summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSamuli Suominen <ssuominen@gentoo.org>2010-02-05 21:04:44 +0000
committerSamuli Suominen <ssuominen@gentoo.org>2010-02-05 21:04:44 +0000
commitf52eb77f5d71a16eff0a9da56941a1c89f64112c (patch)
tree9ad4bdc58f26b61c0d53b3dd4333c7725554499b /media-libs/tiff
parentFix LICENSE (#301969). Maintenance (diff)
downloadgentoo-2-f52eb77f5d71a16eff0a9da56941a1c89f64112c.tar.gz
gentoo-2-f52eb77f5d71a16eff0a9da56941a1c89f64112c.tar.bz2
gentoo-2-f52eb77f5d71a16eff0a9da56941a1c89f64112c.zip
old
(Portage version: 2.2_rc62/cvs/Linux x86_64)
Diffstat (limited to 'media-libs/tiff')
-rw-r--r--media-libs/tiff/Manifest10
-rw-r--r--media-libs/tiff/files/tiff-3.8.2-CVE-2008-2327.patch64
-rw-r--r--media-libs/tiff/files/tiff-3.8.2-CVE-2009-2285.patch6
-rw-r--r--media-libs/tiff/files/tiff-3.8.2-CVE-2009-2347.patch170
-rw-r--r--media-libs/tiff/files/tiff-3.8.2-opengl.patch19
-rw-r--r--media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch20
-rw-r--r--media-libs/tiff/files/tiff-jbig.patch510
-rw-r--r--media-libs/tiff/tiff-3.8.2-r8.ebuild61
8 files changed, 3 insertions, 857 deletions
diff --git a/media-libs/tiff/Manifest b/media-libs/tiff/Manifest
index 4a5f62f978e5..d544a07bb0c5 100644
--- a/media-libs/tiff/Manifest
+++ b/media-libs/tiff/Manifest
@@ -1,13 +1,5 @@
-AUX tiff-3.8.2-CVE-2008-2327.patch 2120 RMD160 0e38bd59939cb6e3602196142e99756de198665e SHA1 1da2ec6a47c0666cad9d07fb8427c1c75ca27b10 SHA256 a63665993ced33869981f052b78549e2cb540dad1302b8b71fcf1c8d4e730ad1
-AUX tiff-3.8.2-CVE-2009-2285.patch 848 RMD160 9c9e725a89e961bce12b9b3d1cf138f8975bc100 SHA1 70577613151cc4c5acc3c256d525c54ad8e113bf SHA256 2f8a9f0dbabf231b834e745f4394042ac72cc6bdd38655998d44a5b495d2228a
-AUX tiff-3.8.2-CVE-2009-2347.patch 5141 RMD160 5954524f45a1df709142e3d94b325f109308e48e SHA1 3017201b7f500389acfa775479a6fdd069e9a099 SHA256 f140929f8317a83adf887186d1fc667c7b5a781205174c4826292418fb8ab52d
-AUX tiff-3.8.2-opengl.patch 437 RMD160 0302bd531617fc9439aee22b3f2ec1e5d587f6cf SHA1 6c8dbec20d66ae834accc8f50ed7567a33f1fcfc SHA256 b3c112596ff5e4902cfbfa88f34937a9ea0d240f029cc4a55f9f102e6b281f9d
-AUX tiff-3.8.2-tiffsplit.patch 646 RMD160 14633a8b89b71f6c9aa027c25233854331d8633f SHA1 445b7bbdeaadf8362127173a4908f7e5f31ac30d SHA256 79f88d303634d52478fe36fff972aa133d3bf1d23ab4c8ad35d3baba40461a48
-AUX tiff-jbig.patch 14636 RMD160 88f8069cda0e1a897961e2c69e6b787a7776124d SHA1 293c174bd1137c63a85dbfc761616752d2f3644f SHA256 73e70f6cf3e63abfd7b5569e2aae0a6811020c883065dfc36d563ca2e547ccd1
-DIST tiff-3.8.2-pdfsec-patches.tar.bz2 23447 RMD160 4660ab880b3e7c308687f662fcb8dea97e06881a SHA1 1a68c97a039acb2417ca5e0493323854753f12ce SHA256 ef965b26ba9384f4c009aa9762a87d6ddc48269a430a177c4bc36b01d9c1259d
-DIST tiff-3.8.2.tar.gz 1336295 RMD160 1b4d825e3be08764e953fc58246d0c25ab4dd17d SHA1 549e67b6a15b42bfcd72fe17cda7c9a198a393eb SHA256 be88f037080b93ce0a337b2b3ca5e8195f76885deb6c558cc3aa872ee848fc76
+AUX tiff-3.8.2-CVE-2009-2285.patch 717 RMD160 6fca42b138383626becf1221ec8550935621f60b SHA1 f2daf5306efb6f0908f0046765a10bf30b2642c2 SHA256 bbe28b7dbc6f24619ad851a53d39149100069af6a5d1578b0cd9ade48d7b127b
DIST tiff-3.9.2.tar.gz 1419742 RMD160 22716e0bcee93a654a704900f3e19f41600f3d18 SHA1 5c054d31e350e53102221b7760c3700cf70b4327 SHA256 3cd566c19291ea3379115dd0d2ebcdefb6a7cf0511cc33e733ec3a500e10da69
-EBUILD tiff-3.8.2-r8.ebuild 1761 RMD160 bf9e8abe5daabbc1180459a6750185a134cfaddd SHA1 d85e9ffb6881cbd0614cba7d6e710721ab77f702 SHA256 0fbcd85540a71957916b8cc5348925d6e103b20da68af0a67f641da8300716c7
EBUILD tiff-3.9.2.ebuild 1562 RMD160 49ec862f7ac89ab768026fa62ada8741251f9f9a SHA1 a2088f621217300243d49fdf1bff018875bc41e4 SHA256 42054d25a1eebf2e6294c6ade36c704e12e5f588b4942a5640dde0d2290885a9
MISC ChangeLog 19766 RMD160 0f12d15427d2a24b1cd23d251e9c638d5adfc59d SHA1 0c1b73c748763b32523064799308510e38af92f1 SHA256 3d9dce8368a4bfd12cbe88f18e4ae580126b6741accbf7e47ba394f7719a9d7c
MISC metadata.xml 447 RMD160 8df7883ab02a353acd993037450e7bbc984c052d SHA1 8ffef6a88ae70afbdea7f3be25e1e9a28b6698c5 SHA256 ee7391b2521ef9676ead67466ad7249f05f8d3c9bd8d8984bc0ceac8dcb804b3
diff --git a/media-libs/tiff/files/tiff-3.8.2-CVE-2008-2327.patch b/media-libs/tiff/files/tiff-3.8.2-CVE-2008-2327.patch
deleted file mode 100644
index e6d74a67ab05..000000000000
--- a/media-libs/tiff/files/tiff-3.8.2-CVE-2008-2327.patch
+++ /dev/null
@@ -1,64 +0,0 @@
-Fixes security issues in libTIFF's handling of LZW-encoded
-images. The use of uninitialized data could lead to a buffer
-underflow and a crash or arbitrary code execution.
-
-CVE-ID: CVE-2008-2327
-Security bug: https://bugs.gentoo.org/show_bug.cgi?id=234080
-
-Index: tiff-3.8.2/libtiff/tif_lzw.c
-===================================================================
---- tiff-3.8.2.orig/libtiff/tif_lzw.c
-+++ tiff-3.8.2/libtiff/tif_lzw.c
-@@ -237,6 +237,12 @@ LZWSetupDecode(TIFF* tif)
- sp->dec_codetab[code].length = 1;
- sp->dec_codetab[code].next = NULL;
- } while (code--);
-+ /*
-+ * Zero-out the unused entries
-+ */
-+ _TIFFmemset(&sp->dec_codetab[CODE_CLEAR], 0,
-+ (CODE_FIRST-CODE_CLEAR)*sizeof (code_t));
-+
- }
- return (1);
- }
-@@ -408,12 +414,19 @@ LZWDecode(TIFF* tif, tidata_t op0, tsize
- break;
- if (code == CODE_CLEAR) {
- free_entp = sp->dec_codetab + CODE_FIRST;
-+ _TIFFmemset(free_entp, 0, (CSIZE-CODE_FIRST)*sizeof (code_t));
- nbits = BITS_MIN;
- nbitsmask = MAXCODE(BITS_MIN);
- maxcodep = sp->dec_codetab + nbitsmask-1;
- NextCode(tif, sp, bp, code, GetNextCode);
- if (code == CODE_EOI)
- break;
-+ if (code == CODE_CLEAR) {
-+ TIFFErrorExt(tif->tif_clientdata, tif->tif_name,
-+ "LZWDecode: Corrupted LZW table at scanline %d",
-+ tif->tif_row);
-+ return (0);
-+ }
- *op++ = (char)code, occ--;
- oldcodep = sp->dec_codetab + code;
- continue;
-@@ -604,12 +617,19 @@ LZWDecodeCompat(TIFF* tif, tidata_t op0,
- break;
- if (code == CODE_CLEAR) {
- free_entp = sp->dec_codetab + CODE_FIRST;
-+ _TIFFmemset(free_entp, 0, (CSIZE-CODE_FIRST)*sizeof (code_t));
- nbits = BITS_MIN;
- nbitsmask = MAXCODE(BITS_MIN);
- maxcodep = sp->dec_codetab + nbitsmask;
- NextCode(tif, sp, bp, code, GetNextCodeCompat);
- if (code == CODE_EOI)
- break;
-+ if (code == CODE_CLEAR) {
-+ TIFFErrorExt(tif->tif_clientdata, tif->tif_name,
-+ "LZWDecode: Corrupted LZW table at scanline %d",
-+ tif->tif_row);
-+ return (0);
-+ }
- *op++ = code, occ--;
- oldcodep = sp->dec_codetab + code;
- continue;
diff --git a/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2285.patch b/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2285.patch
index 3eeb75668362..6cca90184d9f 100644
--- a/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2285.patch
+++ b/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2285.patch
@@ -1,7 +1,5 @@
-Index: tiff-3.8.2/libtiff/tif_lzw.c
-===================================================================
---- tiff-3.8.2.orig/libtiff/tif_lzw.c
-+++ tiff-3.8.2/libtiff/tif_lzw.c
+--- libtiff/tif_lzw.c
++++ libtiff/tif_lzw.c
@@ -421,7 +421,7 @@ LZWDecode(TIFF* tif, tidata_t op0, tsize
NextCode(tif, sp, bp, code, GetNextCode);
if (code == CODE_EOI)
diff --git a/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2347.patch b/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2347.patch
deleted file mode 100644
index 039d7336a27b..000000000000
--- a/media-libs/tiff/files/tiff-3.8.2-CVE-2009-2347.patch
+++ /dev/null
@@ -1,170 +0,0 @@
-Fix several places in tiff2rgba and rgb2ycbcr that were being careless about
-possible integer overflow in calculation of buffer sizes.
-
-CVE-2009-2347
-
-
-diff -Naur tiff-3.8.2.orig/tools/rgb2ycbcr.c tiff-3.8.2/tools/rgb2ycbcr.c
---- tiff-3.8.2.orig/tools/rgb2ycbcr.c 2004-09-03 03:57:13.000000000 -0400
-+++ tiff-3.8.2/tools/rgb2ycbcr.c 2009-07-10 17:12:32.000000000 -0400
-@@ -202,6 +202,17 @@
- #undef LumaBlue
- #undef V2Code
-
-+static tsize_t
-+multiply(tsize_t m1, tsize_t m2)
-+{
-+ tsize_t prod = m1 * m2;
-+
-+ if (m1 && prod / m1 != m2)
-+ prod = 0; /* overflow */
-+
-+ return prod;
-+}
-+
- /*
- * Convert a strip of RGB data to YCbCr and
- * sample to generate the output data.
-@@ -278,10 +289,19 @@
- float floatv;
- char *stringv;
- uint32 longv;
-+ tsize_t raster_size;
-
- TIFFGetField(in, TIFFTAG_IMAGEWIDTH, &width);
- TIFFGetField(in, TIFFTAG_IMAGELENGTH, &height);
-- raster = (uint32*)_TIFFmalloc(width * height * sizeof (uint32));
-+
-+ raster_size = multiply(multiply(width, height), sizeof (uint32));
-+ if (!raster_size) {
-+ TIFFError(TIFFFileName(in),
-+ "Can't allocate buffer for raster of size %lux%lu",
-+ (unsigned long) width, (unsigned long) height);
-+ return (0);
-+ }
-+ raster = (uint32*)_TIFFmalloc(raster_size);
- if (raster == 0) {
- TIFFError(TIFFFileName(in), "No space for raster buffer");
- return (0);
-diff -Naur tiff-3.8.2.orig/tools/tiff2rgba.c tiff-3.8.2/tools/tiff2rgba.c
---- tiff-3.8.2.orig/tools/tiff2rgba.c 2004-11-07 06:08:37.000000000 -0500
-+++ tiff-3.8.2/tools/tiff2rgba.c 2009-07-10 17:06:42.000000000 -0400
-@@ -124,6 +124,17 @@
- return (0);
- }
-
-+static tsize_t
-+multiply(tsize_t m1, tsize_t m2)
-+{
-+ tsize_t prod = m1 * m2;
-+
-+ if (m1 && prod / m1 != m2)
-+ prod = 0; /* overflow */
-+
-+ return prod;
-+}
-+
- static int
- cvt_by_tile( TIFF *in, TIFF *out )
-
-@@ -133,6 +144,7 @@
- uint32 tile_width, tile_height;
- uint32 row, col;
- uint32 *wrk_line;
-+ tsize_t raster_size;
- int ok = 1;
-
- TIFFGetField(in, TIFFTAG_IMAGEWIDTH, &width);
-@@ -150,7 +162,14 @@
- /*
- * Allocate tile buffer
- */
-- raster = (uint32*)_TIFFmalloc(tile_width * tile_height * sizeof (uint32));
-+ raster_size = multiply(multiply(tile_width, tile_height), sizeof (uint32));
-+ if (!raster_size) {
-+ TIFFError(TIFFFileName(in),
-+ "Can't allocate buffer for raster of size %lux%lu",
-+ (unsigned long) tile_width, (unsigned long) tile_height);
-+ return (0);
-+ }
-+ raster = (uint32*)_TIFFmalloc(raster_size);
- if (raster == 0) {
- TIFFError(TIFFFileName(in), "No space for raster buffer");
- return (0);
-@@ -158,7 +177,7 @@
-
- /*
- * Allocate a scanline buffer for swapping during the vertical
-- * mirroring pass.
-+ * mirroring pass. (Request can't overflow given prior checks.)
- */
- wrk_line = (uint32*)_TIFFmalloc(tile_width * sizeof (uint32));
- if (!wrk_line) {
-@@ -226,6 +245,7 @@
- uint32 width, height; /* image width & height */
- uint32 row;
- uint32 *wrk_line;
-+ tsize_t raster_size;
- int ok = 1;
-
- TIFFGetField(in, TIFFTAG_IMAGEWIDTH, &width);
-@@ -241,7 +261,14 @@
- /*
- * Allocate strip buffer
- */
-- raster = (uint32*)_TIFFmalloc(width * rowsperstrip * sizeof (uint32));
-+ raster_size = multiply(multiply(width, rowsperstrip), sizeof (uint32));
-+ if (!raster_size) {
-+ TIFFError(TIFFFileName(in),
-+ "Can't allocate buffer for raster of size %lux%lu",
-+ (unsigned long) width, (unsigned long) rowsperstrip);
-+ return (0);
-+ }
-+ raster = (uint32*)_TIFFmalloc(raster_size);
- if (raster == 0) {
- TIFFError(TIFFFileName(in), "No space for raster buffer");
- return (0);
-@@ -249,7 +276,7 @@
-
- /*
- * Allocate a scanline buffer for swapping during the vertical
-- * mirroring pass.
-+ * mirroring pass. (Request can't overflow given prior checks.)
- */
- wrk_line = (uint32*)_TIFFmalloc(width * sizeof (uint32));
- if (!wrk_line) {
-@@ -328,14 +355,22 @@
- uint32* raster; /* retrieve RGBA image */
- uint32 width, height; /* image width & height */
- uint32 row;
--
-+ tsize_t raster_size;
-+
- TIFFGetField(in, TIFFTAG_IMAGEWIDTH, &width);
- TIFFGetField(in, TIFFTAG_IMAGELENGTH, &height);
-
- rowsperstrip = TIFFDefaultStripSize(out, rowsperstrip);
- TIFFSetField(out, TIFFTAG_ROWSPERSTRIP, rowsperstrip);
-
-- raster = (uint32*)_TIFFmalloc(width * height * sizeof (uint32));
-+ raster_size = multiply(multiply(width, height), sizeof (uint32));
-+ if (!raster_size) {
-+ TIFFError(TIFFFileName(in),
-+ "Can't allocate buffer for raster of size %lux%lu",
-+ (unsigned long) width, (unsigned long) height);
-+ return (0);
-+ }
-+ raster = (uint32*)_TIFFmalloc(raster_size);
- if (raster == 0) {
- TIFFError(TIFFFileName(in), "No space for raster buffer");
- return (0);
-@@ -353,7 +388,7 @@
- */
- if( no_alpha )
- {
-- int pixel_count = width * height;
-+ tsize_t pixel_count = (tsize_t) width * (tsize_t) height;
- unsigned char *src, *dst;
-
- src = (unsigned char *) raster;
-
diff --git a/media-libs/tiff/files/tiff-3.8.2-opengl.patch b/media-libs/tiff/files/tiff-3.8.2-opengl.patch
deleted file mode 100644
index c743376b4aba..000000000000
--- a/media-libs/tiff/files/tiff-3.8.2-opengl.patch
+++ /dev/null
@@ -1,19 +0,0 @@
---- tools/tiffgt.c.orig 2009-06-20 17:40:46.366090451 -0700
-+++ tools/tiffgt.c 2009-06-20 17:48:04.042265738 -0700
-@@ -31,12 +31,12 @@
- #include <string.h>
- #include <unistd.h>
-
--#if HAVE_APPLE_OPENGL_FRAMEWORK
--# include <OpenGL/gl.h>
--# include <GLUT/glut.h>
--#else
-+#ifdef HAVE_APPLE_OPENGL_FRAMEWORK
- # include <GL/gl.h>
- # include <GL/glut.h>
-+#else
-+# include <OpenGL/gl.h>
-+# include <GLUT/glut.h>
- #endif
-
- #include "tiffio.h"
diff --git a/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch b/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
deleted file mode 100644
index 5422e74fba63..000000000000
--- a/media-libs/tiff/files/tiff-3.8.2-tiffsplit.patch
+++ /dev/null
@@ -1,20 +0,0 @@
-diff -ruN tiff-3.7.4-old/tools/tiffsplit.c tiff-3.7.4/tools/tiffsplit.c
---- tiff-3.7.4-old/tools/tiffsplit.c 2005-05-26 20:38:48.000000000 +0200
-+++ tiff-3.7.4/tools/tiffsplit.c 2006-06-01 16:00:11.000000000 +0200
-@@ -60,14 +60,13 @@
- return (-3);
- }
- if (argc > 2)
-- strcpy(fname, argv[2]);
-+ snprintf(fname, sizeof(fname), "%s", argv[2]);
- in = TIFFOpen(argv[1], "r");
- if (in != NULL) {
- do {
- char path[1024+1];
- newfilename();
-- strcpy(path, fname);
-- strcat(path, ".tif");
-+ snprintf(path, sizeof(path), "%s.tif", fname);
- out = TIFFOpen(path, TIFFIsBigEndian(in)?"wb":"wl");
- if (out == NULL)
- return (-2);
diff --git a/media-libs/tiff/files/tiff-jbig.patch b/media-libs/tiff/files/tiff-jbig.patch
deleted file mode 100644
index 58d079d63bf9..000000000000
--- a/media-libs/tiff/files/tiff-jbig.patch
+++ /dev/null
@@ -1,510 +0,0 @@
---- configure.orig 2005-09-12 06:52:41.000000000 -0700
-+++ configure 2006-06-06 19:41:22.000000000 -0700
-@@ -23648,6 +23648,25 @@
- fi
-
-
-+HAVE_JBIG=no
-+# Check whether --enable-jbig or --disable-jbig was given.
-+if test "${enable_jbig+set}" = set; then
-+ enableval="$enable_jbig"
-+ HAVE_JBIG=$enableval
-+else
-+ HAVE_JBIG=no
-+fi;
-+
-+if test "$HAVE_JBIG" = "yes" ; then
-+
-+cat >>confdefs.h <<\_ACEOF
-+#define JBIG_SUPPORT 1
-+_ACEOF
-+
-+ LIBS="-ljbig $LIBS"
-+fi
-+
-+
- # Check whether --enable-cxx or --disable-cxx was given.
- if test "${enable_cxx+set}" = set; then
- enableval="$enable_cxx"
-@@ -27680,6 +27699,7 @@
- echo " Pixar log-format algorithm: ${HAVE_PIXARLOG}"
- echo " JPEG support: ${HAVE_JPEG}"
- echo " Old JPEG support: ${HAVE_OJPEG}"
-+echo " JBIG support: ${HAVE_JBIG}"
- echo ""
- echo " C++ support: ${HAVE_CXX}"
- echo ""
---- configure.ac.orig 2005-09-12 06:52:41.000000000 -0700
-+++ configure.ac 2006-06-06 19:35:23.000000000 -0700
-@@ -387,6 +387,22 @@
- fi
-
- dnl ---------------------------------------------------------------------------
-+dnl Check for JBIG.
-+dnl ---------------------------------------------------------------------------
-+
-+HAVE_JBIG=no
-+AC_ARG_ENABLE(jbig,
-+ AS_HELP_STRING([--disable-jbig],
-+ [disable support for JBIG]),
-+ [HAVE_JBIG=$enableval], [HAVE_JBIG=no])
-+
-+if test "$HAVE_JBIG" = "yes" ; then
-+ AC_DEFINE(JBIG_SUPPORT, 1,
-+ [Support JBIG])
-+ LIBS="-ljbig $LIBS"
-+fi
-+
-+dnl ---------------------------------------------------------------------------
- dnl Check for C++.
- dnl ---------------------------------------------------------------------------
-
---- libtiff/Makefile.in.orig 2005-09-12 09:33:05.000000000 -0700
-+++ libtiff/Makefile.in 2006-06-06 19:35:23.000000000 -0700
-@@ -97,7 +97,7 @@
- tif_compress.lo tif_dir.lo tif_dirinfo.lo tif_dirread.lo \
- tif_dirwrite.lo tif_dumpmode.lo tif_error.lo tif_extension.lo \
- tif_fax3.lo tif_fax3sm.lo tif_flush.lo tif_getimage.lo \
-- tif_jpeg.lo tif_luv.lo tif_lzw.lo tif_next.lo tif_ojpeg.lo \
-+ tif_jpeg.lo tif_jbig.lo tif_luv.lo tif_lzw.lo tif_next.lo tif_ojpeg.lo \
- tif_open.lo tif_packbits.lo tif_pixarlog.lo tif_predict.lo \
- tif_print.lo tif_read.lo tif_strip.lo tif_swab.lo \
- tif_thunder.lo tif_tile.lo tif_unix.lo tif_version.lo \
-@@ -306,6 +306,7 @@
- tif_flush.c \
- tif_getimage.c \
- tif_jpeg.c \
-+ tif_jbig.c \
- tif_luv.c \
- tif_lzw.c \
- tif_next.c \
-@@ -480,6 +481,7 @@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_flush.Plo@am__quote@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_getimage.Plo@am__quote@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_jpeg.Plo@am__quote@
-+@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_jbig.Plo@am__quote@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_luv.Plo@am__quote@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_lzw.Plo@am__quote@
- @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/tif_next.Plo@am__quote@
---- libtiff/tif_config.h.in.orig 2005-07-12 09:02:04.000000000 -0700
-+++ libtiff/tif_config.h.in 2006-06-06 19:35:23.000000000 -0700
-@@ -146,6 +146,9 @@
- /* Support JPEG compression (requires IJG JPEG library) */
- #undef JPEG_SUPPORT
-
-+/* Support JBIG compression (requires JBIG-KIT library) */
-+#undef JBIG_SUPPORT
-+
- /* Support LogLuv high dynamic range encoding */
- #undef LOGLUV_SUPPORT
-
---- libtiff/tif_jbig.c.orig 2006-06-06 19:32:40.000000000 -0700
-+++ libtiff/tif_jbig.c 2006-06-06 19:35:23.000000000 -0700
-@@ -0,0 +1,340 @@
-+/*
-+ * Copyright (c) 1988-1997 Sam Leffler
-+ * Copyright (c) 1991-1997 Silicon Graphics, Inc.
-+ *
-+ * Permission to use, copy, modify, distribute, and sell this software and
-+ * its documentation for any purpose is hereby granted without fee, provided
-+ * that (i) the above copyright notices and this permission notice appear in
-+ * all copies of the software and related documentation, and (ii) the names of
-+ * Sam Leffler and Silicon Graphics may not be used in any advertising or
-+ * publicity relating to the software without the specific, prior written
-+ * permission of Sam Leffler and Silicon Graphics.
-+ *
-+ * THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND,
-+ * EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY
-+ * WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
-+ *
-+ * IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR
-+ * ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND,
-+ * OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
-+ * WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF
-+ * LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE
-+ * OF THIS SOFTWARE.
-+ */
-+
-+/*
-+ * TIFF Library.
-+ *
-+ * JBIG Compression Algorithm Support.
-+ */
-+
-+#include "tiffio.h"
-+#include "tiffiop.h"
-+
-+#ifdef JBIG_SUPPORT
-+#include "jbig.h"
-+
-+struct JBIGState
-+{
-+ uint32 recvparams; /* encoded Class 2 session params */
-+ char* subaddress; /* subaddress string */
-+ uint32 recvtime; /* time spend receiving in seconds */
-+ char* faxdcs; /* encoded fax parameters (DCS, Table 2/T.30) */
-+
-+ TIFFVGetMethod vgetparent;
-+ TIFFVSetMethod vsetparent;
-+};
-+
-+#define GetJBIGState(tif) ((struct JBIGState*)(tif)->tif_data)
-+#define N(a) (sizeof (a) / sizeof (a[0]))
-+
-+#define FIELD_RECVPARAMS (FIELD_CODEC+0)
-+#define FIELD_SUBADDRESS (FIELD_CODEC+1)
-+#define FIELD_RECVTIME (FIELD_CODEC+2)
-+#define FIELD_FAXDCS (FIELD_CODEC+3)
-+
-+static const TIFFFieldInfo jbigFieldInfo[] =
-+{
-+ {TIFFTAG_FAXRECVPARAMS, 1, 1, TIFF_LONG, FIELD_RECVPARAMS, TRUE, FALSE, "FaxRecvParams"},
-+ {TIFFTAG_FAXSUBADDRESS, -1, -1, TIFF_ASCII, FIELD_SUBADDRESS, TRUE, FALSE, "FaxSubAddress"},
-+ {TIFFTAG_FAXRECVTIME, 1, 1, TIFF_LONG, FIELD_RECVTIME, TRUE, FALSE, "FaxRecvTime"},
-+ {TIFFTAG_FAXDCS, -1, -1, TIFF_ASCII, FIELD_FAXDCS, TRUE, FALSE, "FaxDcs"},
-+};
-+
-+static int JBIGSetupDecode(TIFF* tif)
-+{
-+ if (TIFFNumberOfStrips(tif) != 1)
-+ {
-+ TIFFError("JBIG", "Multistrip images not supported in decoder");
-+ return 0;
-+ }
-+
-+ return 1;
-+}
-+
-+static int JBIGDecode(TIFF* tif, tidata_t buffer, tsize_t size, tsample_t s)
-+{
-+ struct jbg_dec_state decoder;
-+ int decodeStatus = 0;
-+ unsigned char* pImage = NULL;
-+
-+ if (isFillOrder(tif, tif->tif_dir.td_fillorder))
-+ {
-+ TIFFReverseBits(tif->tif_rawdata, tif->tif_rawdatasize);
-+ }
-+
-+ jbg_dec_init(&decoder);
-+ jbg_newlen(tif->tif_rawdata, tif->tif_rawdatasize);
-+ /*
-+ * I do not check the return status of jbg_newlen because even if this function
-+ * fails it does not necessarily mean that decoding the image will fail. It is
-+ * generally only needed for received fax images that do not contain the actual
-+ * length of the image in the BIE header. I do not log when an error occurs
-+ * because that will cause problems when converting JBIG encoded TIFF's to
-+ * PostScript. As long as the actual image length is contained in the BIE header
-+ * jbg_dec_in should succeed.
-+ */
-+
-+ decodeStatus = jbg_dec_in(&decoder, tif->tif_rawdata, tif->tif_rawdatasize, NULL);
-+ if (JBG_EOK != decodeStatus)
-+ {
-+ TIFFError("JBIG", "Error (%d) decoding: %s", decodeStatus, jbg_strerror(decodeStatus, JBG_EN));
-+ return 0;
-+ }
-+
-+ pImage = jbg_dec_getimage(&decoder, 0);
-+ _TIFFmemcpy(buffer, pImage, jbg_dec_getsize(&decoder));
-+ jbg_dec_free(&decoder);
-+ return 1;
-+}
-+
-+static int JBIGSetupEncode(TIFF* tif)
-+{
-+ TIFFDirectory* dir = &tif->tif_dir;
-+
-+ if (TIFFNumberOfStrips(tif) != 1)
-+ {
-+ TIFFError("JBIG", "Multistrip images not supported in encoder");
-+ return 0;
-+ }
-+
-+ return 1;
-+}
-+
-+static int JBIGCopyEncodedData(TIFF* tif, tidata_t pp, tsize_t cc, tsample_t s)
-+{
-+ (void) s;
-+ while (cc > 0)
-+ {
-+ tsize_t n = cc;
-+
-+ if (tif->tif_rawcc + n > tif->tif_rawdatasize)
-+ {
-+ n = tif->tif_rawdatasize - tif->tif_rawcc;
-+ }
-+
-+ assert(n > 0);
-+ _TIFFmemcpy(tif->tif_rawcp, pp, n);
-+ tif->tif_rawcp += n;
-+ tif->tif_rawcc += n;
-+ pp += n;
-+ cc -= n;
-+ if (tif->tif_rawcc >= tif->tif_rawdatasize &&
-+ !TIFFFlushData1(tif))
-+ {
-+ return (-1);
-+ }
-+ }
-+
-+ return (1);
-+}
-+
-+static void JBIGOutputBie(unsigned char* buffer, size_t len, void *userData)
-+{
-+ TIFF* tif = (TIFF*)userData;
-+
-+ if (isFillOrder(tif, tif->tif_dir.td_fillorder))
-+ {
-+ TIFFReverseBits(buffer, len);
-+ }
-+
-+ JBIGCopyEncodedData(tif, buffer, len, 0);
-+}
-+
-+static int JBIGEncode(TIFF* tif, tidata_t buffer, tsize_t size, tsample_t s)
-+{
-+ TIFFDirectory* dir = &tif->tif_dir;
-+ struct jbg_enc_state encoder;
-+
-+ jbg_enc_init(&encoder,
-+ dir->td_imagewidth,
-+ dir->td_imagelength,
-+ 1,
-+ &buffer,
-+ JBIGOutputBie,
-+ tif);
-+ /*
-+ * jbg_enc_out does the "real" encoding. As data is encoded, JBIGOutputBie
-+ * is called, which writes the data to the directory.
-+ */
-+ jbg_enc_out(&encoder);
-+ jbg_enc_free(&encoder);
-+
-+ return 1;
-+}
-+
-+static void JBIGCleanup(TIFF* tif)
-+{
-+ if (NULL != tif->tif_data)
-+ {
-+ _TIFFfree(tif->tif_data);
-+ tif->tif_data = NULL;
-+ }
-+}
-+
-+static void JBIGPrintDir(TIFF* tif, FILE* fd, long flags)
-+{
-+ struct JBIGState* codec = GetJBIGState(tif);
-+ (void)flags;
-+
-+ if (TIFFFieldSet(tif, FIELD_RECVPARAMS))
-+ {
-+ fprintf(fd,
-+ " Fax Receive Parameters: %08lx\n",
-+ (unsigned long)codec->recvparams);
-+ }
-+
-+ if (TIFFFieldSet(tif, FIELD_SUBADDRESS))
-+ {
-+ fprintf(fd,
-+ " Fax SubAddress: %s\n",
-+ codec->subaddress);
-+ }
-+
-+ if (TIFFFieldSet(tif, FIELD_RECVTIME))
-+ {
-+ fprintf(fd,
-+ " Fax Receive Time: %lu secs\n",
-+ (unsigned long)codec->recvtime);
-+ }
-+
-+ if (TIFFFieldSet(tif, FIELD_FAXDCS))
-+ {
-+ fprintf(fd,
-+ " Fax DCS: %s\n",
-+ codec->faxdcs);
-+ }
-+}
-+
-+static int JBIGVGetField(TIFF* tif, ttag_t tag, va_list ap)
-+{
-+ struct JBIGState* codec = GetJBIGState(tif);
-+
-+ switch (tag)
-+ {
-+ case TIFFTAG_FAXRECVPARAMS:
-+ *va_arg(ap, uint32*) = codec->recvparams;
-+ break;
-+
-+ case TIFFTAG_FAXSUBADDRESS:
-+ *va_arg(ap, char**) = codec->subaddress;
-+ break;
-+
-+ case TIFFTAG_FAXRECVTIME:
-+ *va_arg(ap, uint32*) = codec->recvtime;
-+ break;
-+
-+ case TIFFTAG_FAXDCS:
-+ *va_arg(ap, char**) = codec->faxdcs;
-+ break;
-+
-+ default:
-+ return (*codec->vgetparent)(tif, tag, ap);
-+ }
-+
-+ return 1;
-+}
-+
-+static int JBIGVSetField(TIFF* tif, ttag_t tag, va_list ap)
-+{
-+ struct JBIGState* codec = GetJBIGState(tif);
-+
-+ switch (tag)
-+ {
-+ case TIFFTAG_FAXRECVPARAMS:
-+ codec->recvparams = va_arg(ap, uint32);
-+ break;
-+
-+ case TIFFTAG_FAXSUBADDRESS:
-+ _TIFFsetString(&codec->subaddress, va_arg(ap, char*));
-+ break;
-+
-+ case TIFFTAG_FAXRECVTIME:
-+ codec->recvtime = va_arg(ap, uint32);
-+ break;
-+
-+ case TIFFTAG_FAXDCS:
-+ _TIFFsetString(&codec->faxdcs, va_arg(ap, char*));
-+ break;
-+
-+ default:
-+ return (*codec->vsetparent)(tif, tag, ap);
-+ }
-+
-+ TIFFSetFieldBit(tif, _TIFFFieldWithTag(tif, tag)->field_bit);
-+ tif->tif_flags |= TIFF_DIRTYDIRECT;
-+ return 1;
-+}
-+
-+int TIFFInitJBIG(TIFF* tif, int scheme)
-+{
-+ struct JBIGState* codec = NULL;
-+
-+ /* Allocate memory for the JBIGState structure.*/
-+ tif->tif_data = (tdata_t)_TIFFmalloc(sizeof(struct JBIGState));
-+ if (tif->tif_data == NULL)
-+ {
-+ TIFFError("TIFFInitJBIG", "Not enough memory for JBIGState");
-+ return 0;
-+ }
-+ _TIFFmemset(tif->tif_data, 0, sizeof(struct JBIGState));
-+ codec = GetJBIGState(tif);
-+
-+ /* Initialize codec private fields */
-+ codec->recvparams = 0;
-+ codec->subaddress = NULL;
-+ codec->faxdcs = NULL;
-+ codec->recvtime = 0;
-+
-+ /* Register codec private fields with libtiff and setup function pointers*/
-+ _TIFFMergeFieldInfo(tif, jbigFieldInfo, N(jbigFieldInfo));
-+
-+ codec->vgetparent = tif->tif_tagmethods.vgetfield;
-+ codec->vsetparent = tif->tif_tagmethods.vsetfield;
-+
-+ tif->tif_tagmethods.vgetfield = JBIGVGetField;
-+ tif->tif_tagmethods.vsetfield = JBIGVSetField;
-+ tif->tif_tagmethods.printdir = JBIGPrintDir;
-+
-+
-+ /*
-+ * These flags are set so the JBIG Codec can control when to reverse bits and when
-+ * not to and to allow the jbig decoder and bit reverser to write to memory
-+ * when necessary.
-+ */
-+ tif->tif_flags |= TIFF_NOBITREV;
-+ tif->tif_flags &= ~TIFF_MAPPED;
-+
-+ /* Setup the function pointers for encode, decode, and cleanup. */
-+ tif->tif_setupdecode = JBIGSetupDecode;
-+ tif->tif_decodestrip = JBIGDecode;
-+
-+ tif->tif_setupencode = JBIGSetupEncode;
-+ tif->tif_encodestrip = JBIGEncode;
-+
-+ tif->tif_cleanup = JBIGCleanup;
-+
-+ return 1;
-+}
-+
-+#endif /* JBIG_SUPPORT */
---- libtiff/tiffconf.h.in.orig 2005-07-28 01:49:24.000000000 -0700
-+++ libtiff/tiffconf.h.in 2006-06-06 19:35:23.000000000 -0700
-@@ -40,6 +40,9 @@
- /* Support JPEG compression (requires IJG JPEG library) */
- #undef JPEG_SUPPORT
-
-+/* Support JBIG compression (requires JBIG-KIT library) */
-+#undef JBIG_SUPPORT
-+
- /* Support LogLuv high dynamic range encoding */
- #undef LOGLUV_SUPPORT
-
---- libtiff/tiffconf.h.vc.orig 2005-07-28 01:49:24.000000000 -0700
-+++ libtiff/tiffconf.h.vc 2006-06-06 19:35:23.000000000 -0700
-@@ -41,6 +41,9 @@
- /* Support JPEG compression (requires IJG JPEG library) */
- /* #undef JPEG_SUPPORT */
-
-+/* Support JBIG compression (requires JBIG-KIT library) */
-+#undef JBIG_SUPPORT
-+
- /* Support LogLuv high dynamic range encoding */
- #define LOGLUV_SUPPORT 1
-
---- tools/tiffcp.c.orig 2005-07-08 02:03:49.000000000 -0700
-+++ tools/tiffcp.c 2006-06-06 19:44:44.000000000 -0700
-@@ -349,6 +349,8 @@
- if (cp)
- defpredictor = atoi(cp+1);
- defcompression = COMPRESSION_ADOBE_DEFLATE;
-+ } else if (strneq(opt, "jbig", 4)) {
-+ defcompression = COMPRESSION_JBIG;
- } else
- return (0);
- return (1);
-@@ -648,6 +650,12 @@
- TIFFSetField(out, TIFFTAG_JPEGQUALITY, quality);
- TIFFSetField(out, TIFFTAG_JPEGCOLORMODE, jpegcolormode);
- break;
-+ case COMPRESSION_JBIG:
-+ CopyTag(TIFFTAG_FAXRECVPARAMS, 1, TIFF_LONG);
-+ CopyTag(TIFFTAG_FAXRECVTIME, 1, TIFF_LONG);
-+ CopyTag(TIFFTAG_FAXSUBADDRESS, 1, TIFF_ASCII);
-+ CopyTag(TIFFTAG_FAXDCS, 1, TIFF_ASCII);
-+ break;
- case COMPRESSION_LZW:
- case COMPRESSION_ADOBE_DEFLATE:
- case COMPRESSION_DEFLATE:
---- libtiff/Makefile.vc.orig 2006-06-06 19:58:40.000000000 -0700
-+++ libtiff/Makefile.vc 2006-06-06 19:59:32.000000000 -0700
-@@ -29,7 +29,7 @@
-
- !INCLUDE ..\nmake.opt
-
--INCL = -I. $(JPEG_INCLUDE) $(ZLIB_INCLUDE)
-+INCL = -I. $(JPEG_INCLUDE) $(ZLIB_INCLUDE) $(JBIG_INCLUDE)
-
- !IFDEF USE_WIN_CRT_LIB
- OBJ_SYSDEP_MODULE = tif_unix.obj
-@@ -74,6 +74,7 @@
- tif_warning.obj \
- tif_write.obj \
- tif_zip.obj \
-+ tif_jbig.obj \
- $(OBJ_SYSDEP_MODULE)
-
- all: libtiff.lib $(DLLNAME)
diff --git a/media-libs/tiff/tiff-3.8.2-r8.ebuild b/media-libs/tiff/tiff-3.8.2-r8.ebuild
deleted file mode 100644
index 2688aea5002a..000000000000
--- a/media-libs/tiff/tiff-3.8.2-r8.ebuild
+++ /dev/null
@@ -1,61 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/media-libs/tiff/tiff-3.8.2-r8.ebuild,v 1.6 2009/07/27 22:00:17 maekke Exp $
-
-EAPI=2
-
-inherit eutils libtool
-
-DESCRIPTION="Library for manipulation of TIFF (Tag Image File Format) images"
-HOMEPAGE="http://www.remotesensing.org/libtiff/"
-SRC_URI="ftp://ftp.remotesensing.org/pub/libtiff/${P}.tar.gz
- mirror://gentoo/${P}-pdfsec-patches.tar.bz2"
-
-LICENSE="as-is"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd"
-IUSE="jpeg jbig nocxx zlib"
-
-RDEPEND="jpeg? ( >=media-libs/jpeg-6b )
- jbig? ( >=media-libs/jbigkit-1.6-r1 )
- zlib? ( >=sys-libs/zlib-1.1.3-r2 )"
-DEPEND="${RDEPEND}"
-
-src_prepare() {
- epatch "${WORKDIR}"/${P}-tiff2pdf-20080903.patch
- epatch "${FILESDIR}"/${P}-tiffsplit.patch
- if use jbig; then
- epatch "${FILESDIR}"/${PN}-jbig.patch
- fi
- epatch "${WORKDIR}"/${P}-goo-sec.patch
- epatch "${FILESDIR}"/${P}-CVE-2008-2327.patch
- epatch "${FILESDIR}"/${P}-CVE-2009-2285.patch
- epatch "${FILESDIR}"/${P}-CVE-2009-2347.patch
- elibtoolize
-}
-
-src_configure() {
- econf \
- $(use_enable !nocxx cxx) \
- $(use_enable zlib) \
- $(use_enable jpeg) \
- $(use_enable jbig) \
- --with-pic --without-x \
- --with-docdir=/usr/share/doc/${PF}
-}
-
-src_install() {
- emake install DESTDIR="${D}" || die "make install failed"
- dodoc README TODO VERSION
-}
-
-pkg_postinst() {
- if use jbig; then
- echo
- elog "JBIG support is intended for Hylafax fax compression, so we"
- elog "really need more feedback in other areas (most testing has"
- elog "been done with fax). Be sure to recompile anything linked"
- elog "against tiff if you rebuild it with jbig support."
- echo
- fi
-}