include $(TOPDIR)/rules.mk
PKG_NAME:=curl
-PKG_VERSION:=7.61.1
+PKG_VERSION:=7.62.0
PKG_RELEASE:=1
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.xz
https://curl.mirror.anstey.ca/ \
https://curl.askapache.com/download/ \
https://curl.haxx.se/download/
-PKG_HASH:=3d5913d6a39bd22e68e34dff697fd6e4c3c81563f580c76fca2009315cd81891
+PKG_HASH:=dab5643a5fe775ae92570b9f3df6b0ef4bc2a827a959361fb130c73b721275c1
PKG_LICENSE:=MIT
PKG_LICENSE_FILES:=COPYING
--- a/lib/vtls/mbedtls.c
+++ b/lib/vtls/mbedtls.c
-@@ -814,7 +814,7 @@ static void Curl_mbedtls_session_free(vo
+@@ -811,7 +811,7 @@ static void Curl_mbedtls_session_free(vo
static size_t Curl_mbedtls_version(char *buffer, size_t size)
{
--- a/lib/smtp.c
+++ b/lib/smtp.c
-@@ -1563,13 +1563,14 @@ CURLcode Curl_smtp_escape_eob(struct con
+@@ -1560,14 +1560,14 @@ CURLcode Curl_smtp_escape_eob(struct con
if(!scratch || data->set.crlf) {
oldscratch = scratch;
-- scratch = newscratch = malloc(2 * data->set.buffer_size);
+- scratch = newscratch = malloc(2 * data->set.upload_buffer_size);
+ scratch = newscratch = malloc(2 * UPLOAD_BUFSIZE);
if(!newscratch) {
failf(data, "Failed to alloc scratch buffer!");
return CURLE_OUT_OF_MEMORY;
}
}
-+ DEBUGASSERT(UPLOAD_BUFSIZE >= nread);
+- DEBUGASSERT(data->set.upload_buffer_size >= (size_t)nread);
++ DEBUGASSERT(UPLOAD_BUFSIZE >= (size_t)nread);
/* Have we already sent part of the EOB? */
eob_sent = smtp->eob;