diff options
author | Marcin Juszkiewicz <hrw@openedhand.com> | 2008-05-13 07:49:56 +0000 |
---|---|---|
committer | Marcin Juszkiewicz <hrw@openedhand.com> | 2008-05-13 07:49:56 +0000 |
commit | 152f14b598655535664e51ac83318d2c60dfa7d4 (patch) | |
tree | 08130f72c35add5833469beede6db18a9a5bd2b6 /meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch | |
parent | f59c859d74392edfb132482a026eae6ca400db9e (diff) | |
download | openembedded-core-152f14b598655535664e51ac83318d2c60dfa7d4.tar.gz openembedded-core-152f14b598655535664e51ac83318d2c60dfa7d4.tar.bz2 openembedded-core-152f14b598655535664e51ac83318d2c60dfa7d4.tar.xz openembedded-core-152f14b598655535664e51ac83318d2c60dfa7d4.zip |
gnutls: update to 2.2.3
git-svn-id: https://svn.o-hand.com/repos/poky/trunk@4462 311d38ba-8fff-0310-9ca6-ca027cbcb966
Diffstat (limited to 'meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch')
-rw-r--r-- | meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch b/meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch deleted file mode 100644 index e2a276242..000000000 --- a/meta/packages/gnutls/gnutls-2.2.2/gnutls-texinfo-euro.patch +++ /dev/null @@ -1,16 +0,0 @@ -The version of texinfo in Debian Sarge does not understand the @euro{} command. -This patch replaces the @euro{} command with the word "euro". - ---- gnutls-1.3.5/doc/signatures.texi.orig 2006-04-26 08:06:40.918268000 +0930 -+++ gnutls-1.3.5/doc/signatures.texi 2006-04-26 08:06:52.446515440 +0930 -@@ -11,8 +11,8 @@ - long as it is difficult enough to generate two different messages with - the same hash algorithm output. In that case the same signature could - be used as a proof for both messages. Nobody wants to sign an innocent --message of donating 1 @euro{} to Greenpeace and find out that he --donated 1.000.000 @euro{} to Bad Inc. -+message of donating 1 euro to Greenpeace and find out that he -+donated 1.000.000 euro to Bad Inc. - - For a hash algorithm to be called cryptographic the following three - requirements must hold |