/* * e-unicode.h - utf-8 support functions for gal * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) version 3. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with the program; if not, see * * * Authors: * Lauris Kaplinski * * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com) * */ #ifndef _E_UNICODE_H_ #define _E_UNICODE_H_ #include #include #include #include G_BEGIN_DECLS gchar *e_utf8_from_gtk_event_key (GtkWidget *widget, guint keyval, const gchar *string); gchar *e_utf8_from_iconv_string_sized (iconv_t ic, const gchar *string, gint bytes); gchar *e_utf8_to_iconv_string_sized (iconv_t ic, const gchar *string, gint bytes); gchar *e_utf8_to_charset_string_sized (const gchar *charset, const gchar *string, gint bytes); gchar *e_utf8_from_locale_string_sized (const gchar *string, gint bytes); gchar *e_utf8_ensure_valid (const gchar *string); /* * These are simple wrappers that save us some typing */ /* NB! This return newly allocated string, not const as gtk+ one */ gint e_unichar_to_utf8 (gint c, gchar *outbuf); gchar *e_unicode_get_utf8 (const gchar *text, gunichar *out); gchar *e_xml_get_translated_utf8_string_prop_by_name (const xmlNode *parent, const xmlChar *prop_name); G_END_DECLS #endif 4.6.2'>dependabot/npm_and_yarn/devel/electron4/files/lodash.merge-4.6.2 FreeBSD GNOME current development ports (https://github.com/freebsd/freebsd-ports-gnome)
aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* - Flip from MAKE_JOBS_SAFE to MAKE_JOBS_UNSAFE, fails both on pointyhat and onpav2009-04-131-1/+1
* Fix CONFLICTS (again). The previous example didn't work at all for portsdougb2009-03-251-1/+1
* Where it matters, update regarding MAKE_JOBS_{UN}SAFE for my portsdougb2009-03-251-0/+2
* BIND 9.4.3-P2 is a SECURITY patch for BIND 9.4.3. It addresses a bugdougb2009-03-222-8/+8
* Update to the -P1 versions of the current BIND ports which containdougb2009-01-082-14/+17
* Update CONFLICTS to reflect the addition of the bind96 port,dougb2009-01-041-1/+1
* 9.4.3 adds one additional file in doc/miscdougb2008-12-201-0/+1
* Update to version 9.4.3 which contains numerous bug fixes.dougb2008-12-202-11/+11
* This patch is no longer relevant, it has been included in version 9.4.3dougb2008-12-201-15/+0
* Adjust WWWs for new ISC websitedougb2008-12-201-1/+1
* All -P2 versions now have PGP signatures with ISC's standarddougb2008-08-091-3/+3
* Update to patchlevel 2 for all versions:dougb2008-08-022-9/+8
* Add an OPTION to turn on the ability of dns/host/nslookup to dodougb2008-07-171-0/+5
* Bump PORTREVISION for the patch to named-checkconfdougb2008-07-121-2/+9
* Add a patch to fix named-checkconf. The error condition was not beingdougb2008-07-121-0/+15
* Upgrade to the -P1 versions of each port, which add stronger randomizationdougb2008-07-102-9/+8
* Update CONFLICTS:dougb2008-07-041-1/+1
* Update the pkg-message to be even less version-specific, and tell the userdougb2008-06-021-9/+8
* Fix pkg-plist by including a new file.dougb2007-12-052-0/+2
* ISC recently announced that BIND 8 has been End-of-Life'd:dougb2007-12-031-1/+1
* Update to BIND 9.4.2. Many bugs are fixed, please see the CHANGESdougb2007-12-024-17/+14
* Update to 9.4.1-P1, which has fixes for the following:dougb2007-07-252-8/+8
* - Set --mandir and --infodir in CONFIGURE_ARGS if the configure scriptrafan2007-07-231-2/+1
* Update to version 9.4.1, a security update from ISC:dougb2007-05-012-8/+8
* Update to the release version of 9.4.0.dougb2007-02-262-8/+8
* Complete the update for bind94 after the repocopy, and hook it up.dougb2007-01-294-32/+49
* Upgrade to version 9.3.4, the latest from ISC, which addresses thedougb2007-01-252-8/+8
* Apply the markup fixes from the base to the nsupdate.8 anddougb2006-12-211-0/+8
* Upgrade to version 9.3.3, the latest from ISC. This isdougb2006-12-102-8/+8
* Update to version 9.3.2-P2, which addresses the vulnerabilitydougb2006-11-032-8/+8
* Upgrade to version 9.3.2-P1, which addresses the following securitydougb2006-09-072-8/+8
* Add OPTIONS to the rest of my ports that need them.dougb2006-08-281-16/+10