aboutsummaryrefslogtreecommitdiffstats
path: root/main/busybox/0001-properly-fix-wget-https-support.patch
diff options
context:
space:
mode:
Diffstat (limited to 'main/busybox/0001-properly-fix-wget-https-support.patch')
-rw-r--r--main/busybox/0001-properly-fix-wget-https-support.patch69
1 files changed, 0 insertions, 69 deletions
diff --git a/main/busybox/0001-properly-fix-wget-https-support.patch b/main/busybox/0001-properly-fix-wget-https-support.patch
deleted file mode 100644
index 81ac38e3504..00000000000
--- a/main/busybox/0001-properly-fix-wget-https-support.patch
+++ /dev/null
@@ -1,69 +0,0 @@
-From 4fcea48c7a0c6b63a316764932f7ba4854e444f9 Mon Sep 17 00:00:00 2001
-From: Natanael Copa <ncopa@alpinelinux.org>
-Date: Wed, 30 May 2018 09:52:20 +0000
-Subject: [PATCH] properly fix wget https support
-
-See: https://git.alpinelinux.org/cgit/aports/commit/?id=1d0560a9b6b5597b191e5aff69a31c2fe0aba273
----
- networking/wget.c | 21 ++++++++++++---------
- 1 file changed, 12 insertions(+), 9 deletions(-)
-
-diff --git a/networking/wget.c b/networking/wget.c
-index 30683dfc0..1ad4e1769 100644
---- a/networking/wget.c
-+++ b/networking/wget.c
-@@ -51,7 +51,6 @@
- //it also enables FTPS support, but it's not well tested yet
- //config: default y
- //config: depends on WGET
--//config: select TLS
- //config: help
- //config: wget will use internal TLS code to connect to https:// URLs.
- //config: Note:
-@@ -717,10 +716,8 @@ static void spawn_ssl_client(const char *host, int network_fd, int flags)
- int pid;
- char *servername, *p;
-
-- if (!(option_mask32 & WGET_OPT_NO_CHECK_CERT)) {
-- option_mask32 |= WGET_OPT_NO_CHECK_CERT;
-- bb_error_msg("note: TLS certificate validation not implemented");
-- }
-+ if (ENABLE_SSL_CLIENT && !(option_mask32 & WGET_OPT_NO_CHECK_CERT))
-+ bb_error_msg_and_die("note: TLS certificate validation not implemented");
-
- servername = xstrdup(host);
- p = strrchr(servername, ':');
-@@ -737,14 +734,14 @@ static void spawn_ssl_client(const char *host, int network_fd, int flags)
- close(sp[0]);
- xmove_fd(sp[1], 0);
- xdup2(0, 1);
-- if (BB_MMU) {
-+ if (BB_MMU && ENABLE_TLS && (option_mask32 & WGET_OPT_NO_CHECK_CERT)) {
- tls_state_t *tls = new_tls_state();
- tls->ifd = tls->ofd = network_fd;
- tls_handshake(tls, servername);
- tls_run_copy_loop(tls, flags);
- exit(0);
- } else {
-- char *argv[6];
-+ char *argv[7], **a;
-
- xmove_fd(network_fd, 3);
- argv[0] = (char*)"ssl_client";
-@@ -752,8 +749,14 @@ static void spawn_ssl_client(const char *host, int network_fd, int flags)
- //TODO: if (!is_ip_address(servername))...
- argv[2] = (char*)"-n";
- argv[3] = servername;
-- argv[4] = (flags & TLSLOOP_EXIT_ON_LOCAL_EOF ? (char*)"-e" : NULL);
-- argv[5] = NULL;
-+
-+ a = &argv[4];
-+ if (flags & TLSLOOP_EXIT_ON_LOCAL_EOF)
-+ *a++ = (char*)"-e";
-+ if (!ENABLE_SSL_CLIENT && (option_mask32 & WGET_OPT_NO_CHECK_CERT))
-+ *a++= (char*)"-I";
-+ *a = NULL;
-+
- BB_EXECVP(argv[0], argv);
- bb_perror_msg_and_die("can't execute '%s'", argv[0]);
- }