aboutsummaryrefslogtreecommitdiff
path: root/net/gnurl/patches
Commit message (Collapse)AuthorAge
* gnurl: update to version 7.54.1Daniel Golle2017-06-19
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: update to version 7.51.0Daniel Golle2016-12-02
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: update to version 7.48.0Daniel Golle2016-06-14
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: update source to 7.43.0Daniel Golle2015-08-13
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: fix vulnerabilities, refresh patchesDaniel Golle2015-07-17
| | | | | | | | | | | | being based on curl 0.70.0 gnurl is affected by CVE-2015-3144 CVE-2015-3145 CVE-2015-3153 CVE-2015-3236 Import patches from curl package to fix that. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnutls: backport upstream --with-ca-path implementationDaniel Golle2015-06-29
| | | | Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: fall-back on default system trust storeDaniel Golle2015-06-29
| | | | | | | | | | | | If no explicit CA file is given, gnurl fails to setup HTTPS connections as it doesn't looks for certificates in /etc/ssl/certs/ in any way. Fix that by utilizing GnuTLS' gnutls_certificate_set_x509_system_trust as a fall-back if neither CA file, CA path nor SRP is declared. Reported upstream: https://github.com/bagder/curl/issues/330 Fix suggested upstream: https://github.com/bagder/curl/pull/331 Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* gnurl: add net packageDaniel Golle2015-05-31
This is definitely one of the ugliest things I ever got my hands on. If it even did the job properly, but no, it tries to install it's headers in /usr/include/curl collidings with actual curl's headers. Fixed that by installing them into /usr/include/gnurl instead. Now gnunet can use gnurl. Signed-off-by: Daniel Golle <daniel@makrotopia.org>