diff options
author | Marcin Juszkiewicz <hrw@openedhand.com> | 2008-09-26 15:40:36 +0000 |
---|---|---|
committer | Marcin Juszkiewicz <hrw@openedhand.com> | 2008-09-26 15:40:36 +0000 |
commit | 062b2e125de3056f956211f7266dd66db3aa252b (patch) | |
tree | 679678cc91e250f5682b76cd8e76c9a6be65b843 /meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch | |
parent | c4e9ad655ca02e39f57b8ccb7bf5f34b1feeb3bc (diff) | |
download | openembedded-core-062b2e125de3056f956211f7266dd66db3aa252b.tar.gz openembedded-core-062b2e125de3056f956211f7266dd66db3aa252b.tar.bz2 openembedded-core-062b2e125de3056f956211f7266dd66db3aa252b.tar.xz openembedded-core-062b2e125de3056f956211f7266dd66db3aa252b.zip |
gnutls: drop 2.2.5
git-svn-id: https://svn.o-hand.com/repos/poky/trunk@5300 311d38ba-8fff-0310-9ca6-ca027cbcb966
Diffstat (limited to 'meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch')
-rw-r--r-- | meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch b/meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch deleted file mode 100644 index e2a276242..000000000 --- a/meta/packages/gnutls/gnutls-2.2.5/gnutls-texinfo-euro.patch +++ /dev/null @@ -1,16 +0,0 @@ -The version of texinfo in Debian Sarge does not understand the @euro{} command. -This patch replaces the @euro{} command with the word "euro". - ---- gnutls-1.3.5/doc/signatures.texi.orig 2006-04-26 08:06:40.918268000 +0930 -+++ gnutls-1.3.5/doc/signatures.texi 2006-04-26 08:06:52.446515440 +0930 -@@ -11,8 +11,8 @@ - long as it is difficult enough to generate two different messages with - the same hash algorithm output. In that case the same signature could - be used as a proof for both messages. Nobody wants to sign an innocent --message of donating 1 @euro{} to Greenpeace and find out that he --donated 1.000.000 @euro{} to Bad Inc. -+message of donating 1 euro to Greenpeace and find out that he -+donated 1.000.000 euro to Bad Inc. - - For a hash algorithm to be called cryptographic the following three - requirements must hold |