From e3401b289a454111b1af3b2f5feac3897eb63553 Mon Sep 17 00:00:00 2001 From: Jory Pratt Date: Sun, 17 Oct 2021 07:13:04 -0500 Subject: dev-qt/qtnetwork: supported via ::gentoo Signed-off-by: Jory Pratt --- dev-qt/qtnetwork/Manifest | 1 - .../files/qtnetwork-5.12.1-libressl.patch | 93 ----------- .../files/qtnetwork-5.12.4-libressl.patch | 13 -- .../files/qtnetwork-5.14.2-CVE-2020-13962.patch | 172 --------------------- dev-qt/qtnetwork/metadata.xml | 26 ---- dev-qt/qtnetwork/qtnetwork-5.14.2-r1.ebuild | 71 --------- 6 files changed, 376 deletions(-) delete mode 100644 dev-qt/qtnetwork/Manifest delete mode 100644 dev-qt/qtnetwork/files/qtnetwork-5.12.1-libressl.patch delete mode 100644 dev-qt/qtnetwork/files/qtnetwork-5.12.4-libressl.patch delete mode 100644 dev-qt/qtnetwork/files/qtnetwork-5.14.2-CVE-2020-13962.patch delete mode 100644 dev-qt/qtnetwork/metadata.xml delete mode 100644 dev-qt/qtnetwork/qtnetwork-5.14.2-r1.ebuild diff --git a/dev-qt/qtnetwork/Manifest b/dev-qt/qtnetwork/Manifest deleted file mode 100644 index 8401e88..0000000 --- a/dev-qt/qtnetwork/Manifest +++ /dev/null @@ -1 +0,0 @@ -DIST qtbase-everywhere-src-5.14.2.tar.xz 49865752 BLAKE2B ed8eb18dfc79e9983248655eb62e8305ef8b79f96c7880c88533250fef8f0d187cf576082d41df08314711b4c007b94686486abd77bf9bc201336caa02ced300 SHA512 8c83e06d58b56e9f288e83d6c3dd4ad6cc9f1eb1a32c7b44fb912fda34ed7255766fd9fa60cd740ee001df7d6172f25df05f1f95e986c3e793fbcd9bf4f18de9 diff --git a/dev-qt/qtnetwork/files/qtnetwork-5.12.1-libressl.patch b/dev-qt/qtnetwork/files/qtnetwork-5.12.1-libressl.patch deleted file mode 100644 index bd86269..0000000 --- a/dev-qt/qtnetwork/files/qtnetwork-5.12.1-libressl.patch +++ /dev/null @@ -1,93 +0,0 @@ -diff --git a/src/network/configure.json b/src/network/configure.json -index f3e18662aa..8990763756 100644 ---- a/src/network/configure.json -+++ b/src/network/configure.json -@@ -165,7 +165,7 @@ - "test": { - "include": "openssl/opensslv.h", - "tail": [ -- "#if !defined(OPENSSL_VERSION_NUMBER) || OPENSSL_VERSION_NUMBER-0 < 0x10100000L", -+ "#if !defined(OPENSSL_VERSION_NUMBER) || OPENSSL_VERSION_NUMBER-0 < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)", - "# error OpenSSL >= 1.1 is required", - "#endif" - ] -diff --git a/src/network/ssl/qsslcontext_openssl.cpp b/src/network/ssl/qsslcontext_openssl.cpp -index 35cca9f01a..03afdc5945 100644 ---- a/src/network/ssl/qsslcontext_openssl.cpp -+++ b/src/network/ssl/qsslcontext_openssl.cpp -@@ -249,7 +249,7 @@ void QSslContext::applyBackendConfig(QSslContext *sslContext) - if (sslContext->sslConfiguration.backendConfiguration().isEmpty()) - return; - --#if OPENSSL_VERSION_NUMBER >= 0x10002000L -+#if OPENSSL_VERSION_NUMBER >= 0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) - if (QSslSocket::sslLibraryVersionNumber() >= 0x10002000L) { - QSharedPointer cctx(q_SSL_CONF_CTX_new(), &q_SSL_CONF_CTX_free); - if (cctx) { -diff --git a/src/network/ssl/qsslsocket_openssl_symbols.cpp b/src/network/ssl/qsslsocket_openssl_symbols.cpp -index 299df6b685..670314d7e5 100644 ---- a/src/network/ssl/qsslsocket_openssl_symbols.cpp -+++ b/src/network/ssl/qsslsocket_openssl_symbols.cpp -@@ -216,8 +216,13 @@ DEFINEFUNC3(void *, ASN1_dup, i2d_of_void *a, a, d2i_of_void *b, b, char *c, c, - #endif - DEFINEFUNC2(BIO *, BIO_new_file, const char *filename, filename, const char *mode, mode, return nullptr, return) - DEFINEFUNC(void, ERR_clear_error, DUMMYARG, DUMMYARG, return, DUMMYARG) -+#ifdef LIBRESSL_VERSION_NUMBER -+DEFINEFUNC(BIO *, BIO_new, const BIO_METHOD *a, a, return nullptr, return) -+DEFINEFUNC(const BIO_METHOD *, BIO_s_mem, void, DUMMYARG, return nullptr, return) -+#else - DEFINEFUNC(BIO *, BIO_new, BIO_METHOD *a, a, return nullptr, return) - DEFINEFUNC(BIO_METHOD *, BIO_s_mem, void, DUMMYARG, return nullptr, return) -+#endif - DEFINEFUNC(int, CRYPTO_num_locks, DUMMYARG, DUMMYARG, return 0, return) - DEFINEFUNC(void, CRYPTO_set_locking_callback, void (*a)(int, int, const char *, int), a, return, DUMMYARG) - DEFINEFUNC(void, CRYPTO_set_id_callback, unsigned long (*a)(), a, return, DUMMYARG) -@@ -443,7 +448,7 @@ DEFINEFUNC2(int, SSL_CTX_use_PrivateKey, SSL_CTX *a, a, EVP_PKEY *b, b, return - - DEFINEFUNC2(int, SSL_CTX_use_RSAPrivateKey, SSL_CTX *a, a, RSA *b, b, return -1, return) - DEFINEFUNC3(int, SSL_CTX_use_PrivateKey_file, SSL_CTX *a, a, const char *b, b, int c, c, return -1, return) - DEFINEFUNC(X509_STORE *, SSL_CTX_get_cert_store, const SSL_CTX *a, a, return nullptr, return) --#if OPENSSL_VERSION_NUMBER >= 0x10002000L -+#if OPENSSL_VERSION_NUMBER >= 0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) - DEFINEFUNC(SSL_CONF_CTX *, SSL_CONF_CTX_new, DUMMYARG, DUMMYARG, return nullptr, return); - DEFINEFUNC(void, SSL_CONF_CTX_free, SSL_CONF_CTX *a, a, return ,return); - DEFINEFUNC2(void, SSL_CONF_CTX_set_ssl_ctx, SSL_CONF_CTX *a, a, SSL_CTX *b, b, return, return); -@@ -1246,7 +1251,7 @@ bool q_resolveOpenSslSymbols() - RESOLVEFUNC(SSL_CTX_use_RSAPrivateKey) - RESOLVEFUNC(SSL_CTX_use_PrivateKey_file) - RESOLVEFUNC(SSL_CTX_get_cert_store); --#if OPENSSL_VERSION_NUMBER >= 0x10002000L -+#if OPENSSL_VERSION_NUMBER >= 0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) - RESOLVEFUNC(SSL_CONF_CTX_new); - RESOLVEFUNC(SSL_CONF_CTX_free); - RESOLVEFUNC(SSL_CONF_CTX_set_ssl_ctx); -diff --git a/src/network/ssl/qsslsocket_openssl_symbols_p.h b/src/network/ssl/qsslsocket_openssl_symbols_p.h -index bfdfbf0efc..ad2bd4056b 100644 ---- a/src/network/ssl/qsslsocket_openssl_symbols_p.h -+++ b/src/network/ssl/qsslsocket_openssl_symbols_p.h -@@ -359,7 +359,7 @@ int q_SSL_CTX_use_PrivateKey(SSL_CTX *a, EVP_PKEY *b); - int q_SSL_CTX_use_RSAPrivateKey(SSL_CTX *a, RSA *b); - int q_SSL_CTX_use_PrivateKey_file(SSL_CTX *a, const char *b, int c); - X509_STORE *q_SSL_CTX_get_cert_store(const SSL_CTX *a); --#if OPENSSL_VERSION_NUMBER >= 0x10002000L -+#if OPENSSL_VERSION_NUMBER >= 0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) - SSL_CONF_CTX *q_SSL_CONF_CTX_new(); - void q_SSL_CONF_CTX_free(SSL_CONF_CTX *a); - void q_SSL_CONF_CTX_set_ssl_ctx(SSL_CONF_CTX *a, SSL_CTX *b); -diff --git a/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h b/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -index b7bac5d2a2..9a1a89b0e4 100644 ---- a/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -+++ b/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -@@ -78,8 +78,13 @@ - unsigned char * q_ASN1_STRING_data(ASN1_STRING *a); - BIO *q_BIO_new_file(const char *filename, const char *mode); - void q_ERR_clear_error(); -+#ifdef LIBRESSL_VERSION_NUMBER -+Q_AUTOTEST_EXPORT BIO *q_BIO_new(const BIO_METHOD *a); -+Q_AUTOTEST_EXPORT const BIO_METHOD *q_BIO_s_mem(); -+#else - Q_AUTOTEST_EXPORT BIO *q_BIO_new(BIO_METHOD *a); - Q_AUTOTEST_EXPORT BIO_METHOD *q_BIO_s_mem(); -+#endif - int q_CRYPTO_num_locks(); - void q_CRYPTO_set_locking_callback(void (*a)(int, int, const char *, int)); - void q_CRYPTO_set_id_callback(unsigned long (*a)()); diff --git a/dev-qt/qtnetwork/files/qtnetwork-5.12.4-libressl.patch b/dev-qt/qtnetwork/files/qtnetwork-5.12.4-libressl.patch deleted file mode 100644 index 8f33a93..0000000 --- a/dev-qt/qtnetwork/files/qtnetwork-5.12.4-libressl.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/src/network/ssl/qsslsocket_openssl.cpp b/src/network/ssl/qsslsocket_openssl.cpp -index c8bc6e06..76324ea5 100644 ---- a/src/network/ssl/qsslsocket_openssl.cpp -+++ b/src/network/ssl/qsslsocket_openssl.cpp -@@ -460,7 +460,7 @@ bool QSslSocketBackendPrivate::initSslContext() - q_SSL_set_psk_server_callback(ssl, &q_ssl_psk_server_callback); - } - #endif --#if OPENSSL_VERSION_NUMBER >= 0x10101006L -+#if OPENSSL_VERSION_NUMBER >= 0x10101006L && !defined(LIBRESSL_VERSION_NUMBER) - // Set the client callback for TLSv1.3 PSK - if (mode == QSslSocket::SslClientMode - && QSslSocket::sslLibraryBuildVersionNumber() >= 0x10101006L) { diff --git a/dev-qt/qtnetwork/files/qtnetwork-5.14.2-CVE-2020-13962.patch b/dev-qt/qtnetwork/files/qtnetwork-5.14.2-CVE-2020-13962.patch deleted file mode 100644 index 9bbdda6..0000000 --- a/dev-qt/qtnetwork/files/qtnetwork-5.14.2-CVE-2020-13962.patch +++ /dev/null @@ -1,172 +0,0 @@ -From 8ddffc6ba4f38bb8dbeb0cf61b6b10ee73505bbb Mon Sep 17 00:00:00 2001 -From: Timur Pocheptsov -Date: Mon, 13 Apr 2020 20:31:34 +0200 -Subject: [PATCH] OpenSSL: handle SSL_shutdown's errors properly -MIME-Version: 1.0 -Content-Type: text/plain; charset=utf8 -Content-Transfer-Encoding: 8bit - -Do not call SSL_shutdown on a session that is in handshake state (SSL_in_init(s) -returns 1). Also, do not call SSL_shutdown if a session encountered a fatal -error (SSL_ERROR_SYSCALL or SSL_ERROR_SSL was found before). If SSL_shutdown -was unsuccessful (returned code != 1), we have to clear the error(s) it queued. -Unfortunately, SSL_in_init was a macro in OpenSSL 1.0.x. We have to -resolve SSL_state to implement SSL_in_init. - -Fixes: QTBUG-83450 -Change-Id: I6326119f4e79605429263045ac20605c30dccca3 -Reviewed-by: MÃ¥rten Nordheim -(cherry picked from commit 8907635da59c2ae0e8db01f27b24a841b830e655) ---- - src/network/ssl/qsslsocket.cpp | 2 +- - src/network/ssl/qsslsocket_openssl.cpp | 23 ++++++++++++++++------ - src/network/ssl/qsslsocket_openssl11_symbols_p.h | 7 +++++++ - src/network/ssl/qsslsocket_openssl_symbols.cpp | 8 ++++++++ - .../ssl/qsslsocket_opensslpre11_symbols_p.h | 2 ++ - src/network/ssl/qsslsocket_p.h | 1 + - 6 files changed, 36 insertions(+), 7 deletions(-) - -diff --git a/src/network/ssl/qsslsocket.cpp b/src/network/ssl/qsslsocket.cpp -index 4e9e9472631..5c9e589ec39 100644 ---- a/src/network/ssl/qsslsocket.cpp -+++ b/src/network/ssl/qsslsocket.cpp -@@ -2166,7 +2166,7 @@ void QSslSocketPrivate::init() - pendingClose = false; - flushTriggered = false; - ocspResponses.clear(); -- -+ systemOrSslErrorDetected = false; - // we don't want to clear the ignoreErrorsList, so - // that it is possible setting it before connecting - // ignoreErrorsList.clear(); -diff --git a/src/network/ssl/qsslsocket_openssl.cpp b/src/network/ssl/qsslsocket_openssl.cpp -index 51510f1c60b..855865209bc 100644 ---- a/src/network/ssl/qsslsocket_openssl.cpp -+++ b/src/network/ssl/qsslsocket_openssl.cpp -@@ -648,10 +648,16 @@ bool QSslSocketBackendPrivate::initSslContext() - void QSslSocketBackendPrivate::destroySslContext() - { - if (ssl) { -- // We do not send a shutdown alert here. Just mark the session as -- // resumable for qhttpnetworkconnection's "optimization", otherwise -- // OpenSSL won't start a session resumption. -- q_SSL_shutdown(ssl); -+ if (!q_SSL_in_init(ssl) && !systemOrSslErrorDetected) { -+ // We do not send a shutdown alert here. Just mark the session as -+ // resumable for qhttpnetworkconnection's "optimization", otherwise -+ // OpenSSL won't start a session resumption. -+ if (q_SSL_shutdown(ssl) != 1) { -+ // Some error may be queued, clear it. -+ const auto errors = getErrorsFromOpenSsl(); -+ Q_UNUSED(errors); -+ } -+ } - q_SSL_free(ssl); - ssl = nullptr; - } -@@ -1084,6 +1090,7 @@ void QSslSocketBackendPrivate::transmit() - case SSL_ERROR_SSL: // error in the SSL library - // we do not know exactly what the error is, nor whether we can recover from it, - // so just return to prevent an endless loop in the outer "while" statement -+ systemOrSslErrorDetected = true; - { - const ScopedBool bg(inSetAndEmitError, true); - setErrorAndEmit(QAbstractSocket::SslInternalError, -@@ -1681,8 +1688,12 @@ bool QSslSocketBackendPrivate::checkOcspStatus() - void QSslSocketBackendPrivate::disconnectFromHost() - { - if (ssl) { -- if (!shutdown) { -- q_SSL_shutdown(ssl); -+ if (!shutdown && !q_SSL_in_init(ssl) && !systemOrSslErrorDetected) { -+ if (q_SSL_shutdown(ssl) != 1) { -+ // Some error may be queued, clear it. -+ const auto errors = getErrorsFromOpenSsl(); -+ Q_UNUSED(errors); -+ } - shutdown = true; - transmit(); - } -diff --git a/src/network/ssl/qsslsocket_openssl11_symbols_p.h b/src/network/ssl/qsslsocket_openssl11_symbols_p.h -index 0fe0899d4fd..b7193ad1807 100644 ---- a/src/network/ssl/qsslsocket_openssl11_symbols_p.h -+++ b/src/network/ssl/qsslsocket_openssl11_symbols_p.h -@@ -192,4 +192,11 @@ typedef int (*q_SSL_psk_use_session_cb_func_t)(SSL *, const EVP_MD *, const unsi - } - void q_SSL_set_psk_use_session_callback(SSL *s, q_SSL_psk_use_session_cb_func_t); - -+#if OPENSSL_VERSION_NUMBER < 0x10101000L -+// What a mess! -+int q_SSL_in_init(SSL *s); -+#else -+int q_SSL_in_init(const SSL *s); -+#endif // 1.1.1 or 1.1.0 -+ - #endif -diff --git a/src/network/ssl/qsslsocket_openssl_symbols.cpp b/src/network/ssl/qsslsocket_openssl_symbols.cpp -index 85029a6ff3f..d1bd84cf25f 100644 ---- a/src/network/ssl/qsslsocket_openssl_symbols.cpp -+++ b/src/network/ssl/qsslsocket_openssl_symbols.cpp -@@ -160,6 +160,11 @@ DEFINEFUNC(void, OPENSSL_sk_free, OPENSSL_STACK *a, a, return, DUMMYARG) - DEFINEFUNC2(void *, OPENSSL_sk_value, OPENSSL_STACK *a, a, int b, b, return nullptr, return) - DEFINEFUNC(int, SSL_session_reused, SSL *a, a, return 0, return) - DEFINEFUNC2(unsigned long, SSL_CTX_set_options, SSL_CTX *ctx, ctx, unsigned long op, op, return 0, return) -+#if OPENSSL_VERSION_NUMBER < 0x10101000L -+DEFINEFUNC(int, SSL_in_init, SSL *a, a, return 0, return) -+#else -+DEFINEFUNC(int, SSL_in_init, const SSL *a, a, return 0, return) -+#endif - #ifdef TLS1_3_VERSION - DEFINEFUNC2(int, SSL_CTX_set_ciphersuites, SSL_CTX *ctx, ctx, const char *str, str, return 0, return) - DEFINEFUNC2(void, SSL_set_psk_use_session_callback, SSL *ssl, ssl, q_SSL_psk_use_session_cb_func_t callback, callback, return, DUMMYARG) -@@ -242,6 +247,7 @@ DEFINEFUNC2(void, BIO_set_shutdown, BIO *a, a, int shut, shut, return, DUMMYARG) - // Functions below are either deprecated or removed in OpenSSL >= 1.1: - - DEFINEFUNC(unsigned char *, ASN1_STRING_data, ASN1_STRING *a, a, return nullptr, return) -+DEFINEFUNC(int, SSL_state, const SSL *a, a, return 0, return) - - #ifdef SSLEAY_MACROS - DEFINEFUNC3(void *, ASN1_dup, i2d_of_void *a, a, d2i_of_void *b, b, char *c, c, return nullptr, return) -@@ -971,6 +977,7 @@ bool q_resolveOpenSslSymbols() - #if QT_CONFIG(opensslv11) - - RESOLVEFUNC(OPENSSL_init_ssl) -+ RESOLVEFUNC(SSL_in_init) - RESOLVEFUNC(OPENSSL_init_crypto) - RESOLVEFUNC(ASN1_STRING_get0_data) - RESOLVEFUNC(EVP_CIPHER_CTX_reset) -@@ -1066,6 +1073,7 @@ bool q_resolveOpenSslSymbols() - #else // !opensslv11 - - RESOLVEFUNC(ASN1_STRING_data) -+ RESOLVEFUNC(SSL_state) - - #ifdef SSLEAY_MACROS - RESOLVEFUNC(ASN1_dup) -diff --git a/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h b/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -index f5626d5d164..92841017793 100644 ---- a/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -+++ b/src/network/ssl/qsslsocket_opensslpre11_symbols_p.h -@@ -121,6 +121,8 @@ SSL_CTX *q_SSL_CTX_new(const SSL_METHOD *a); - - int q_SSL_library_init(); - void q_SSL_load_error_strings(); -+int q_SSL_state(const SSL *a); -+#define q_SSL_in_init(a) (q_SSL_state(a) & SSL_ST_INIT) - - #if OPENSSL_VERSION_NUMBER >= 0x10001000L - int q_SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); -diff --git a/src/network/ssl/qsslsocket_p.h b/src/network/ssl/qsslsocket_p.h -index daa9be23f4a..350b1f1fc18 100644 ---- a/src/network/ssl/qsslsocket_p.h -+++ b/src/network/ssl/qsslsocket_p.h -@@ -208,6 +208,7 @@ protected: - bool verifyErrorsHaveBeenIgnored(); - bool paused; - bool flushTriggered; -+ bool systemOrSslErrorDetected = false; - QVector ocspResponses; - }; - --- -2.16.3 diff --git a/dev-qt/qtnetwork/metadata.xml b/dev-qt/qtnetwork/metadata.xml deleted file mode 100644 index 19a09a6..0000000 --- a/dev-qt/qtnetwork/metadata.xml +++ /dev/null @@ -1,26 +0,0 @@ - - - - - qt@gentoo.org - Gentoo Qt Project - - - Disable EC support via dev-libs/openssl - Enable net-misc/connman-based bearer plugin - Enable support for GSSAPI (virtual/krb5) - Use net-libs/libproxy for automatic - HTTP/SOCKS proxy configuration - Enable net-misc/networkmanager-based - bearer plugin - - - https://bugreports.qt.io/ - https://doc.qt.io/ - - - - Must only be used by packages that are known to use private parts of the Qt API. - - - diff --git a/dev-qt/qtnetwork/qtnetwork-5.14.2-r1.ebuild b/dev-qt/qtnetwork/qtnetwork-5.14.2-r1.ebuild deleted file mode 100644 index 6f2da58..0000000 --- a/dev-qt/qtnetwork/qtnetwork-5.14.2-r1.ebuild +++ /dev/null @@ -1,71 +0,0 @@ -# Copyright 1999-2020 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 -QT5_MODULE="qtbase" -inherit qt5-build - -DESCRIPTION="Network abstraction library for the Qt5 framework" - -if [[ ${QT5_BUILD_TYPE} == release ]]; then - KEYWORDS="amd64 arm arm64 ~hppa ~ppc ppc64 ~sparc x86" -fi - -IUSE="bindist connman gssapi libproxy libressl networkmanager sctp +ssl" - -DEPEND=" - ~dev-qt/qtcore-${PV}:5= - sys-libs/zlib:= - connman? ( ~dev-qt/qtdbus-${PV} ) - gssapi? ( virtual/krb5 ) - libproxy? ( net-libs/libproxy ) - networkmanager? ( ~dev-qt/qtdbus-${PV} ) - sctp? ( kernel_linux? ( net-misc/lksctp-tools ) ) - ssl? ( - !libressl? ( dev-libs/openssl:0=[bindist=] ) - libressl? ( dev-libs/libressl:0= ) - ) -" -RDEPEND="${DEPEND} - connman? ( net-misc/connman ) - networkmanager? ( net-misc/networkmanager ) -" - -PATCHES=( - "${FILESDIR}/${P}-CVE-2020-13962.patch" # bug 727604, QTBUG-83450 - "${FILESDIR}"/${PN}-5.12.1-libressl.patch - "${FILESDIR}"/${PN}-5.12.4-libressl.patch -) - -QT5_TARGET_SUBDIRS=( - src/network - src/plugins/bearer/generic -) - -QT5_GENTOO_CONFIG=( - libproxy:libproxy: - ssl::SSL - ssl::OPENSSL - ssl:openssl-linked:LINKED_OPENSSL -) - -QT5_GENTOO_PRIVATE_CONFIG=( - :network -) - -pkg_setup() { - use connman && QT5_TARGET_SUBDIRS+=(src/plugins/bearer/connman) - use networkmanager && QT5_TARGET_SUBDIRS+=(src/plugins/bearer/networkmanager) -} - -src_configure() { - local myconf=( - $(usex connman -dbus-linked '') - $(usex gssapi -feature-gssapi -no-feature-gssapi) - $(qt_use libproxy) - $(usex networkmanager -dbus-linked '') - $(qt_use sctp) - $(usex ssl -openssl-linked '') - ) - qt5-build_src_configure -} -- cgit v1.2.3-65-gdbad