summaryrefslogtreecommitdiffstats
path: root/package/libcurl/libcurl.mk
Commit message (Collapse)AuthorAgeFilesLines
* package/libcurl: bump to version 7.64.1Peter Korsgaard2019-03-281-1/+1
| | | | | | | | | | | | Contains a number of fixes for issues discovered post-7.64.0. For details, see the list of changes: https://curl.haxx.se/changes.html#7_64_1 Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com> (cherry picked from commit 48da1bc9fdebeaa011648c9b208b17f28a0878e3) Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: fix typo in configure option w/o OpenSSLTrent Piepho2019-02-201-1/+1
| | | | | | | | | | When not using OpenSSL, the correct option to configure is --without-ssl with two dashes. Fixes: b8b78e7e6a ("libcurl: Allow selection of TLS package libcurl will use") Signed-off-by: Trent Piepho <tpiepho@impinj.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
* package/libcurl: security bump to version 7.64.0Peter Korsgaard2019-02-061-1/+1
| | | | | | | | | | | | | | | | | | Fixes the following security issues: CVE-2018-16890: NTLM type-2 out-of-bounds buffer read https://curl.haxx.se/docs/CVE-2018-16890.html CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow https://curl.haxx.se/docs/CVE-2019-3822.html CVE-2019-3823: SMTP end-of-response out-of-bounds read https://curl.haxx.se/docs/CVE-2019-3823.html The copyright year changed in the COPYING file, so update the hash. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* package/libcurl: use GnuTLS's default cert pathTrent Piepho2018-12-031-1/+2
| | | | | | | | | | | | | | | | | | libcurl doesn't find any trust path for CA certs when it cross-compiles. When using OpenSSL, it is explicitly configured to use the SSL cert directory with OpenSSL style hash files in it. But with GnuTLS, it gets nothing. Rather than configure libcurl to use the OpenSSL directory or a bundle file, configure it to use the GnuTLS default. This way the CA certs path can be configured in one place (gnutls) and then libcurl and anyone else who uses gnutls can default to that. Also, when libcurl with gnutls is configured to use a directory, it ends up loading each cert three times. Signed-off-by: Trent Piepho <tpiepho@impinj.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* libcurl: Don't need --without-(ssl/gnutls/nss/mbedtls) twiceTrent Piepho2018-11-131-4/+3
| | | | | | | | | | | | | Remove the --without-* options from the yes side of the TLS libraries selection checks. Since the --without-* option is now specified when the corresponding TLS library is not being used, it's no longer necessary when enabling a TLS library to explicity list all the other TLS libs that curl should not use. Signed-off-by: Trent Piepho <tpiepho@impinj.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: Allow selection of TLS package libcurl will useTrent Piepho2018-11-121-11/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | Instead of defaulting to OpenSSL, allow selection of package to use through a choice in libcurl's config. The default will be to select the first enabled TLS provider in the same preference order as is used now, i.e. no change from current behavior. Some of the alternative libraries have advantages over OpenSSL in certain areas. For example, gnutls has vastly superior PKCS11 support. One can use client TLS private keys by supplying a PKCS11 URI instead of a private key file name. The TLS server cert trust store can be a PKCS11 URI, e.g. configure libcurl with a ca-bundle of "pkcs11:model=p11-kit-trust". Now server certs can be stored in a software and/or hardware HSM(s). This doesn't work with OpenSSL. However, some software only supports OpenSSL for TLS or other crypto functions. So it might be necessary to enable OpenSSL for that reason. Signed-off-by: Trent Piepho <tpiepho@impinj.com> [Peter: add BR2_PACKAGE_LIBCURL_TLS_SUPPORT and use it to hide choice & comment, explitly pass --without-foo if option is not enabled, only do .pc fixup if BR2_PACKAGE_LIBCURL_OPENSSL is enabled] Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.62.0Peter Korsgaard2018-10-311-1/+1
| | | | | | | | | | | | | | | | Fixes the following security issues: CVE-2018-16839: SASL password overflow via integer overflow https://curl.haxx.se/docs/CVE-2018-16839.html CVE-2018-16840: use-after-free in handle close https://curl.haxx.se/docs/CVE-2018-16840.html CVE-2018-16842: warning message out-of-buffer read https://curl.haxx.se/docs/CVE-2018-16842.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* libcurl: security bump to version 7.61.1Peter Korsgaard2018-09-061-1/+1
| | | | | | | | | Fixes CVE-2018-14618: NTLM password overflow via integer overflow For more details, see the advisory: https://curl.haxx.se/docs/CVE-2018-14618.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: add nghttp2 optional dependencyMichaël Burtin2018-07-191-0/+7
| | | | | | | | | | | | | The nghttp2 package has recently been added to buildroot. When enabled, this adds support for HTTP2 to libcurl. By default, libcurl configure script will enable HTTP2 if the library is found using pkg-config. Adding this option makes the build consistent. Signed-off-by: Michaël Burtin <michael.burtin@netgem.com> Signed-off-by: Anisse Astier <anisse.astier.ext@netgem.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* libcurl: security bump to version 7.61.0Baruch Siach2018-07-121-4/+1
| | | | | | | | | | | | | | | Fixes CVE-2018-0500: curl might overflow a heap based memory buffer when sending data over SMTP and using a reduced read buffer. Drop upstream patch. Add reference to tarball signature key. Drop CRYPTO_lock seed. Removed from configure script since 7.45. Cc: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* Merge branch 'next'Peter Korsgaard2018-06-021-1/+7
|\ | | | | | | Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
| * libcurl: replace libidn by libidn2Fabrice Fontaine2018-05-201-1/+7
| | | | | | | | | | | | | | | | libidn has been replaced by libidn2 since 7.51.0 (October 2016): https://github.com/curl/curl/commit/9c91ec778104ae3b744b39444d544e82d5ee9ece Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* | libcurl: fix build with ssh2 and static mbedtlsFabrice Fontaine2018-05-271-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The ssh2 pkg-config file could contain the following lines when build with a static version of mbedtls: Libs: -L${libdir} -lssh2 /xxx/libmbedcrypto.a Libs.private: /xxx/libmbedcrypto.a This static mbedtls library must be used to correctly detect ssh2 support and this library must be copied in libcurl.pc otherwise compilation of any application (such as upmpdcli) with libcurl will fail when trying to find mbedtls functions included in libssh2. So, replace pkg-config --libs-only-l by pkg-config --libs. Fixes: - http://autobuild.buildroot.net/results/43e24b22a77f616d6198c10435dcc23cc3b9088a Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* | libcurl: security bump to version 7.60.0Baruch Siach2018-05-191-1/+1
|/ | | | | | | | | | | | | | | | | | | Drop upstream patch. This release fixes the security issues listed below. CVE-2018-1000300: curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies. https://curl.haxx.se/docs/adv_2018-82c2.html CVE-2018-1000301: curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded content. https://curl.haxx.se/docs/adv_2018-b138.html Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
* libcurl: add brotli optional dependencyBaruch Siach2018-04-031-0/+7
| | | | | | | | | | | | | | | | | | | | The brotli package has recently been added to Buildroot. Add brotli an an optional dependency to libcurl to make the build consistent. It turns out that libcurl configure script uses pkg-config to figure out link libraries only when --with-brotli is explicitly set. So this also fixes static build failure. Fixes: http://autobuild.buildroot.net/results/64b/64bc0dfe284206390ae0680b94c0876863a3c0f3/ http://autobuild.buildroot.net/results/233/23376d8653dea6361e42b0f17b6aaab3c14d99cf/ http://autobuild.buildroot.net/results/b19/b198db4b69e18e6d01ec95aae9c6096c1912dd9c/ Cc: Adrian Perez de Castro <aperez@igalia.com> Cc: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Baruch Siach <baruch@tkos.co.il> Reviewed-by: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.59.0Baruch Siach2018-03-161-1/+1
| | | | | | | | | | | | | | | | | | | | | | CVE-2018-1000120: curl could be fooled into writing a zero byte out of bounds when curl is told to work on an FTP URL with the setting to only issue a single CWD command, if the directory part of the URL contains a "%00" sequence. https://curl.haxx.se/docs/adv_2018-9cd6.html CVE-2018-1000121: curl might dereference a near-NULL address when getting an LDAP URL. https://curl.haxx.se/docs/adv_2018-97a2.html CVE-2018-1000122: When asked to transfer an RTSP URL, curl could calculate a wrong data length to copy from the read buffer. https://curl.haxx.se/docs/adv_2018-b047.html Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: add host variantEric Le Bihan2018-02-051-0/+14
| | | | | Signed-off-by: Eric Le Bihan <eric.le.bihan.dev@free.fr> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.58.0Baruch Siach2018-01-261-1/+1
| | | | | | | | | | | | | | | | | | Fixes CVE-2018-1000007: libcurl might leak authentication data to third parties. https://curl.haxx.se/docs/adv_2018-b3bf.html Fixes CVE-2018-1000005: libcurl contains an out bounds read in code handling HTTP/2 trailers. https://curl.haxx.se/docs/adv_2018-824a.html Update license hash due to copyright year change. [Peter: also add CVE-2018-1000005 reference] Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.57.0Peter Korsgaard2017-11-301-1/+1
| | | | | | | | | | | | | Fixes the following security issues: - CVE-2017-8816: NTLM buffer overflow via integer overflow - CVE-2017-8817: FTP wildcard out of bounds read - CVE-2017-8818: SSL out of buffer access For more details, see the changelog: https://curl.haxx.se/changes.html#7_57_0 Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.56.1Peter Korsgaard2017-10-251-1/+1
| | | | | | | | Fixes CVE-2017-1000257 - IMAP FETCH response out of bounds read https://curl.haxx.se/docs/adv_20171023.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to version 7.56.0Peter Korsgaard2017-10-051-3/+1
| | | | | | | | | | Drop upstreamed patch. Fixes CVE-2017-1000254 - FTP PWD response parser out of bounds read: https://curl.haxx.se/docs/adv_20171004.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: fix build without threadsBaruch Siach2017-09-131-0/+8
| | | | | | | | | | | | | | | | When c-ares is not enabled libcurl enables the threaded DNS resolver by default. Make sure the threaded resolvers is disabled when the toolchain does not support threads. Add upstream patch that fixes the configure option for disabling the threaded resolver. Fixes: http://autobuild.buildroot.net/results/39f/39fa63fb2ecb75e4b2521d1ee3dfa357c4e5c594/ http://autobuild.buildroot.net/results/dfd/dfd296086d0d6bed73b92fe2fa4ba5434dddf796/ Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump to version 7.55.1Baruch Siach2017-09-091-1/+1
| | | | | | | | | Drop upstream patch. Add license hash. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: security bump to version 7.55.0Baruch Siach2017-08-111-2/+2
| | | | | | | | | | | | | | | Fixes: glob: do not parse after a strtoul() overflow range (CVE-2017-1000101) tftp: reject file name lengths that don't fit (CVE-2017-1000100) file: output the correct buffer to the user (CVE-2017-1000099) Switch to .tar.xz to save bandwidth. Add reference to tarball signature. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
* libcurl: LICENSE value changes to SPDXNaoki Matsumoto2017-07-021-1/+1
| | | | | | | | | | | The curl license is a MIT/X derivative license, but has a distinct identifier in SPDX, so use that: https://spdx.org/licenses/curl.html [Peter: reword commit message] Signed-off-by: Naoki Matsumoto <n-matsumoto@melcoinc.co.jp> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump version to 7.54.1Adam Duskett2017-06-211-1/+1
| | | | | Signed-off-by: Adam Duskett <aduskett@codeblue.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump version to 7.54.0 (security)Vicente Olivert Riera2017-04-201-1/+1
| | | | | | | | | | | | | Security fixes: - CVE-2017-7468: switch off SSL session id when client cert is used Full changelog: https://curl.haxx.se/changes.html Removing 0001-CVE-2017-7407.patch. It's included in this release: https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump version to 7.53.1Vicente Olivert Riera2017-03-101-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: security bump to version 7.53.0Peter Korsgaard2017-02-231-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | Fixes CVE-2017-2629 - curl SSL_VERIFYSTATUS ignored >From the advisory (http://www.openwall.com/lists/oss-security/2017/02/21/6): Curl and libcurl support "OCSP stapling", also known as the TLS Certificate Status Request extension (using the `CURLOPT_SSL_VERIFYSTATUS` option). When telling curl to use this feature, it uses that TLS extension to ask for a fresh proof of the server's certificate's validity. If the server doesn't support the extension, or fails to provide said proof, curl is expected to return an error. Due to a coding mistake, the code that checks for a test success or failure, ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. Contrary to how it used to function and contrary to how this feature is documented to work. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: optional verbose strings configJudd Meinders2017-02-011-1/+8
| | | | | | | | | | This patch enables a config to set --enable-verbose during the configuration of libcurl. The option is triggered by setting BR2_PACKAGE_LIBCURL_VERBOSE. Signed-off-by: Judd Meinders <judd.meinders@rockwellcollins.com> Signed-off-by: Matt Weber <matthew.weber@rockwellcollins.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: security bump to 7.52.1Peter Korsgaard2016-12-231-1/+1
| | | | | | | | | | Fixes CVE-2016-9594 - Unitilized random Libcurl's (new) internal function that returns a good 32bit random value was implemented poorly and overwrote the pointer instead of writing the value into the buffer the pointer pointed to. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump to 7.52.0Peter Korsgaard2016-12-211-1/+1
| | | | | | | | | Fixes CVE-2016-9586 - printf floating point buffer overflow For details, see: https://curl.haxx.se/docs/adv_20161221A.html Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: move site to httpsBaruch Siach2016-11-031-1/+1
| | | | | | | Saves a redirect. Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump version to 7.51.0 (security)Vicente Olivert Riera2016-11-021-1/+1
| | | | | | | | | | | | | | | | | | | | | | | List of fixed CVEs: CVE-2016-8615: cookie injection for other servers CVE-2016-8616: case insensitive password comparison CVE-2016-8617: OOB write via unchecked multiplication CVE-2016-8618: double-free in curl_maprintf CVE-2016-8619: double-free in krb5 code CVE-2016-8620: glob parser write/read out of bounds CVE-2016-8621: curl_getdate read out of bounds CVE-2016-8622: URL unescape heap overflow via integer truncation CVE-2016-8623: Use-after-free via shared cookies CVE-2016-8624: invalid URL parsing with '#' CVE-2016-8625: IDNA 2003 makes curl use wrong host Full ChangeLog: https://curl.haxx.se/changes.html#7_51_0 Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump version to 7.50.3Vicente Olivert Riera2016-09-141-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump version to 7.50.2Vicente Olivert Riera2016-09-071-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: security bump version to 7.50.1Vicente Olivert Riera2016-08-031-1/+1
| | | | | | | | | Contains fixes for CVE-2016-5419..5421: https://curl.haxx.se/docs/vuln-7.50.0.html [Peter: extend commit message with CVE info] Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump version to 7.50.0Vicente Olivert Riera2016-07-211-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: security bump version to 7.49.1Vicente Olivert Riera2016-05-311-1/+1
| | | | | | | Fixes CVE-2016-4802, https://curl.haxx.se/docs/adv_20160530.html Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump version to 7.49.0Vicente Olivert Riera2016-05-231-1/+1
| | | | | | | | Fixes CVE-2016-3739, https://curl.haxx.se/docs/adv_20160518.html. Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> [Thomas: add reference to the CVE being fixed, pointed by Gustavo.] Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump to version 7.48.0Gustavo Zacarias2016-03-251-1/+1
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: enable mbedtls supportGustavo Zacarias2016-03-081-2/+4
| | | | | | | | | | | | | | | | | Now that we've got an mbedtls package in the tree we can enable the optional support for it in libcurl. We also remove the comment about polarssl support needing version 1.3.x. Indeed, polarssl was renamed to mbedtls when bought by ARM, which was circa the 1.3.x polarssl release. Due to this referring to polarssl 1.3.x doesn't make a lot of sense, and we'll probably never package polarssl 1.3.x in Buildroot now that mbedtls replaces it. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Tested-by: Luca Ceresoli <luca@lucaceresoli.net> [Thomas: slightly improve commit log as suggested by Luca, using explanations from Gustavo.] Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* libcurl: bump to version 7.47.1Gustavo Zacarias2016-02-081-1/+1
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* package/libcurl: security bump version to 7.47.0Bernd Kuhls2016-01-281-1/+1
| | | | | | | | | Fixes CVE-2016-0754: remote file name path traversal in curl tool for Windows CVE-2016-0755: NTLM credentials not-checked for proxy connection re-use Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump version to 7.46.0Vicente Olivert Riera2015-12-021-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* package/libcurl: carefully override LD_LIBRARY_PATHYann E. MORIN2015-11-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | To build libcurl, we need to override LD_LIBRARY and force it to a sane value, otherwise libcurl is confused when target == host (see a51ce319, libcurl: fix configure with openssl when target == host). That is currently OK, since we always set LD_LIBRARY_PATH to a non-empty value. However, we're soon to stop setting it at all. So, if the user has an empty (or no) LD_LIBRARY_PATH in his envirnment, we'd end up adding the current working directory to LD_LIBRARY_PATH (as an empty entry in a colon-separated list is most probably interpreted as meaning the current working directory, which we do know can cause issue, and which we expressely check against in support/dependencies/dependencies.sh Fix that by only using an existing LD_LIBRARY_PATH if it is not empty. Also use a Makefile construct as it is easier to read than a shell one (we can do that, as all variables from the environment are available as make variables). Signed-off-by: "Yann E. MORIN" <yann.morin.1998@free.fr> Cc: Peter Korsgaard <jacmet@uclibc.org> Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> Reviewed-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: fix license typoRyan Barnett2015-10-271-1/+1
| | | | | | | The license for libcurl is actually 'ISC' not 'ICS'. Signed-off-by: Ryan Barnett <ryan.barnett@rockwellcollins.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump to version 7.45.0Vicente Olivert Riera2015-10-081-1/+1
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump to version 7.44.0Gustavo Zacarias2015-09-041-1/+1
| | | | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Reviewed-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Tested-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* libcurl: bump to version 7.43.0Vicente Olivert Riera2015-06-181-1/+1
| | | | | | | | | - Bump to version 7.43.0 - Update hash file Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Acked-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
OpenPOWER on IntegriCloud