summaryrefslogtreecommitdiff
path: root/devel/qt6-base/files
diff options
context:
space:
mode:
Diffstat (limited to 'devel/qt6-base/files')
-rw-r--r--devel/qt6-base/files/patch-sock_seqpacket105
-rw-r--r--devel/qt6-base/files/patch-src_corelib_CMakeLists.txt4
-rw-r--r--devel/qt6-base/files/patch-src_corelib_global_qcompilerdetection.h4
-rw-r--r--devel/qt6-base/files/patch-src_corelib_io_qlockfile__unix.cpp6
-rw-r--r--devel/qt6-base/files/patch-src_corelib_time_qtimezoneprivate__tz.cpp4
-rw-r--r--devel/qt6-base/files/patch-src_network_socket_qnativesocketengine__unix.cpp4
-rw-r--r--devel/qt6-base/files/patch-src_plugins_platforms_wayland_plugins_shellintegration_xdg-shell_qwaylandxdgshell__p.h13
-rw-r--r--devel/qt6-base/files/patch-src_plugins_platforms_wayland_qwaylandshellsurface__p.h23
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qopenssl__p.h4
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslcontext__openssl.cpp26
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols.cpp22
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols__p.h12
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qtls__openssl.cpp4
-rw-r--r--devel/qt6-base/files/patch-src_plugins_tls_openssl_qx509__openssl.cpp6
14 files changed, 84 insertions, 153 deletions
diff --git a/devel/qt6-base/files/patch-sock_seqpacket b/devel/qt6-base/files/patch-sock_seqpacket
deleted file mode 100644
index 0ce628239939..000000000000
--- a/devel/qt6-base/files/patch-sock_seqpacket
+++ /dev/null
@@ -1,105 +0,0 @@
-https://codereview.qt-project.org/c/qt/qtbase/+/681531
-https://codereview.qt-project.org/c/qt/qtbase/+/682568
-
-From 8e06365bee31ef5a1980b7b24d1564e3d769cfc7 Mon Sep 17 00:00:00 2001
-From: Gleb Popov <arrowd@FreeBSD.org>
-Date: Thu, 2 Oct 2025 13:14:54 +0300
-Subject: [PATCH] QNativeSocketEngine::read: Only treat readBytes==0 as a EOF
- condition with stream sockets
-
-This change also covers SOCK_SEQPACKET type of sockets, which isn't great,
-but allows to avoid an endless polling loop when waiting for read on
-a disconnected socket.
-
-Pick-to: 6.10
-Change-Id: I6117b97c2c9b775e9e6fe9757bf4374365e3227d
-Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
----
- src/network/socket/qnativesocketengine.cpp | 11 +++++------
- 1 file changed, 5 insertions(+), 6 deletions(-)
-
-diff --git src/network/socket/qnativesocketengine.cpp src/network/socket/qnativesocketengine.cpp
-index f33e5a26bd94..4c83ef7e5df6 100644
---- src/network/socket/qnativesocketengine.cpp
-+++ src/network/socket/qnativesocketengine.cpp
-@@ -910,12 +910,11 @@ qint64 QNativeSocketEngine::read(char *data, qint64 maxSize)
-
- qint64 readBytes = d->nativeRead(data, maxSize);
-
-- // Handle remote close
-- if (readBytes == 0 && (d->socketType == QAbstractSocket::TcpSocket
--#ifndef QT_NO_SCTP
-- || d->socketType == QAbstractSocket::SctpSocket
--#endif
-- )) {
-+ // Handle remote close.
-+ // Non-datagram socket types signal the EOF state with a zero read.
-+ // Note that it is perfectly fine to have a 0-byte message with datagram
-+ // sockets (SOCK_DGRAM or SOCK_SEQPACKET).
-+ if (readBytes == 0 && d->socketType != QAbstractSocket::UdpSocket) {
- d->setError(QAbstractSocket::RemoteHostClosedError,
- QNativeSocketEnginePrivate::RemoteHostClosedErrorString);
- close();
---
-2.43.0
-
-From a395c091a56781352113670b72ba619367486e7e Mon Sep 17 00:00:00 2001
-From: Gleb Popov <arrowd@FreeBSD.org>
-Date: Tue, 7 Oct 2025 10:53:18 +0300
-Subject: [PATCH] Teach QNativeSocketEnginePrivate::fetchConnectionParameters()
- about SOCK_SEQPACKET
-
-Pick-to: 6.10
-Change-Id: I4136ef3b4c198e3bd155884bde53171bd34959e4
-Reviewed-by: Thiago Macieira <thiago.macieira@intel.com>
----
- .../socket/qnativesocketengine_unix.cpp | 23 ++++++++++++-------
- 1 file changed, 15 insertions(+), 8 deletions(-)
-
-diff --git src/network/socket/qnativesocketengine_unix.cpp src/network/socket/qnativesocketengine_unix.cpp
-index b5fbb5c2e003..bcd9aecdea97 100644
---- src/network/socket/qnativesocketengine_unix.cpp
-+++ src/network/socket/qnativesocketengine_unix.cpp
-@@ -1244,6 +1244,7 @@ bool QNativeSocketEnginePrivate::fetchConnectionParameters()
- QT_SOCKOPTLEN_T valueSize = sizeof(int);
- if (::getsockopt(socketDescriptor, SOL_SOCKET, SO_TYPE, &value, &valueSize) == 0) {
- if (value == SOCK_STREAM) {
-+ socketType = QAbstractSocket::TcpSocket;
- #ifndef QT_NO_SCTP
- if (option(QNativeSocketEngine::MaxStreamsSocketOption) != -1) {
- socketType = QAbstractSocket::SctpSocket;
-@@ -1266,17 +1267,23 @@ bool QNativeSocketEnginePrivate::fetchConnectionParameters()
- return false;
- }
- }
-- } else {
-- socketType = QAbstractSocket::TcpSocket;
- }
--#else
-- socketType = QAbstractSocket::TcpSocket;
-+#endif
-+ } else if (value == SOCK_DGRAM) {
-+ socketType = QAbstractSocket::UdpSocket;
-+#ifdef SOCK_SEQPACKET
-+ } else if (value == SOCK_SEQPACKET) {
-+ // We approximate the SEQPACKET socket type to TCP, because
-+ // this enum is actually used to determine if the socket type has
-+ // a notion of connection. SOCK_DGRAM are connectionless, while
-+ // SOCK_STREAM and SOCK_SEQPACKET are connection-orientired.
-+ // This mapping is still suboptimal, because it is possible to send
-+ // a 0-byte packet via SEQPACKET socket and Qt will treat it as
-+ // a disconnect.
-+ socketType = QAbstractSocket::TcpSocket;
- #endif
- } else {
-- if (value == SOCK_DGRAM)
-- socketType = QAbstractSocket::UdpSocket;
-- else
-- socketType = QAbstractSocket::UnknownSocketType;
-+ socketType = QAbstractSocket::UnknownSocketType;
- }
- }
- #if defined (QNATIVESOCKETENGINE_DEBUG)
---
-2.43.0
-
diff --git a/devel/qt6-base/files/patch-src_corelib_CMakeLists.txt b/devel/qt6-base/files/patch-src_corelib_CMakeLists.txt
index 32dfb0e5e986..f816905017cc 100644
--- a/devel/qt6-base/files/patch-src_corelib_CMakeLists.txt
+++ b/devel/qt6-base/files/patch-src_corelib_CMakeLists.txt
@@ -1,6 +1,6 @@
---- src/corelib/CMakeLists.txt.orig 2025-02-19 13:05:34 UTC
+--- src/corelib/CMakeLists.txt.orig 2025-05-14 09:43:58 UTC
+++ src/corelib/CMakeLists.txt
-@@ -402,6 +402,10 @@ endif()
+@@ -412,6 +412,10 @@ endif()
target_link_libraries(Platform INTERFACE Threads::Threads)
endif()
diff --git a/devel/qt6-base/files/patch-src_corelib_global_qcompilerdetection.h b/devel/qt6-base/files/patch-src_corelib_global_qcompilerdetection.h
index 5047f42ef687..a0bb0a31a996 100644
--- a/devel/qt6-base/files/patch-src_corelib_global_qcompilerdetection.h
+++ b/devel/qt6-base/files/patch-src_corelib_global_qcompilerdetection.h
@@ -5,9 +5,9 @@ error: use of the 'nodiscard' attribute is a C++20 extension
https://github.com/llvm/llvm-project/issues/32865
---- src/corelib/global/qcompilerdetection.h.orig 2025-05-28 10:22:57 UTC
+--- src/corelib/global/qcompilerdetection.h.orig 2025-05-14 09:43:58 UTC
+++ src/corelib/global/qcompilerdetection.h
-@@ -966,7 +966,7 @@
+@@ -972,7 +972,7 @@
# define Q_REQUIRED_RESULT [[nodiscard]]
#endif
diff --git a/devel/qt6-base/files/patch-src_corelib_io_qlockfile__unix.cpp b/devel/qt6-base/files/patch-src_corelib_io_qlockfile__unix.cpp
index 776dd9fd0447..05b9ba9b69f0 100644
--- a/devel/qt6-base/files/patch-src_corelib_io_qlockfile__unix.cpp
+++ b/devel/qt6-base/files/patch-src_corelib_io_qlockfile__unix.cpp
@@ -1,6 +1,6 @@
---- src/corelib/io/qlockfile_unix.cpp.orig 2024-11-14 11:02:40 UTC
+--- src/corelib/io/qlockfile_unix.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/corelib/io/qlockfile_unix.cpp
-@@ -46,6 +46,8 @@
+@@ -47,6 +47,8 @@
# include <sys/sysctl.h>
# if !defined(Q_OS_NETBSD)
# include <sys/user.h>
@@ -9,7 +9,7 @@
# endif
#endif
-@@ -237,23 +239,44 @@ QString QLockFilePrivate::processNameByPid(qint64 pid)
+@@ -238,23 +240,44 @@ QString QLockFilePrivate::processNameByPid(qint64 pid)
struct kinfo_proc kp;
int mib[6] = { CTL_KERN, KERN_PROC, KERN_PROC_PID, (int)pid, sizeof(struct kinfo_proc), 1 };
# else
diff --git a/devel/qt6-base/files/patch-src_corelib_time_qtimezoneprivate__tz.cpp b/devel/qt6-base/files/patch-src_corelib_time_qtimezoneprivate__tz.cpp
index e77da3e4be7a..0c9359be1f14 100644
--- a/devel/qt6-base/files/patch-src_corelib_time_qtimezoneprivate__tz.cpp
+++ b/devel/qt6-base/files/patch-src_corelib_time_qtimezoneprivate__tz.cpp
@@ -1,6 +1,6 @@
---- src/corelib/time/qtimezoneprivate_tz.cpp.orig 2025-03-11 12:45:59 UTC
+--- src/corelib/time/qtimezoneprivate_tz.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/corelib/time/qtimezoneprivate_tz.cpp
-@@ -1312,8 +1312,16 @@ class ZoneNameReader (public)
+@@ -1313,8 +1313,16 @@ class ZoneNameReader (public)
const StatIdent local = identify("/etc/localtime");
const StatIdent tz = identify("/etc/TZ");
const StatIdent timezone = identify("/etc/timezone");
diff --git a/devel/qt6-base/files/patch-src_network_socket_qnativesocketengine__unix.cpp b/devel/qt6-base/files/patch-src_network_socket_qnativesocketengine__unix.cpp
index a61cd8a94a13..4f6b594d0575 100644
--- a/devel/qt6-base/files/patch-src_network_socket_qnativesocketengine__unix.cpp
+++ b/devel/qt6-base/files/patch-src_network_socket_qnativesocketengine__unix.cpp
@@ -1,8 +1,8 @@
https://codereview.qt-project.org/c/qt/qtbase/+/651678
---- src/network/socket/qnativesocketengine_unix.cpp.orig 2025-06-08 12:42:24 UTC
+--- src/network/socket/qnativesocketengine_unix.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/network/socket/qnativesocketengine_unix.cpp
-@@ -1379,7 +1379,7 @@ int QNativeSocketEnginePrivate::nativeSelect(QDeadline
+@@ -1387,7 +1387,7 @@ int QNativeSocketEnginePrivate::nativeSelect(QDeadline
}
static const short read_flags = POLLIN | POLLHUP | POLLERR;
diff --git a/devel/qt6-base/files/patch-src_plugins_platforms_wayland_plugins_shellintegration_xdg-shell_qwaylandxdgshell__p.h b/devel/qt6-base/files/patch-src_plugins_platforms_wayland_plugins_shellintegration_xdg-shell_qwaylandxdgshell__p.h
new file mode 100644
index 000000000000..ac5c4f661c66
--- /dev/null
+++ b/devel/qt6-base/files/patch-src_plugins_platforms_wayland_plugins_shellintegration_xdg-shell_qwaylandxdgshell__p.h
@@ -0,0 +1,13 @@
+Companion change to patch-src_plugins_shellintegration_xdg-shell_qwaylandxdgshell__p.h
+
+--- src/plugins/platforms/wayland/plugins/shellintegration/xdg-shell/qwaylandxdgshell_p.h.orig 2025-05-14 09:43:58 UTC
++++ src/plugins/platforms/wayland/plugins/shellintegration/xdg-shell/qwaylandxdgshell_p.h
+@@ -74,7 +74,7 @@ class Q_WAYLANDCLIENT_EXPORT QWaylandXdgSurface : publ
+
+ void setSizeHints();
+
+- void *nativeResource(const QByteArray &resource);
++ void *nativeResource(const QByteArray &resource) override;
+
+ std::any surfaceRole() const override;
+
diff --git a/devel/qt6-base/files/patch-src_plugins_platforms_wayland_qwaylandshellsurface__p.h b/devel/qt6-base/files/patch-src_plugins_platforms_wayland_qwaylandshellsurface__p.h
new file mode 100644
index 000000000000..e0728427ffa9
--- /dev/null
+++ b/devel/qt6-base/files/patch-src_plugins_platforms_wayland_qwaylandshellsurface__p.h
@@ -0,0 +1,23 @@
+Add QWaylandShellSurface::nativeResource() to allow using it instead of
+surfaceRole(). The problem with latter is that it relies on RTTI, which is not
+stable across shared modules loaded with RTLD_LOCAL.
+
+x11/plasma6-layer-shell-qt calls into this private API and crashes. Linux/GCC
+users are not seeing this because libstdc++ use different algorithm for comparing
+RTTI. Our libc++ can be switched to this algorithm too by building with
+-DLIBCXX_TYPEINFO_COMPARISON_IMPLEMENTATION=2, but this is too drastic approach.
+
+Related URLs:
+* https://bugs.kde.org/show_bug.cgi?id=479679
+* https://github.com/llvm/llvm-project/issues/36746
+
+--- src/plugins/platforms/wayland/qwaylandshellsurface_p.h.orig 2025-05-14 09:43:58 UTC
++++ src/plugins/platforms/wayland/qwaylandshellsurface_p.h
+@@ -84,6 +84,7 @@ class Q_WAYLANDCLIENT_EXPORT QWaylandShellSurface : pu
+ QPlatformWindow *platformWindow();
+ struct wl_surface *wlSurface();
+
++ virtual void* nativeResource(const QByteArray&) { return nullptr; }
+ virtual std::any surfaceRole() const { return std::any(); };
+
+ virtual void attachPopup(QWaylandShellSurface *popup) { Q_UNUSED(popup); }
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qopenssl__p.h b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qopenssl__p.h
index e6298f935613..ec2e8651c07f 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qopenssl__p.h
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qopenssl__p.h
@@ -1,6 +1,6 @@
---- src/plugins/tls/openssl/qopenssl_p.h.orig 2023-09-21 19:24:26 UTC
+--- src/plugins/tls/openssl/qopenssl_p.h.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qopenssl_p.h
-@@ -70,6 +70,13 @@ QT_BEGIN_NAMESPACE
+@@ -71,6 +71,13 @@ QT_BEGIN_NAMESPACE
QT_BEGIN_NAMESPACE
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslcontext__openssl.cpp b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslcontext__openssl.cpp
index 02dc9a1f8e2a..010b3de27a8c 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslcontext__openssl.cpp
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslcontext__openssl.cpp
@@ -1,18 +1,18 @@
---- src/plugins/tls/openssl/qsslcontext_openssl.cpp.orig 2025-02-19 13:05:34 UTC
+--- src/plugins/tls/openssl/qsslcontext_openssl.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qsslcontext_openssl.cpp
-@@ -49,9 +49,9 @@ extern "C" int q_verify_cookie_callback(SSL *ssl, cons
- }
- #endif // dtls
+@@ -36,9 +36,9 @@ int qt_OCSP_status_server_callback(SSL *ssl, void *);
+ int qt_OCSP_status_server_callback(SSL *ssl, void *);
+ #endif // ocsp
-#ifdef TLS1_3_VERSION
+#if defined(TLS1_3_VERSION) && !defined(LIBRESSL_VERSION_NUMBER)
- extern "C" int q_ssl_sess_set_new_cb(SSL *context, SSL_SESSION *session);
+ int q_ssl_sess_set_new_cb(SSL *context, SSL_SESSION *session);
-#endif // TLS1_3_VERSION
-+#endif // TLS1_3_VERSION && LIBRESSL_VERSION_NUMBE
++#endif // TLS1_3_VERSION && LIBRESSL_VERSION_NUMBER
+
+ } // namespace QTlsPrivate
- static inline QString msgErrorSettingBackendConfig(const QString &why)
- {
-@@ -370,9 +370,11 @@ QT_WARNING_POP
+@@ -369,9 +369,11 @@ QT_WARNING_POP
return;
}
@@ -24,7 +24,7 @@
const long anyVersion =
#if QT_CONFIG(dtls)
-@@ -663,14 +665,14 @@ QT_WARNING_POP
+@@ -662,14 +664,14 @@ QT_WARNING_POP
q_SSL_CTX_set_verify(sslContext->ctx, verificationMode, verificationCallback);
}
@@ -32,7 +32,7 @@
+#if defined(TLS1_3_VERSION) && !defined(LIBRESSL_VERSION_NUMBER)
// NewSessionTicket callback:
if (mode == QSslSocket::SslClientMode && !isDtls) {
- q_SSL_CTX_sess_set_new_cb(sslContext->ctx, q_ssl_sess_set_new_cb);
+ q_SSL_CTX_sess_set_new_cb(sslContext->ctx, QTlsPrivate::q_ssl_sess_set_new_cb);
q_SSL_CTX_set_session_cache_mode(sslContext->ctx, SSL_SESS_CACHE_CLIENT);
}
@@ -41,7 +41,7 @@
#if QT_CONFIG(dtls)
// DTLS cookies:
-@@ -760,6 +762,7 @@ void QSslContext::applyBackendConfig(QSslContext *sslC
+@@ -759,6 +761,7 @@ void QSslContext::applyBackendConfig(QSslContext *sslC
}
#endif // ocsp
@@ -49,7 +49,7 @@
QSharedPointer<SSL_CONF_CTX> cctx(q_SSL_CONF_CTX_new(), &q_SSL_CONF_CTX_free);
if (cctx) {
q_SSL_CONF_CTX_set_ssl_ctx(cctx.data(), sslContext->ctx);
-@@ -803,7 +806,9 @@ void QSslContext::applyBackendConfig(QSslContext *sslC
+@@ -802,7 +805,9 @@ void QSslContext::applyBackendConfig(QSslContext *sslC
sslContext->errorStr = msgErrorSettingBackendConfig(QSslSocket::tr("SSL_CONF_finish() failed"));
sslContext->errorCode = QSslError::UnspecifiedError;
}
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols.cpp b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols.cpp
index 23d57861e45e..88a92e4d5b83 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols.cpp
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols.cpp
@@ -1,6 +1,6 @@
---- src/plugins/tls/openssl/qsslsocket_openssl_symbols.cpp.orig 2025-02-19 13:05:34 UTC
+--- src/plugins/tls/openssl/qsslsocket_openssl_symbols.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qsslsocket_openssl_symbols.cpp
-@@ -113,23 +113,36 @@ DEFINEFUNC(int, EVP_PKEY_up_ref, EVP_PKEY *a, a, retur
+@@ -114,23 +114,36 @@ DEFINEFUNC(int, EVP_PKEY_up_ref, EVP_PKEY *a, a, retur
DEFINEFUNC2(int, BN_is_word, BIGNUM *a, a, BN_ULONG w, w, return 0, return)
DEFINEFUNC(int, EVP_CIPHER_CTX_reset, EVP_CIPHER_CTX *c, c, return 0, return)
DEFINEFUNC(int, EVP_PKEY_up_ref, EVP_PKEY *a, a, return 0, return)
@@ -37,7 +37,7 @@
#ifdef TLS1_3_VERSION
DEFINEFUNC2(int, SSL_CTX_set_ciphersuites, SSL_CTX *ctx, ctx, const char *str, str, return 0, return)
DEFINEFUNC2(void, SSL_set_psk_use_session_callback, SSL *ssl, ssl, q_SSL_psk_use_session_cb_func_t callback, callback, return, DUMMYARG)
-@@ -194,7 +207,9 @@ DEFINEFUNC2(OCSP_RESPONSE *, OCSP_response_create, int
+@@ -195,7 +208,9 @@ DEFINEFUNC2(OCSP_RESPONSE *, OCSP_response_create, int
ASN1_OCTET_STRING **piKeyHash, piKeyHash, ASN1_INTEGER **pserial, pserial, OCSP_CERTID *cid, cid,
return 0, return)
DEFINEFUNC2(OCSP_RESPONSE *, OCSP_response_create, int status, status, OCSP_BASICRESP *bs, bs, return nullptr, return)
@@ -47,7 +47,7 @@
DEFINEFUNC2(int, OCSP_id_cmp, OCSP_CERTID *a, a, OCSP_CERTID *b, b, return -1, return)
DEFINEFUNC7(OCSP_SINGLERESP *, OCSP_basic_add1_status, OCSP_BASICRESP *r, r, OCSP_CERTID *c, c, int s, s,
int re, re, ASN1_TIME *rt, rt, ASN1_TIME *t, t, ASN1_TIME *n, n, return nullptr, return)
-@@ -215,7 +230,9 @@ DEFINEFUNC2(int, ASN1_STRING_to_UTF8, unsigned char **
+@@ -216,7 +231,9 @@ DEFINEFUNC2(int, ASN1_STRING_to_UTF8, unsigned char **
DEFINEFUNC2(int, ASN1_INTEGER_cmp, const ASN1_INTEGER *a, a, const ASN1_INTEGER *b, b, return 1, return)
DEFINEFUNC(int, ASN1_STRING_length, ASN1_STRING *a, a, return 0, return)
DEFINEFUNC2(int, ASN1_STRING_to_UTF8, unsigned char **a, a, ASN1_STRING *b, b, return 0, return)
@@ -57,7 +57,7 @@
DEFINEFUNC4(long, BIO_ctrl, BIO *a, a, int b, b, long c, c, void *d, d, return -1, return)
DEFINEFUNC(int, BIO_free, BIO *a, a, return 0, return)
DEFINEFUNC2(BIO *, BIO_new_mem_buf, void *a, a, int b, b, return nullptr, return)
-@@ -290,12 +307,14 @@ DEFINEFUNC(X509_STORE *, SSL_CTX_get_cert_store, const
+@@ -291,12 +308,14 @@ DEFINEFUNC(X509_STORE *, SSL_CTX_get_cert_store, const
DEFINEFUNC2(int, SSL_CTX_use_PrivateKey, SSL_CTX *a, a, EVP_PKEY *b, b, return -1, return)
DEFINEFUNC3(int, SSL_CTX_use_PrivateKey_file, SSL_CTX *a, a, const char *b, b, int c, c, return -1, return)
DEFINEFUNC(X509_STORE *, SSL_CTX_get_cert_store, const SSL_CTX *a, a, return nullptr, return)
@@ -72,7 +72,7 @@
DEFINEFUNC(void, SSL_free, SSL *a, a, return, DUMMYARG)
DEFINEFUNC(STACK_OF(SSL_CIPHER) *, SSL_get_ciphers, const SSL *a, a, return nullptr, return)
DEFINEFUNC(const SSL_CIPHER *, SSL_get_current_cipher, SSL *a, a, return nullptr, return)
-@@ -764,8 +783,8 @@ static LoadedOpenSsl loadOpenSsl()
+@@ -765,8 +784,8 @@ static LoadedOpenSsl loadOpenSsl()
libcrypto->setFileNameAndVersion("crypto"_L1, shlibVersion);
#elif defined(SHLIB_VERSION_NUMBER)
// first attempt: the canonical name is libssl.so.<SHLIB_VERSION_NUMBER>
@@ -83,7 +83,7 @@
#endif // OPENSSL_SHLIB_VERSION
if (libcrypto->load() && libssl->load()) {
-@@ -798,8 +817,8 @@ static LoadedOpenSsl loadOpenSsl()
+@@ -799,8 +818,8 @@ static LoadedOpenSsl loadOpenSsl()
libssl->setFileNameAndVersion("ssl"_L1 + suffix, -1);
libcrypto->setFileNameAndVersion("crypto"_L1 + suffix, -1);
# else
@@ -94,7 +94,7 @@
# endif
if (libcrypto->load() && libssl->load()) {
// libssl.so.0 and libcrypto.so.0 found
-@@ -868,21 +887,34 @@ bool q_resolveOpenSslSymbols()
+@@ -869,21 +888,34 @@ bool q_resolveOpenSslSymbols()
RESOLVEFUNC(EVP_CIPHER_CTX_reset)
RESOLVEFUNC(AUTHORITY_INFO_ACCESS_free)
RESOLVEFUNC(EVP_PKEY_up_ref)
@@ -129,7 +129,7 @@
#ifdef TLS1_3_VERSION
RESOLVEFUNC(SSL_CTX_set_ciphersuites)
RESOLVEFUNC(SSL_set_psk_use_session_callback)
-@@ -964,7 +996,9 @@ bool q_resolveOpenSslSymbols()
+@@ -965,7 +997,9 @@ bool q_resolveOpenSslSymbols()
RESOLVEFUNC(OCSP_check_validity)
RESOLVEFUNC(OCSP_cert_to_id)
RESOLVEFUNC(OCSP_id_get0_info)
@@ -140,7 +140,7 @@
RESOLVEFUNC(OCSP_basic_sign)
RESOLVEFUNC(OCSP_response_create)
RESOLVEFUNC(i2d_OCSP_RESPONSE)
-@@ -1059,12 +1093,14 @@ bool q_resolveOpenSslSymbols()
+@@ -1060,12 +1094,14 @@ bool q_resolveOpenSslSymbols()
RESOLVEFUNC(SSL_CTX_use_PrivateKey)
RESOLVEFUNC(SSL_CTX_use_PrivateKey_file)
RESOLVEFUNC(SSL_CTX_get_cert_store);
@@ -155,7 +155,7 @@
RESOLVEFUNC(SSL_accept)
RESOLVEFUNC(SSL_clear)
RESOLVEFUNC(SSL_connect)
-@@ -1124,7 +1160,9 @@ bool q_resolveOpenSslSymbols()
+@@ -1125,7 +1161,9 @@ bool q_resolveOpenSslSymbols()
RESOLVEFUNC(RSA_free)
RESOLVEFUNC(DH_bits)
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols__p.h b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols__p.h
index 0f92172a0f4c..bd8bebfad15e 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols__p.h
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qsslsocket__openssl__symbols__p.h
@@ -1,6 +1,6 @@
---- src/plugins/tls/openssl/qsslsocket_openssl_symbols_p.h.orig 2024-03-19 15:46:43 UTC
+--- src/plugins/tls/openssl/qsslsocket_openssl_symbols_p.h.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qsslsocket_openssl_symbols_p.h
-@@ -46,6 +46,13 @@ QT_BEGIN_NAMESPACE
+@@ -47,6 +47,13 @@ QT_BEGIN_NAMESPACE
#define DUMMYARG
@@ -14,7 +14,7 @@
#if !defined QT_LINKED_OPENSSL
// **************** Shared declarations ******************
// ret func(arg)
-@@ -203,15 +210,32 @@ int q_EVP_PKEY_up_ref(EVP_PKEY *a);
+@@ -204,15 +211,32 @@ int q_EVP_PKEY_up_ref(EVP_PKEY *a);
void q_AUTHORITY_INFO_ACCESS_free(AUTHORITY_INFO_ACCESS *a);
int q_EVP_CIPHER_CTX_reset(EVP_CIPHER_CTX *c);
int q_EVP_PKEY_up_ref(EVP_PKEY *a);
@@ -47,7 +47,7 @@
int q_SSL_session_reused(SSL *a);
qssloptions q_SSL_CTX_set_options(SSL_CTX *ctx, qssloptions op);
int q_OPENSSL_init_ssl(uint64_t opts, const OPENSSL_INIT_SETTINGS *settings);
-@@ -237,8 +261,13 @@ STACK_OF(X509) *q_X509_STORE_CTX_get0_chain(X509_STORE
+@@ -238,8 +262,13 @@ STACK_OF(X509) *q_X509_STORE_CTX_get0_chain(X509_STORE
# define q_SSL_load_error_strings() q_OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS \
| OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL)
@@ -61,7 +61,7 @@
#define q_OPENSSL_add_all_algorithms_conf() q_OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_CIPHERS \
| OPENSSL_INIT_ADD_ALL_DIGESTS \
-@@ -423,12 +452,14 @@ X509_STORE *q_SSL_CTX_get_cert_store(const SSL_CTX *a)
+@@ -424,12 +453,14 @@ X509_STORE *q_SSL_CTX_get_cert_store(const SSL_CTX *a)
int q_SSL_CTX_use_PrivateKey(SSL_CTX *a, EVP_PKEY *b);
int q_SSL_CTX_use_PrivateKey_file(SSL_CTX *a, const char *b, int c);
X509_STORE *q_SSL_CTX_get_cert_store(const SSL_CTX *a);
@@ -76,7 +76,7 @@
void q_SSL_free(SSL *a);
STACK_OF(SSL_CIPHER) *q_SSL_get_ciphers(const SSL *a);
const SSL_CIPHER *q_SSL_get_current_cipher(SSL *a);
-@@ -537,14 +568,26 @@ void q_PKCS12_free(PKCS12 *pkcs12);
+@@ -538,14 +569,26 @@ void q_PKCS12_free(PKCS12 *pkcs12);
#define q_BIO_get_mem_data(b, pp) (int)q_BIO_ctrl(b,BIO_CTRL_INFO,0,(char *)pp)
#define q_BIO_pending(b) (int)q_BIO_ctrl(b,BIO_CTRL_PENDING,0,NULL)
#define q_SSL_CTX_set_mode(ctx,op) q_SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,(op),NULL)
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qtls__openssl.cpp b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qtls__openssl.cpp
index e0a2e68f7f96..26499c299a37 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qtls__openssl.cpp
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qtls__openssl.cpp
@@ -1,6 +1,6 @@
---- src/plugins/tls/openssl/qtls_openssl.cpp.orig 2023-09-21 19:24:26 UTC
+--- src/plugins/tls/openssl/qtls_openssl.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qtls_openssl.cpp
-@@ -1438,13 +1438,13 @@ bool TlsCryptographOpenSSL::initSslContext()
+@@ -1435,13 +1435,13 @@ bool TlsCryptographOpenSSL::initSslContext()
else if (mode == QSslSocket::SslServerMode)
q_SSL_set_psk_server_callback(ssl, &q_ssl_psk_server_callback);
diff --git a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qx509__openssl.cpp b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qx509__openssl.cpp
index a391e32bdd42..52a9061e792a 100644
--- a/devel/qt6-base/files/patch-src_plugins_tls_openssl_qx509__openssl.cpp
+++ b/devel/qt6-base/files/patch-src_plugins_tls_openssl_qx509__openssl.cpp
@@ -1,6 +1,6 @@
---- src/plugins/tls/openssl/qx509_openssl.cpp.orig 2024-03-19 15:46:43 UTC
+--- src/plugins/tls/openssl/qx509_openssl.cpp.orig 2025-05-14 09:43:58 UTC
+++ src/plugins/tls/openssl/qx509_openssl.cpp
-@@ -190,7 +190,11 @@ QVariant x509UnknownExtensionToValue(X509_EXTENSION *e
+@@ -191,7 +191,11 @@ QVariant x509UnknownExtensionToValue(X509_EXTENSION *e
QVariantList list;
bool isMap = false;
@@ -12,7 +12,7 @@
CONF_VALUE *nval = q_SKM_sk_value(CONF_VALUE, val, j);
if (nval->name && nval->value) {
isMap = true;
-@@ -286,7 +290,11 @@ QVariant x509ExtensionToValue(X509_EXTENSION *ext)
+@@ -287,7 +291,11 @@ QVariant x509ExtensionToValue(X509_EXTENSION *ext)
if (!info)
return {};
QVariantMap result;