charsToUChars(&c, _buffer.data() + _used++, 1);
++ u_charsToUChars(&c, reinterpret_cast<UChar*>(_buffer.data() + _used++), 1);
+
+ return *this;
+ }
+@@ -97,7 +97,7 @@ StringBuilder& StringBuilder::append(const char* s)
+
+ ensureCapacity(_used + need);
+
+- u_charsToUChars(s, _buffer.data() + _used, need);
++ u_charsToUChars(s, reinterpret_cast<UChar*>(_buffer.data() + _used), need);
+
+ _used += need;
+
+--- a/c++/security/Provider.cxx
++++ b/c++/security/Provider.cxx
+@@ -90,7 +90,7 @@ Object* Provider::setProperty(const String& key, const String& value)
+
+ UErrorCode status = U_ZERO_ERROR;
+
+- ucnv_fromUChars(_conv, symname, 1024, src.data(), src.size(), &status);
++ ucnv_fromUChars(_conv, symname, 1024, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+
+ if (status != U_ZERO_ERROR)
+ throw RuntimeException("error in ucnv_fromUChars");
+--- a/c++/security/Security.cxx
++++ b/c++/security/Security.cxx
+@@ -104,7 +104,7 @@ void Security::initialize()
+
+ const array<jchar>& src = value->toCharArray();
+
+- int need = ucnv_fromUChars(_loc, 0, 0, src.data(), src.size(), &status);
++ int need = ucnv_fromUChars(_loc, 0, 0, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (U_FAILURE(status))
+ if (status != U_BUFFER_OVERFLOW_ERROR)
+ throw RuntimeException("ucnv_fromUChars failed");
+@@ -112,7 +112,7 @@ void Security::initialize()
+ char* shared_library = new char[need+1];
+
+ status = U_ZERO_ERROR;
+- ucnv_fromUChars(_loc, shared_library, need+1, src.data(), src.size(), &status);
++ ucnv_fromUChars(_loc, shared_library, need+1, reinterpret_cast<const UChar*>(src.data()), src.size(), &status);
+ if (U_FAILURE(status))
+ throw RuntimeException("ucnv_fromUChars failed");
+