diff options
Diffstat (limited to 'app-text')
-rw-r--r-- | app-text/cstetex/ChangeLog | 67 | ||||
-rw-r--r-- | app-text/cstetex/Manifest | 75 | ||||
-rw-r--r-- | app-text/cstetex/cstetex-2.0.2-r2.ebuild | 65 | ||||
-rw-r--r-- | app-text/cstetex/files/cstetex-2.0.2-dvi-draw-conflicting-types.patch | 11 | ||||
-rw-r--r-- | app-text/cstetex/files/cstetex-2.0.2-flex-unput.patch | 12 | ||||
-rw-r--r-- | app-text/cstetex/files/cstetex-2.0.2.diff | 18 | ||||
-rw-r--r-- | app-text/cstetex/files/digest-cstetex-2.0.2-r2 | 30 | ||||
-rw-r--r-- | app-text/cstetex/files/xdvizilla.patch | 30 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf-2.02pl1-CAN-2005-3191-3.patch | 252 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf-3.00pl2-CAN-2004-1125.patch | 37 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf-3.00pl3-CAN-2005-0064.patch | 14 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf-CESA-2004-007-xpdf2-newer.diff | 78 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf-goo-sizet.patch | 57 | ||||
-rw-r--r-- | app-text/cstetex/files/xpdf2-underflow.patch | 81 | ||||
-rw-r--r-- | app-text/cstetex/metadata.xml | 12 |
15 files changed, 0 insertions, 839 deletions
diff --git a/app-text/cstetex/ChangeLog b/app-text/cstetex/ChangeLog deleted file mode 100644 index 516a38300ec3..000000000000 --- a/app-text/cstetex/ChangeLog +++ /dev/null @@ -1,67 +0,0 @@ -# ChangeLog for app-text/cstetex -# Copyright 2000-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/app-text/cstetex/ChangeLog,v 1.17 2007/03/12 23:46:09 nattfodd Exp $ - - 12 Mar 2007; Alexandre Buisse <nattfodd@gentoo.org> metadata.xml: - Replaced text-markup by tex as maintaining herd (text-markup split). - - 21 Feb 2007; Piotr Jaroszyński <peper@gentoo.org> ChangeLog: - Transition to Manifest2. - - 29 Oct 2006; Alexandre Buisse <nattfodd@gentoo.org> - -cstetex-2.0.2-r1.ebuild: - Security cleanup (bug #140507). - - 27 Apr 2006; Marien Zwart <marienz@gentoo.org> Manifest: - Fixing SHA256 digest, pass four - - 01 Mar 2006; Simon Stelling <blubb@gentoo.org> cstetex-2.0.2-r2.ebuild: - stable on amd64 wrt bug 115775 - - 19 Feb 2006; Joshua Jackson <tsunam@gentoo.org> cstetex-2.0.2-r2.ebuild: - Stable on x86 for security bug #115775 - -*cstetex-2.0.2-r2 (18 Feb 2006) - - 18 Feb 2006; Alexandre Buisse <nattfodd@gentoo.org> - +files/cstetex-2.0.2-dvi-draw-conflicting-types.patch, - +files/cstetex-2.0.2-flex-unput.patch, - +files/xpdf-2.02pl1-CAN-2005-3191-3.patch, +cstetex-2.0.2-r2.ebuild: - Backport recent tetex-2 patches (from bugs #115775, #122365 and #118264). - - 21 Apr 2005; Simon Stelling <blubb@gentoo.org> cstetex-2.0.2-r1.ebuild: - stable on amd64 - - 05 Apr 2005; Mamoru KOMACHI <usata@gentoo.org> -cstetex-2.0.2.ebuild, - cstetex-2.0.2-r1.ebuild: - Changed to use tetex-2.eclass. - - 20 Jan 2005; Olivier Crête <tester@gentoo.org> cstetex-2.0.2-r1.ebuild: - Stable on x86 wrt security bug #75801 - -*cstetex-2.0.2-r1 (20 Jan 2005) - - 20 Jan 2005; MATSUU Takuto <matsuu@gentoo.org> +files/xdvizilla.patch, - +files/xpdf-3.00pl2-CAN-2004-1125.patch, - +files/xpdf-3.00pl3-CAN-2005-0064.patch, - +files/xpdf-CESA-2004-007-xpdf2-newer.diff, +files/xpdf-goo-sizet.patch, - +files/xpdf2-underflow.patch, +cstetex-2.0.2-r1.ebuild: - Security bump; Bug #75801 - - 14 Aug 2004; Sven Wegener <swegener@gentoo.org> metadata.xml: - Corrected metadata.xml to match DTD. - - 22 Jul 2004; Danny van Dyk <kugelfang@gentoo.org> cstetex-2.0.2.ebuild: - Marked ~amd64. - - 02 Feb 2004; Mamoru KOMACHI <usata@gentoo.org> cstetex-2.0.2.ebuild, - metadata.xml: - Marked stable on x86 - -*cstetex-2.0.2 (13 Nov 2003) - - 13 Nov 2003; Mamoru KOMACHI <usata@gentoo.org> cstetex-2.0.2.ebuild, - metadata.xml, files/cstetex-2.0.2.diff: - Intial import. Ebuild submitted by Jaromir Malenko <malenko@email.cz>. - He did an excellent work with tetex.eclass as well. See bug #31657. - diff --git a/app-text/cstetex/Manifest b/app-text/cstetex/Manifest deleted file mode 100644 index 7ecff596d7e3..000000000000 --- a/app-text/cstetex/Manifest +++ /dev/null @@ -1,75 +0,0 @@ ------BEGIN PGP SIGNED MESSAGE----- -Hash: SHA1 - -AUX cstetex-2.0.2-dvi-draw-conflicting-types.patch 410 RMD160 8417f8ee01a46fe1c066d7fd2cd20c7f33ab0a52 SHA1 ff903e1b682d320eb10f17da49146e680953c02b SHA256 5f6a525bb57f25a722178716e142a6555058903be0ce3944263b424896941126 -MD5 912aea791088e715e491a7ccaa7eb25f files/cstetex-2.0.2-dvi-draw-conflicting-types.patch 410 -RMD160 8417f8ee01a46fe1c066d7fd2cd20c7f33ab0a52 files/cstetex-2.0.2-dvi-draw-conflicting-types.patch 410 -SHA256 5f6a525bb57f25a722178716e142a6555058903be0ce3944263b424896941126 files/cstetex-2.0.2-dvi-draw-conflicting-types.patch 410 -AUX cstetex-2.0.2-flex-unput.patch 498 RMD160 834d9c73bcbd2cecedd51c31b38e742e6919b31f SHA1 e2c95d2ddf811647f0dae5eb977b2b5555ce2233 SHA256 40305736699ab42b68203b43483f669aee57b98dad5ee60eb05d19d8e5d7652d -MD5 56e1062f89330aad64afa0208ea09b30 files/cstetex-2.0.2-flex-unput.patch 498 -RMD160 834d9c73bcbd2cecedd51c31b38e742e6919b31f files/cstetex-2.0.2-flex-unput.patch 498 -SHA256 40305736699ab42b68203b43483f669aee57b98dad5ee60eb05d19d8e5d7652d files/cstetex-2.0.2-flex-unput.patch 498 -AUX cstetex-2.0.2.diff 658 RMD160 49d019eb5adb7f6cc60480edf93b57dad1afec27 SHA1 fd23a009da7e99b0fc5adf0be19620c9e9ed528d SHA256 47a99bdbacc74397071b2a9c7f415ad8fbce046aea6e2e5be6c763eddfa07275 -MD5 fae07756d7cfe6b479ae7346c83514b0 files/cstetex-2.0.2.diff 658 -RMD160 49d019eb5adb7f6cc60480edf93b57dad1afec27 files/cstetex-2.0.2.diff 658 -SHA256 47a99bdbacc74397071b2a9c7f415ad8fbce046aea6e2e5be6c763eddfa07275 files/cstetex-2.0.2.diff 658 -AUX xdvizilla.patch 912 RMD160 79bf98f5b05cdc4e99147809e1ec6895e8843097 SHA1 3b8650a43b596beba305a9b9e3ed736ae6daf77f SHA256 cb7f0ca4758cd20d5a0a819dd87caa8f2d1df64aaac458e13b4bb3c43deb5204 -MD5 77107ec8ba31c93b0e1bc35a9e4c9c4b files/xdvizilla.patch 912 -RMD160 79bf98f5b05cdc4e99147809e1ec6895e8843097 files/xdvizilla.patch 912 -SHA256 cb7f0ca4758cd20d5a0a819dd87caa8f2d1df64aaac458e13b4bb3c43deb5204 files/xdvizilla.patch 912 -AUX xpdf-2.02pl1-CAN-2005-3191-3.patch 7060 RMD160 3aa0387ac8bb005193bf4d5e190c8e43b2729a09 SHA1 b2f24dc58362c10aa9f85b9c6e9d4cacd3134e99 SHA256 d96036af3be0bab42b42abad600c7ef49f62b079b3deaa4108c999269be0c6f3 -MD5 34a6a462f630bab703319681b675a92d files/xpdf-2.02pl1-CAN-2005-3191-3.patch 7060 -RMD160 3aa0387ac8bb005193bf4d5e190c8e43b2729a09 files/xpdf-2.02pl1-CAN-2005-3191-3.patch 7060 -SHA256 d96036af3be0bab42b42abad600c7ef49f62b079b3deaa4108c999269be0c6f3 files/xpdf-2.02pl1-CAN-2005-3191-3.patch 7060 -AUX xpdf-3.00pl2-CAN-2004-1125.patch 1136 RMD160 f11de185e9f7893b0bfb744db01739af13b5741e SHA1 6b476e011d340351a6122e027b4822a836a7413c SHA256 47dc9849b67313c7c7b6545ea8df4a9f97ceeffe818eb1a8e5eeeb3339bcb9ea -MD5 5d40ba9d885af84bcc917ad17e2bf8e0 files/xpdf-3.00pl2-CAN-2004-1125.patch 1136 -RMD160 f11de185e9f7893b0bfb744db01739af13b5741e files/xpdf-3.00pl2-CAN-2004-1125.patch 1136 -SHA256 47dc9849b67313c7c7b6545ea8df4a9f97ceeffe818eb1a8e5eeeb3339bcb9ea files/xpdf-3.00pl2-CAN-2004-1125.patch 1136 -AUX xpdf-3.00pl3-CAN-2005-0064.patch 346 RMD160 7fb5521b698589245f9e0ccea753a6d4e30badf8 SHA1 c29b9ea13d1f8567a4521e12d50e497bf1681608 SHA256 c51f769fcac31cbb95dd3124deb1b658e0874a3a90fe17d9752c9be937773621 -MD5 c32a612ce419b9930ff273cf382558bf files/xpdf-3.00pl3-CAN-2005-0064.patch 346 -RMD160 7fb5521b698589245f9e0ccea753a6d4e30badf8 files/xpdf-3.00pl3-CAN-2005-0064.patch 346 -SHA256 c51f769fcac31cbb95dd3124deb1b658e0874a3a90fe17d9752c9be937773621 files/xpdf-3.00pl3-CAN-2005-0064.patch 346 -AUX xpdf-CESA-2004-007-xpdf2-newer.diff 2718 RMD160 0cf60c817b9868896c7d6fa678978c2c1244618c SHA1 ae1dc4e938501be9e2154dea2aecd79abd6ae9be SHA256 7df6d659edd6c79f89e0b2a54c65b9ae27dca57c00e7650fd3ae6273e7dc2ed1 -MD5 87d20c86d1451638e4b7adc2f7ac8067 files/xpdf-CESA-2004-007-xpdf2-newer.diff 2718 -RMD160 0cf60c817b9868896c7d6fa678978c2c1244618c files/xpdf-CESA-2004-007-xpdf2-newer.diff 2718 -SHA256 7df6d659edd6c79f89e0b2a54c65b9ae27dca57c00e7650fd3ae6273e7dc2ed1 files/xpdf-CESA-2004-007-xpdf2-newer.diff 2718 -AUX xpdf-goo-sizet.patch 1424 RMD160 c52769d3ac95b372593e22d46ad4742dc44e47d3 SHA1 a4883eaa770acca923fb48aecf72d7b68fea16b7 SHA256 d1a75bcb1764383ee1f5bd1c2d678cdadc69cd123069657f1dced0825964cbb0 -MD5 2fce5bedd61300fad1566a41f991a782 files/xpdf-goo-sizet.patch 1424 -RMD160 c52769d3ac95b372593e22d46ad4742dc44e47d3 files/xpdf-goo-sizet.patch 1424 -SHA256 d1a75bcb1764383ee1f5bd1c2d678cdadc69cd123069657f1dced0825964cbb0 files/xpdf-goo-sizet.patch 1424 -AUX xpdf2-underflow.patch 2363 RMD160 110c32f97715d3eb0bcdf19db41a0ac7465d75d1 SHA1 722864fc52c418944c3b373543d0ed93a40aa0ab SHA256 88a06ef62c423805a0fed011db59e9c170a2482c29f0359dec8ae962395a28ba -MD5 362296e34a1a04a6e5e2a7d9e97547c6 files/xpdf2-underflow.patch 2363 -RMD160 110c32f97715d3eb0bcdf19db41a0ac7465d75d1 files/xpdf2-underflow.patch 2363 -SHA256 88a06ef62c423805a0fed011db59e9c170a2482c29f0359dec8ae962395a28ba files/xpdf2-underflow.patch 2363 -DIST csfonts-t1.tar.gz 1726183 RMD160 b4d8ecfef3e31f920b956a95c6c1144eee84b879 SHA1 7596b85dbfb5c796cbb93565f09522f9050d263f SHA256 9d2fe8efa5e892f5015ff6ac02c8a4ba2192daa562be2d0bc3ef4ea62ffd3b12 -DIST csfonts.tar.gz 187106 RMD160 ca9c47f14219330e61afa60223d97da08841eacf SHA1 41957a985d0842c330a08099f8a406f785eb7a6b SHA256 77183e92ab5661d8d82c1a5e1bd4e4c1ce5ff878cd33f670b74877ee64083c41 -DIST cslatex.tar.gz 18310 RMD160 371ac9f8ca5740258f660ec96a4cfb0e8713d6cb SHA1 88e475f609371278a2813e2486bde4d5e564fb35 SHA256 c0ea53ea630a72adaba4ee29cb55558f39f0ef7435de769d4ec4d823ff703330 -DIST csplain.tar.gz 55776 RMD160 78059af19a738539a968c16ee8ee8de3fd712007 SHA1 f9c6c85e719ff911d5a6c896d1448396d07ae1d4 SHA256 4fcd5cc67808a8b1b5ae1503cb2a86166f7d44336360f8b9eaba88576d17c884 -DIST cspsfonts.tar.gz 122248 RMD160 c55aa702be5c5e5871b2248e1fc1c8747a21e843 SHA1 23d751bce8da1d5811ce3b5f76249e1db98081bb SHA256 725d99f1c42ad7a2480d3d6e8be1ffe41afff53b567addacc8f45382635533ed -DIST enctex.tar.gz 379258 RMD160 aa9389b8660f7ba04314e578ba01937c1beb6edf SHA1 839b2df81586c098751c310c6eb66c644d1908f2 SHA256 e1d042f9928612653785faa41846b969fa5684ba4b48d712e38de0026b8ff807 -DIST tetex-2.0.2-gentoo.tar.gz 1704 RMD160 f32700bfe389c9c15a72344770c7abe2ee048c38 SHA1 655379c710004ffe2cc65acf6c2efd424cecd109 SHA256 331ac072cf658c22b983b16439dc0e6f95cac0cc95f4d993fcb4bad883ea2622 -DIST tetex-src-2.0.2.tar.gz 11745933 RMD160 9bbb274c0598547bcecb00ff48e459d41bc65e93 SHA1 6445206b14d659458ee352df78d2c2daf8e88ab3 SHA256 9f8a35b3abd293d71fa6785a4c3e6aa4fdaeff03ae71863ad5ec9e1a9fc087f5 -DIST tetex-texmf-2.0.2.tar.gz 52424280 RMD160 ff88622c2d97416a4f67fbdf7a00d837af35d94e SHA1 9ad88d5fc1df7e10b3538f7b5e3871ceefe8ee2f SHA256 0d5c4adb7a72a33fffa9eeb5e3137e0094c912eafc45e358ca20cd9257f79f0d -DIST tetex-texmfsrc-2.0.2.tar.gz 22909537 RMD160 bc444152b2f45cf3c0a743f6416134e31e8635b4 SHA1 59c5a328800225c44beec9a9baf0f4223ac633c3 SHA256 9348f10c9e95fdb5e9a9702956cfce38be42c48621fcfc6c9ae192363e08d267 -EBUILD cstetex-2.0.2-r2.ebuild 2018 RMD160 0bb1631fd7b5f78cf3ead8f601200e6869cb9c4c SHA1 6c53f84941eca8904526f79600218ba8c69f54e4 SHA256 75a0ddb8c02127da248434d08ec04394a0554a5702d46f032997d86d4c422790 -MD5 87e7dd7bb61dffb92b912caa638f2277 cstetex-2.0.2-r2.ebuild 2018 -RMD160 0bb1631fd7b5f78cf3ead8f601200e6869cb9c4c cstetex-2.0.2-r2.ebuild 2018 -SHA256 75a0ddb8c02127da248434d08ec04394a0554a5702d46f032997d86d4c422790 cstetex-2.0.2-r2.ebuild 2018 -MISC ChangeLog 2499 RMD160 9f46cbd56d02a04de3bab3a0d6d8d7777ef9cd4a SHA1 116b82789667580dc7aaa08548f938ab50c3e15f SHA256 8db0c7f7aa991068f023bea9b0bb0e5c0cc6df4302a793d8942b0a3c082f6ac1 -MD5 c165f2a092e044d28449a835042aa0d2 ChangeLog 2499 -RMD160 9f46cbd56d02a04de3bab3a0d6d8d7777ef9cd4a ChangeLog 2499 -SHA256 8db0c7f7aa991068f023bea9b0bb0e5c0cc6df4302a793d8942b0a3c082f6ac1 ChangeLog 2499 -MISC metadata.xml 438 RMD160 7f2ac305c894e5a6dfe388242f3f4a3e7e423b6d SHA1 8ed1c662d6ae375fcd896fa4cfef943d9a72c36a SHA256 6773d8af9e3ec8a8b634989f2ff2a1363b0c590392a8298df8f17cb626708bdb -MD5 632d28f63d7fed842758d126ff03ce08 metadata.xml 438 -RMD160 7f2ac305c894e5a6dfe388242f3f4a3e7e423b6d metadata.xml 438 -SHA256 6773d8af9e3ec8a8b634989f2ff2a1363b0c590392a8298df8f17cb626708bdb metadata.xml 438 -MD5 6747b6f15f71979cc431c60cdc39dd37 files/digest-cstetex-2.0.2-r2 2377 -RMD160 55f4d1c9726ee7a30f07d71e710a7de405804d76 files/digest-cstetex-2.0.2-r2 2377 -SHA256 ed18a3a77ba2ccfd053b87f3d8360ea5a5a52364914dc000c04bd0f2ef5d4ac5 files/digest-cstetex-2.0.2-r2 2377 ------BEGIN PGP SIGNATURE----- -Version: GnuPG v1.4.6 (GNU/Linux) - -iD8DBQFF9ecVwx9vvAARv2sRAj76AKCX2u2hjfOZYaZpwDGxtCl65Nu/5ACg0WCI -T2EFbhokmQ8ePFI0YPVdlt0= -=Tzme ------END PGP SIGNATURE----- diff --git a/app-text/cstetex/cstetex-2.0.2-r2.ebuild b/app-text/cstetex/cstetex-2.0.2-r2.ebuild deleted file mode 100644 index 403ac97bb717..000000000000 --- a/app-text/cstetex/cstetex-2.0.2-r2.ebuild +++ /dev/null @@ -1,65 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/app-text/cstetex/cstetex-2.0.2-r2.ebuild,v 1.3 2006/03/01 20:28:38 blubb Exp $ - -inherit tetex-2 - -IUSE="" -DESCRIPTION="a complete TeX distribution with Czech and Slovak support" -HOMEPAGE="http://math.feld.cvut.cz/olsak/cstex/" - -CSTEX="csfonts.tar.gz csplain.tar.gz cslatex.tar.gz cspsfonts.tar.gz csfonts-t1.tar.gz" -ENCTEX="enctex.tar.gz" -SRC_URI="${SRC_URI} ftp://math.feld.cvut.cz/pub/olsak/enctex/${ENCTEX}" -for FILE in ${CSTEX}; do - SRC_URI="${SRC_URI} ftp://math.feld.cvut.cz/pub/cstex/base/${FILE}" -done - -KEYWORDS="amd64 x86" - -src_unpack() { - tetex-2_src_unpack - - cd ${S} - for FILE in ${CSTEX}; do - unpack ${FILE} - done - epatch ${FILESDIR}/${P}.diff - cd ${S}/texk/web2c - unpack ${ENCTEX} - epatch enctex/enctex.patch-to-7.5 - - # bug 75801 - EPATCH_OPTS="-d ${S}/libs/xpdf/xpdf -p0" epatch ${FILESDIR}/xpdf-CESA-2004-007-xpdf2-newer.diff - EPATCH_OPTS="-d ${S}/libs/xpdf -p1" epatch ${FILESDIR}/xpdf-goo-sizet.patch - EPATCH_OPTS="-d ${S}/libs/xpdf -p1" epatch ${FILESDIR}/xpdf2-underflow.patch - EPATCH_OPTS="-d ${S}/libs/xpdf/xpdf -p0" epatch ${FILESDIR}/xpdf-3.00pl2-CAN-2004-1125.patch - EPATCH_OPTS="-d ${S}/libs/xpdf/xpdf -p0" epatch ${FILESDIR}/xpdf-3.00pl3-CAN-2005-0064.patch - EPATCH_OPTS="-d ${S} -p1" epatch ${FILESDIR}/xdvizilla.patch - - #bug 115775 - EPATCH_OPTS="-d ${S}/libs/xpdf/xpdf -p2" epatch ${FILESDIR}/xpdf-2.02pl1-CAN-2005-3191-3.patch - - #bug 122365 - EPATCH_OPTS="-d ${WORKDIR}" epatch ${FILESDIR}/${P}-flex-unput.patch - - # bug 118264 - EPATCH_OPTS="-d ${WORKDIR} -p0" epatch ${FILESDIR}/${P}-dvi-draw-conflicting-types.patch -} - -src_install() { - tetex-2_src_install - - einfo "Installing Czech files..." - dodir /usr/share/texmf/tex/enctex - cd ${S} - cp -v texk/web2c/enctex/*.tex ${D}/usr/share/texmf/tex/enctex -} - -pkg_postrm() { - if [ ! -f ${ROOT}/usr/bin/tex ] ; then - for i in cslatex csplain pdfcslatex pdfcsplain; do - rm ${ROOT}/usr/bin/$i - done - fi -} diff --git a/app-text/cstetex/files/cstetex-2.0.2-dvi-draw-conflicting-types.patch b/app-text/cstetex/files/cstetex-2.0.2-dvi-draw-conflicting-types.patch deleted file mode 100644 index c38a8e01bc71..000000000000 --- a/app-text/cstetex/files/cstetex-2.0.2-dvi-draw-conflicting-types.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- tetex-src-2.0.2.old/texk/xdvik/dvi-draw.c 2003-01-25 05:16:33.000000000 -0500 -+++ tetex-src-2.0.2/texk/xdvik/dvi-draw.c 2006-01-08 04:52:44.000000000 -0500 -@@ -518,7 +518,7 @@ - - #endif /* T1LIB */ - --extern void home(); /* from events.c */ -+extern void home(wide_bool scrl); /* from events.c */ - extern int fallbacktfm; /* from tfmload.c */ - - static struct frame frame0; /* dummy head of list */ diff --git a/app-text/cstetex/files/cstetex-2.0.2-flex-unput.patch b/app-text/cstetex/files/cstetex-2.0.2-flex-unput.patch deleted file mode 100644 index 57a037e09ba6..000000000000 --- a/app-text/cstetex/files/cstetex-2.0.2-flex-unput.patch +++ /dev/null @@ -1,12 +0,0 @@ -diff -uNr tetex-src-2.0.2.old/texk/web2c/omegafonts/Makefile.in tetex-src-2.0.2/texk/web2c/omegafonts/Makefile.in ---- tetex-src-2.0.2.old/texk/web2c/omegafonts/Makefile.in 2001-11-10 14:42:37.000000000 +0100 -+++ tetex-src-2.0.2/texk/web2c/omegafonts/Makefile.in 2006-02-13 12:38:48.000000000 +0100 -@@ -40,7 +40,7 @@ - -test -f y.tab.h && mv -f y.tab.h y_tab.h - $(LEX_OUTPUT_ROOT).o: parser.h - $(LEX_OUTPUT_ROOT).c: pl.l -- $(LEX) $(srcdir)/pl.l -+ cp $(srcdir)/lex.yy.c-dist $(srcdir)/lex.yy.c - - - diff --git a/app-text/cstetex/files/cstetex-2.0.2.diff b/app-text/cstetex/files/cstetex-2.0.2.diff deleted file mode 100644 index 5a581a296724..000000000000 --- a/app-text/cstetex/files/cstetex-2.0.2.diff +++ /dev/null @@ -1,18 +0,0 @@ -diff -ru tetex-src-2.0.2-orig/texk/web2c/fmtutil.in tetex-src-2.0.2/texk/web2c/fmtutil.in ---- tetex-src-2.0.2-orig/texk/web2c/fmtutil.in 2003-02-15 22:35:59.000000000 +0100 -+++ tetex-src-2.0.2/texk/web2c/fmtutil.in 2003-11-01 13:12:35.000000000 +0100 -@@ -92,10 +92,10 @@ - #! pdfemex-pl pdfetex mexconf.tex nls=pdfetex-pl,il2-pl *pdfemex.ini - - # - Czech / Slovak: --#! csplain tex - csplain.ini --#! cslatex tex - cslatex.ini --#! pdfcsplain pdftex - csplain.ini --#! pdfcslatex pdftex - cslatex.ini -+csplain tex - csplain.ini -+cslatex tex - cslatex.ini -+pdfcsplain pdftex - csplain.ini -+pdfcslatex pdftex - cslatex.ini - - # Other formats: - diff --git a/app-text/cstetex/files/digest-cstetex-2.0.2-r2 b/app-text/cstetex/files/digest-cstetex-2.0.2-r2 deleted file mode 100644 index 65fcb8e6a93f..000000000000 --- a/app-text/cstetex/files/digest-cstetex-2.0.2-r2 +++ /dev/null @@ -1,30 +0,0 @@ -MD5 13004322faea34c3580232fe438e56f5 csfonts-t1.tar.gz 1726183 -RMD160 b4d8ecfef3e31f920b956a95c6c1144eee84b879 csfonts-t1.tar.gz 1726183 -SHA256 9d2fe8efa5e892f5015ff6ac02c8a4ba2192daa562be2d0bc3ef4ea62ffd3b12 csfonts-t1.tar.gz 1726183 -MD5 ef0758d7e263150a39a7ff6376a95df8 csfonts.tar.gz 187106 -RMD160 ca9c47f14219330e61afa60223d97da08841eacf csfonts.tar.gz 187106 -SHA256 77183e92ab5661d8d82c1a5e1bd4e4c1ce5ff878cd33f670b74877ee64083c41 csfonts.tar.gz 187106 -MD5 64947e5b71c100f3d018da9b11d8cee3 cslatex.tar.gz 18310 -RMD160 371ac9f8ca5740258f660ec96a4cfb0e8713d6cb cslatex.tar.gz 18310 -SHA256 c0ea53ea630a72adaba4ee29cb55558f39f0ef7435de769d4ec4d823ff703330 cslatex.tar.gz 18310 -MD5 5f0c05f9f0acf2ad2fea79f49335cc77 csplain.tar.gz 55776 -RMD160 78059af19a738539a968c16ee8ee8de3fd712007 csplain.tar.gz 55776 -SHA256 4fcd5cc67808a8b1b5ae1503cb2a86166f7d44336360f8b9eaba88576d17c884 csplain.tar.gz 55776 -MD5 fbcacfb1e8ff234be8fc7fffef0514d6 cspsfonts.tar.gz 122248 -RMD160 c55aa702be5c5e5871b2248e1fc1c8747a21e843 cspsfonts.tar.gz 122248 -SHA256 725d99f1c42ad7a2480d3d6e8be1ffe41afff53b567addacc8f45382635533ed cspsfonts.tar.gz 122248 -MD5 af601a147d5402023c35d0c4745066a8 enctex.tar.gz 379258 -RMD160 aa9389b8660f7ba04314e578ba01937c1beb6edf enctex.tar.gz 379258 -SHA256 e1d042f9928612653785faa41846b969fa5684ba4b48d712e38de0026b8ff807 enctex.tar.gz 379258 -MD5 0a0ba30552331663f496d41b8ca2a299 tetex-2.0.2-gentoo.tar.gz 1704 -RMD160 f32700bfe389c9c15a72344770c7abe2ee048c38 tetex-2.0.2-gentoo.tar.gz 1704 -SHA256 331ac072cf658c22b983b16439dc0e6f95cac0cc95f4d993fcb4bad883ea2622 tetex-2.0.2-gentoo.tar.gz 1704 -MD5 a16f6bba227d55e79aeee46fbbd82d28 tetex-src-2.0.2.tar.gz 11745933 -RMD160 9bbb274c0598547bcecb00ff48e459d41bc65e93 tetex-src-2.0.2.tar.gz 11745933 -SHA256 9f8a35b3abd293d71fa6785a4c3e6aa4fdaeff03ae71863ad5ec9e1a9fc087f5 tetex-src-2.0.2.tar.gz 11745933 -MD5 d3bdb96f9077e43b2115d3cc471743b3 tetex-texmf-2.0.2.tar.gz 52424280 -RMD160 ff88622c2d97416a4f67fbdf7a00d837af35d94e tetex-texmf-2.0.2.tar.gz 52424280 -SHA256 0d5c4adb7a72a33fffa9eeb5e3137e0094c912eafc45e358ca20cd9257f79f0d tetex-texmf-2.0.2.tar.gz 52424280 -MD5 40d4b2c5582eccbee4b6ec692c3cc253 tetex-texmfsrc-2.0.2.tar.gz 22909537 -RMD160 bc444152b2f45cf3c0a743f6416134e31e8635b4 tetex-texmfsrc-2.0.2.tar.gz 22909537 -SHA256 9348f10c9e95fdb5e9a9702956cfce38be42c48621fcfc6c9ae192363e08d267 tetex-texmfsrc-2.0.2.tar.gz 22909537 diff --git a/app-text/cstetex/files/xdvizilla.patch b/app-text/cstetex/files/xdvizilla.patch deleted file mode 100644 index bc925280a198..000000000000 --- a/app-text/cstetex/files/xdvizilla.patch +++ /dev/null @@ -1,30 +0,0 @@ ---- tetex-bin-2.0.2/texk/xdvik/xdvizilla 2002-10-12 15:28:50.000000000 +0200 -+++ tetex-bin-2.0.2.new/texk/xdvik/xdvizilla 2004-12-23 12:58:35.010332504 +0100 -@@ -33,7 +33,7 @@ - case "$FILETYPE" in - - *"gzip compressed data"*) -- FILE=/tmp/xdvizilla$$ -+ FILE=`mktemp -t xdvizilla.XXXXXX` || exit 1 - gunzip -c "$1" > $FILE - [ -n "$NO_RM" ] || rm -f -- "$1" - NO_RM= -@@ -41,7 +41,7 @@ - ;; - - *"compressed data"* | *"compress'd data"*) -- FILE=/tmp/xdvizilla$$ -+ FILE=`mktemp -t xdvizilla.XXXXXX` || exit 1 - uncompress -c "$1" > $FILE - [ -n "$NO_RM" ] || rm -f -- "$1" - NO_RM= -@@ -60,8 +60,7 @@ - case "$FILETYPE" in - - *" tar archive") -- TARDIR=/tmp/xdvitar$$ -- mkdir $TARDIR -+ TARDIR=`mktemp -t -d xdvitar.XXXXXX` || exit 1 - cat "$FILE" | (cd $TARDIR; tar xf -) - DVINAME=`tar tf "$FILE" | grep '\.dvi$' | head -1` - [ -n "$NO_RM" ] || rm -f -- "$FILE" diff --git a/app-text/cstetex/files/xpdf-2.02pl1-CAN-2005-3191-3.patch b/app-text/cstetex/files/xpdf-2.02pl1-CAN-2005-3191-3.patch deleted file mode 100644 index 6e2531318df7..000000000000 --- a/app-text/cstetex/files/xpdf-2.02pl1-CAN-2005-3191-3.patch +++ /dev/null @@ -1,252 +0,0 @@ -Index: xpdf-2.02pl1/xpdf/Stream.h -=================================================================== ---- xpdf-2.02pl1.orig/xpdf/Stream.h -+++ xpdf-2.02pl1/xpdf/Stream.h -@@ -225,6 +225,8 @@ public: - - ~StreamPredictor(); - -+ GBool isOk() { return ok; } -+ - int lookChar(); - int getChar(); - -@@ -242,6 +244,7 @@ private: - int rowBytes; // bytes per line - Guchar *predLine; // line buffer - int predIdx; // current index in predLine -+ GBool ok; - }; - - //------------------------------------------------------------------------ -Index: xpdf-2.02pl1/xpdf/Stream.cc -=================================================================== ---- xpdf-2.02pl1.orig/xpdf/Stream.cc -+++ xpdf-2.02pl1/xpdf/Stream.cc -@@ -15,6 +15,7 @@ - #include <stdio.h> - #include <stdlib.h> - #include <stddef.h> -+#include <limits.h> - #ifndef WIN32 - #include <unistd.h> - #endif -@@ -409,13 +410,28 @@ StreamPredictor::StreamPredictor(Stream - width = widthA; - nComps = nCompsA; - nBits = nBitsA; -+ predLine = NULL; -+ ok = gFalse; - -+ if (width <= 0 || nComps <= 0 || nBits <= 0 || -+ nComps >= INT_MAX/nBits || -+ width >= INT_MAX/nComps/nBits) { -+ return; -+ } - nVals = width * nComps; -+ if (nVals * nBits + 7 <= 0) { -+ return; -+ } - pixBytes = (nComps * nBits + 7) >> 3; - rowBytes = ((nVals * nBits + 7) >> 3) + pixBytes; -+ if (rowBytes < 0) { -+ return; -+ } - predLine = (Guchar *)gmalloc(rowBytes); - memset(predLine, 0, rowBytes); - predIdx = rowBytes; -+ -+ ok = gTrue; - } - - StreamPredictor::~StreamPredictor() { -@@ -981,6 +997,10 @@ LZWStream::LZWStream(Stream *strA, int p - FilterStream(strA) { - if (predictor != 1) { - pred = new StreamPredictor(this, predictor, columns, colors, bits); -+ if (!pred->isOk()) { -+ delete pred; -+ pred = NULL; -+ } - } else { - pred = NULL; - } -@@ -1226,6 +1246,10 @@ CCITTFaxStream::CCITTFaxStream(Stream *s - endOfLine = endOfLineA; - byteAlign = byteAlignA; - columns = columnsA; -+ if (columns < 1 || columns >= INT_MAX / sizeof(short)) { -+ error(-1, "invalid number of columns"); -+ exit(1); -+ } - rows = rowsA; - endOfBlock = endOfBlockA; - black = blackA; -@@ -2864,6 +2888,11 @@ GBool DCTStream::readBaselineSOF() { - height = read16(); - width = read16(); - numComps = str->getChar(); -+ if (numComps <= 0 || numComps > 4) { -+ numComps = 0; -+ error(getPos(), "Bad number of components in DCT stream"); -+ return gFalse; -+ } - if (prec != 8) { - error(getPos(), "Bad DCT precision %d", prec); - return gFalse; -@@ -2890,6 +2919,11 @@ GBool DCTStream::readProgressiveSOF() { - height = read16(); - width = read16(); - numComps = str->getChar(); -+ if (numComps <= 0 || numComps > 4) { -+ numComps = 0; -+ error(getPos(), "Bad number of components in DCT stream"); -+ return gFalse; -+ } - if (prec != 8) { - error(getPos(), "Bad DCT precision %d", prec); - return gFalse; -@@ -2912,6 +2946,10 @@ GBool DCTStream::readScanInfo() { - - length = read16() - 2; - scanInfo.numComps = str->getChar(); -+ if (scanInfo.numComps <= 0 || scanInfo.numComps > 4) { -+ error(getPos(), "Bad number of components in DCT stream"); -+ return gFalse; -+ } - --length; - if (length != 2 * scanInfo.numComps + 3) { - error(getPos(), "Bad DCT scan info block"); -@@ -2979,12 +3017,12 @@ GBool DCTStream::readHuffmanTables() { - while (length > 0) { - index = str->getChar(); - --length; -- if ((index & 0x0f) >= 4) { -+ if ((index & ~0x10) >= 4 || (index & ~0x10) < 0) { - error(getPos(), "Bad DCT Huffman table"); - return gFalse; - } - if (index & 0x10) { -- index &= 0x0f; -+ index &= 0x03; - if (index >= numACHuffTables) - numACHuffTables = index+1; - tbl = &acHuffTables[index]; -@@ -3072,9 +3110,11 @@ int DCTStream::readMarker() { - do { - do { - c = str->getChar(); -+ if(c == EOF) return EOF; - } while (c != 0xff); - do { - c = str->getChar(); -+ if(c == EOF) return EOF; - } while (c == 0xff); - } while (c == 0x00); - return c; -@@ -3182,6 +3222,10 @@ FlateStream::FlateStream(Stream *strA, i - FilterStream(strA) { - if (predictor != 1) { - pred = new StreamPredictor(this, predictor, columns, colors, bits); -+ if (!pred->isOk()) { -+ delete pred; -+ pred = NULL; -+ } - } else { - pred = NULL; - } -Index: xpdf-2.02pl1/xpdf/JBIG2Stream.cc -=================================================================== ---- xpdf-2.02pl1.orig/xpdf/JBIG2Stream.cc -+++ xpdf-2.02pl1/xpdf/JBIG2Stream.cc -@@ -7,6 +7,7 @@ - //======================================================================== - - #include <aconf.h> -+#include <limits.h> - - #ifdef USE_GCC_PRAGMAS - #pragma implementation -@@ -1001,7 +1002,16 @@ JBIG2Bitmap::JBIG2Bitmap(Guint segNumA, - w = wA; - h = hA; - line = (wA + 7) >> 3; -- data = (Guchar *)gmalloc(h * line); -+ -+ if (h < 0 || line <= 0 || h >= (INT_MAX - 1) / line) { -+ error(-1, "invalid width/height"); -+ data = NULL; -+ return; -+ } -+ -+ // need to allocate one extra guard byte for use in combine() -+ data = (Guchar *)gmalloc(h * line + 1); -+ data[h * line] = 0; - } - - JBIG2Bitmap::JBIG2Bitmap(Guint segNumA, JBIG2Bitmap *bitmap): -@@ -1010,8 +1020,17 @@ JBIG2Bitmap::JBIG2Bitmap(Guint segNumA, - w = bitmap->w; - h = bitmap->h; - line = bitmap->line; -- data = (Guchar *)gmalloc(h * line); -+ -+ if (h < 0 || line <= 0 || h >= (INT_MAX - 1) / line) { -+ error(-1, "invalid width/height"); -+ data = NULL; -+ return; -+ } -+ -+ // need to allocate one extra guard byte for use in combine() -+ data = (Guchar *)gmalloc(h * line + 1); - memcpy(data, bitmap->data, h * line); -+ data[h * line] = 0; - } - - JBIG2Bitmap::~JBIG2Bitmap() { -@@ -1036,10 +1055,14 @@ JBIG2Bitmap *JBIG2Bitmap::getSlice(Guint - } - - void JBIG2Bitmap::expand(int newH, Guint pixel) { -- if (newH <= h) { -+ if (newH <= h || line <= 0 || newH >= (INT_MAX - 1)/ line) { -+ error(-1, "invalid width/height"); -+ gfree(data); -+ data = NULL; - return; - } -- data = (Guchar *)grealloc(data, newH * line); -+ // need to allocate one extra guard byte for use in combine() -+ data = (Guchar *)grealloc(data, newH * line + 1); - if (pixel) { - memset(data + h * line, 0xff, (newH - h) * line); - } else { -@@ -2576,6 +2599,15 @@ void JBIG2Stream::readHalftoneRegionSeg( - error(getPos(), "Bad symbol dictionary reference in JBIG2 halftone segment"); - return; - } -+ if (gridH == 0 || gridW >= INT_MAX / gridH) { -+ error(getPos(), "Bad size in JBIG2 halftone segment"); -+ return; -+ } -+ if (w == 0 || h >= INT_MAX / w) { -+ error(getPos(), "Bad size in JBIG2 bitmap segment"); -+ return; -+ } -+ - patternDict = (JBIG2PatternDict *)seg; - bpp = 0; - i = 1; -@@ -3205,6 +3237,11 @@ JBIG2Bitmap *JBIG2Stream::readGenericRef - JBIG2BitmapPtr tpgrCXPtr0, tpgrCXPtr1, tpgrCXPtr2; - int x, y, pix; - -+ if (w < 0 || h <= 0 || w >= INT_MAX / h) { -+ error(-1, "invalid width/height"); -+ return NULL; -+ } -+ - bitmap = new JBIG2Bitmap(0, w, h); - bitmap->clearToZero(); - -# vim: syntax=diff diff --git a/app-text/cstetex/files/xpdf-3.00pl2-CAN-2004-1125.patch b/app-text/cstetex/files/xpdf-3.00pl2-CAN-2004-1125.patch deleted file mode 100644 index 119de236d50b..000000000000 --- a/app-text/cstetex/files/xpdf-3.00pl2-CAN-2004-1125.patch +++ /dev/null @@ -1,37 +0,0 @@ -*** Gfx.cc.orig Sun Dec 12 16:04:43 2004 ---- Gfx.cc Sun Dec 12 16:05:16 2004 -*************** -*** 2654,2660 **** - haveMask = gFalse; - dict->lookup("Mask", &maskObj); - if (maskObj.isArray()) { -! for (i = 0; i < maskObj.arrayGetLength(); ++i) { - maskObj.arrayGet(i, &obj1); - maskColors[i] = obj1.getInt(); - obj1.free(); ---- 2654,2662 ---- - haveMask = gFalse; - dict->lookup("Mask", &maskObj); - if (maskObj.isArray()) { -! for (i = 0; -! i < maskObj.arrayGetLength() && i < 2*gfxColorMaxComps; -! ++i) { - maskObj.arrayGet(i, &obj1); - maskColors[i] = obj1.getInt(); - obj1.free(); -*** GfxState.cc.orig Sun Dec 12 16:04:48 2004 ---- GfxState.cc Sun Dec 12 16:06:38 2004 -*************** -*** 708,713 **** ---- 708,718 ---- - } - nCompsA = obj2.getInt(); - obj2.free(); -+ if (nCompsA > gfxColorMaxComps) { -+ error(-1, "ICCBased color space with too many (%d > %d) components", -+ nCompsA, gfxColorMaxComps); -+ nCompsA = gfxColorMaxComps; -+ } - if (dict->lookup("Alternate", &obj2)->isNull() || - !(altA = GfxColorSpace::parse(&obj2))) { - switch (nCompsA) { diff --git a/app-text/cstetex/files/xpdf-3.00pl3-CAN-2005-0064.patch b/app-text/cstetex/files/xpdf-3.00pl3-CAN-2005-0064.patch deleted file mode 100644 index d7d2294c8527..000000000000 --- a/app-text/cstetex/files/xpdf-3.00pl3-CAN-2005-0064.patch +++ /dev/null @@ -1,14 +0,0 @@ -*** XRef.cc.orig Wed Jan 12 17:10:53 2005 ---- XRef.cc Wed Jan 12 17:11:22 2005 -*************** -*** 793,798 **** ---- 793,801 ---- - } else { - keyLength = 5; - } -+ if (keyLength > 16) { -+ keyLength = 16; -+ } - permFlags = permissions.getInt(); - if (encVersion >= 1 && encVersion <= 2 && - encRevision >= 2 && encRevision <= 3) { diff --git a/app-text/cstetex/files/xpdf-CESA-2004-007-xpdf2-newer.diff b/app-text/cstetex/files/xpdf-CESA-2004-007-xpdf2-newer.diff deleted file mode 100644 index 55a24458c9a4..000000000000 --- a/app-text/cstetex/files/xpdf-CESA-2004-007-xpdf2-newer.diff +++ /dev/null @@ -1,78 +0,0 @@ ---- XRef.cc.orig 2004-09-17 23:54:38.000000000 -0700 -+++ XRef.cc 2004-09-25 17:59:36.000000000 -0700 -@@ -76,6 +76,12 @@ - - // trailer is ok - read the xref table - } else { -+ if (size*sizeof(XRefEntry)/sizeof(XRefEntry) != size) { -+ error(-1, "Invalid 'size' inside xref table."); -+ ok = gFalse; -+ errCode = errDamaged; -+ return; -+ } - entries = (XRefEntry *)gmalloc(size * sizeof(XRefEntry)); - for (i = 0; i < size; ++i) { - entries[i].offset = 0xffffffff; -@@ -267,6 +273,10 @@ - // table size - if (first + n > size) { - newSize = size + 256; -+ if (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize) { -+ error(-1, "Invalid 'newSize'"); -+ goto err2; -+ } - entries = (XRefEntry *)grealloc(entries, newSize * sizeof(XRefEntry)); - for (i = size; i < newSize; ++i) { - entries[i].offset = 0xffffffff; -@@ -410,6 +420,10 @@ - if (!strncmp(p, "obj", 3)) { - if (num >= size) { - newSize = (num + 1 + 255) & ~255; -+ if (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize) { -+ error(-1, "Invalid 'obj' parameters."); -+ return gFalse; -+ } - entries = (XRefEntry *) - grealloc(entries, newSize * sizeof(XRefEntry)); - for (i = size; i < newSize; ++i) { -@@ -431,6 +445,11 @@ - } else if (!strncmp(p, "endstream", 9)) { - if (streamEndsLen == streamEndsSize) { - streamEndsSize += 64; -+ if (streamEndsSize*sizeof(int)/sizeof(int) != streamEndsSize) { -+ error(-1, "Invalid 'endstream' parameter."); -+ return gFalse; -+ } -+ - streamEnds = (Guint *)grealloc(streamEnds, - streamEndsSize * sizeof(int)); - } ---- Catalog.cc.orig 2004-10-18 16:26:39.388666476 +0200 -+++ Catalog.cc 2004-10-18 16:27:28.004749073 +0200 -@@ -62,6 +62,12 @@ - } - pagesSize = numPages0 = obj.getInt(); - obj.free(); -+ if (pagesSize*sizeof(Page *)/sizeof(Page *) != pagesSize || -+ pagesSize*sizeof(Ref)/sizeof(Ref) != pagesSize) { -+ error(-1, "Invalid 'pagesSize'"); -+ ok = gFalse; -+ return; -+ } - pages = (Page **)gmalloc(pagesSize * sizeof(Page *)); - pageRefs = (Ref *)gmalloc(pagesSize * sizeof(Ref)); - for (i = 0; i < pagesSize; ++i) { -@@ -186,6 +192,11 @@ - } - if (start >= pagesSize) { - pagesSize += 32; -+ if (pagesSize*sizeof(Page *)/sizeof(Page *) != pagesSize || -+ pagesSize*sizeof(Ref)/sizeof(Ref) != pagesSize) { -+ error(-1, "Invalid 'pagesSize' parameter."); -+ goto err3; -+ } - pages = (Page **)grealloc(pages, pagesSize * sizeof(Page *)); - pageRefs = (Ref *)grealloc(pageRefs, pagesSize * sizeof(Ref)); - for (j = pagesSize - 32; j < pagesSize; ++j) { - - diff --git a/app-text/cstetex/files/xpdf-goo-sizet.patch b/app-text/cstetex/files/xpdf-goo-sizet.patch deleted file mode 100644 index 5d90c5120bd4..000000000000 --- a/app-text/cstetex/files/xpdf-goo-sizet.patch +++ /dev/null @@ -1,57 +0,0 @@ -diff -ru xpdf-2.02pl1/goo/gmem.c xpdf-2.02pl1/goo/gmem.c ---- xpdf-2.02pl1/goo/gmem.c 2003-06-16 22:01:26.000000000 +0200 -+++ xpdf-2.02pl1/goo/gmem.c 2004-10-29 15:13:34.866919791 +0200 -@@ -53,9 +53,9 @@ - - #endif /* DEBUG_MEM */ - --void *gmalloc(int size) { -+void *gmalloc(size_t size) { - #ifdef DEBUG_MEM -- int size1; -+ size_t size1; - char *mem; - GMemHdr *hdr; - void *data; -@@ -94,11 +94,11 @@ - #endif - } - --void *grealloc(void *p, int size) { -+void *grealloc(void *p, size_t size) { - #ifdef DEBUG_MEM - GMemHdr *hdr; - void *q; -- int oldSize; -+ size_t oldSize; - - if (size == 0) { - if (p) -@@ -137,7 +137,7 @@ - - void gfree(void *p) { - #ifdef DEBUG_MEM -- int size; -+ size_t size; - GMemHdr *hdr; - GMemHdr *prevHdr, *q; - int lst; -diff -ru xpdf-2.02pl1/goo/gmem.h xpdf-2.02pl1/goo/gmem.h ---- xpdf-2.02pl1/goo/gmem.h 2003-06-16 22:01:26.000000000 +0200 -+++ xpdf-2.02pl1/goo/gmem.h 2004-10-29 15:13:50.864027201 +0200 -@@ -19,13 +19,13 @@ - * Same as malloc, but prints error message and exits if malloc() - * returns NULL. - */ --extern void *gmalloc(int size); -+extern void *gmalloc(size_t size); - - /* - * Same as realloc, but prints error message and exits if realloc() - * returns NULL. If <p> is NULL, calls malloc instead of realloc(). - */ --extern void *grealloc(void *p, int size); -+extern void *grealloc(void *p, size_t size); - - /* - * Same as free, but checks for and ignores NULL pointers. diff --git a/app-text/cstetex/files/xpdf2-underflow.patch b/app-text/cstetex/files/xpdf2-underflow.patch deleted file mode 100644 index 9371be84352e..000000000000 --- a/app-text/cstetex/files/xpdf2-underflow.patch +++ /dev/null @@ -1,81 +0,0 @@ -diff -ru xpdf-2.02pl1/xpdf/XRef.cc xpdf-2.02pl1/xpdf/XRef.cc ---- xpdf-2.02pl1/xpdf/XRef.cc 2004-10-29 15:16:45.790089001 +0200 -+++ xpdf-2.02pl1/xpdf/XRef.cc 2004-10-29 15:11:54.132168025 +0200 -@@ -66,6 +66,8 @@ - start = str->getStart(); - pos = readTrailer(); - -+ entries = NULL; -+ - // if there was a problem with the trailer, - // try to reconstruct the xref table - if (pos == 0) { -@@ -76,7 +78,7 @@ - - // trailer is ok - read the xref table - } else { -- if (size*sizeof(XRefEntry)/sizeof(XRefEntry) != size) { -+ if ((size < 0) || (size*sizeof(XRefEntry)/sizeof(XRefEntry) != size)) { - error(-1, "Invalid 'size' inside xref table."); - ok = gFalse; - errCode = errDamaged; -@@ -181,7 +183,7 @@ - n = atoi(p); - while ('0' <= *p && *p <= '9') ++p; - while (isspace(*p)) ++p; -- if (p == buf) -+ if ((p == buf) || (n < 0)) /* must make progress */ - return 0; - pos1 += (p - buf) + n * 20; - } -@@ -255,6 +257,10 @@ - } - s[i] = '\0'; - first = atoi(s); -+ if (first < 0) { -+ error(-1, "Invalid 'first'"); -+ goto err2; -+ } - while ((c = str->lookChar()) != EOF && isspace(c)) { - str->getChar(); - } -@@ -266,6 +272,10 @@ - } - s[i] = '\0'; - n = atoi(s); -+ if (n<=0) { -+ error(-1, "Invalid 'n'"); -+ goto err2; -+ } - while ((c = str->lookChar()) != EOF && isspace(c)) { - str->getChar(); - } -@@ -273,7 +283,7 @@ - // table size - if (first + n > size) { - newSize = size + 256; -- if (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize) { -+ if ((newSize < 0) || (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize)) { - error(-1, "Invalid 'newSize'"); - goto err2; - } -@@ -406,6 +416,10 @@ - // look for object - } else if (isdigit(*p)) { - num = atoi(p); -+ if (num < 0) { -+ error(-1, "Invalid 'num' parameters."); -+ return gFalse; -+ } - do { - ++p; - } while (*p && isdigit(*p)); -@@ -425,7 +439,7 @@ - if (!strncmp(p, "obj", 3)) { - if (num >= size) { - newSize = (num + 1 + 255) & ~255; -- if (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize) { -+ if ((newSize < 0) || (newSize*sizeof(XRefEntry)/sizeof(XRefEntry) != newSize)) { - error(-1, "Invalid 'obj' parameters."); - return gFalse; - } diff --git a/app-text/cstetex/metadata.xml b/app-text/cstetex/metadata.xml deleted file mode 100644 index f0f8b21219b2..000000000000 --- a/app-text/cstetex/metadata.xml +++ /dev/null @@ -1,12 +0,0 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> -<pkgmetadata> -<herd>tex</herd> -<maintainer> - <email>malenko@email.cz</email> - <name>Jaromir Malenko</name> - <description>This package is maintained by tex herd but - He helps us maintain the software. Without his knowledge of - Czech/Slovak, we couldn't keep cstetex in Portage ;-)</description> -</maintainer> -</pkgmetadata> |