aboutsummaryrefslogtreecommitdiffstats
path: root/configure.ac
Commit message (Collapse)AuthorAgeFilesLines
* Bump version to 6.4.5-rc2 and record po/.Matthias Andree2020-05-041-1/+1
|
* Add fm_realpath(): a malloc()ating realpath() wrapper.Matthias Andree2020-05-041-5/+6
|
* Bump version to 6.4.4, and mention Japanese translation update.Matthias Andree2020-04-261-1/+1
|
* Bump version for 6.4.3 release.Matthias Andree2020-04-051-1/+1
|
* Remove broken AC_CHECK_DECLS(getenv).Matthias Andree2020-03-301-1/+1
| | | | | | We were testing #ifndef HAVE_DECL_GETENV, which was always false. Thus, it is safe to assume that the test never triggered, and the entire #ifndef...#endif block can be removed.
* Bump version, we'll need -rc2.Matthias Andree2020-03-301-1/+1
|
* "Require" OpenSSL 1.1.1 and tolerate/warn 1.0.2.Matthias Andree2020-03-301-0/+3
| | | | | | | | | | | OpenSSL 1.0.2 is EOL since end of 2019, so warn if it is to be used at configure and compile time. The assumption is that 1.0.2 may still be in use by maintainers that backport security fixes. Also warn, at configure time, about "OpenSSL" API-compatible libraries that do not declare TLS1_3_VERSION.
* Bump version to 6.4.3[-rc1].Matthias Andree2020-03-301-1/+1
|
* Bump version.Matthias Andree2020-03-061-1/+1
|
* Get ready for 6.4.2 release.Matthias Andree2020-02-141-1/+1
|
* Bump version to -rc3.Matthias Andree2020-01-301-1/+1
|
* Prepare 6.4.2-rc2.Matthias Andree2020-01-251-1/+1
|
* Bump version to 6.4.2[rc1].Matthias Andree2020-01-201-1/+1
|
* configure.ac: Require Python >= 2.7Matthias Andree2020-01-161-1/+1
|
* Bump version.Matthias Andree2020-01-041-1/+1
|
* Add LDFLAGS=-L$with_ssl/lib when using --with-ssl.Matthias Andree2020-01-041-1/+1
| | | | Fixes GitLab issue #9, Compile error with OpenSSL 1.1.1 on Debian Squeeze.
* 6.4.1, regression fix for default file locations.Matthias Andree2019-09-281-1/+1
| | | | | | | | The fix between 6.4.0-rc4 and 6.4.0 for Debian Bug#941129 caused a regression in the default file locations, some files were looked for without dot (.fetchmail.pid, .fetchmailrc). Reported by Cy Schubert.
* Prepare for 6.4.0 release.Matthias Andree2019-09-271-1/+1
| | | | This entails recording new line numbers in po/*.po files.
* Bump version to -rc4.Matthias Andree2019-09-021-1/+1
|
* Align with legacy_6x.Matthias Andree2019-08-251-19/+35
| | | | | | * Normalize include order. * Backport missed bug fixes. * Remove dead code.
* Remove crypt() check, we don't use it.Matthias Andree2019-08-241-3/+0
|
* Require Python 2.3 (2.0 is no longer sufficient).Matthias Andree2019-08-241-1/+1
|
* Bump version to -rc3.Matthias Andree2019-08-241-1/+1
|
* Bump version to .rc2.Matthias Andree2019-08-191-1/+1
|
* Bump version to -rc1.Matthias Andree2019-08-051-2/+2
|
* Bump copyrights, and bump version to beta6.Matthias Andree2019-08-051-1/+1
|
* FreeBSD cleanups to header shuffling.Matthias Andree2019-08-051-17/+4
|
* Bump version to 6.4.0.beta5.Matthias Andree2019-05-141-1/+1
|
* Be a bit more verbose about SSL probing.Matthias Andree2019-05-121-0/+2
|
* configure.ac: use pkg-config to find opensslFabrice Fontaine2019-05-121-18/+19
| | | | | | | | | | openssl can have multiples dependencies such as libatomic on sparcv8 32 bits Fixes: - http://autobuild.buildroot.org/results/58e5aa7c6ba8fe7474071d7a3cba6ed3a1b4cff4 Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
* Update to GNU gettext 0.19.8.Matthias Andree2019-05-121-1/+1
|
* Waive AC_TYPE_SIGNAL and assume signal handlers return void.Matthias Andree2019-05-121-1/+0
| | | | Reported by: autoupdate.
* Bump version.Matthias Andree2018-06-211-1/+1
|
* Make compatible with a pure OpenSSL 1.1.0 API, ...Matthias Andree2018-06-061-1/+1
| | | | | ...when deprecated functions are disabled, for instance, through -DOPENSSL_API_COMPAT=0x10100000L.
* Call AM_PROG_AR to simplify LTO use.Matthias Andree2017-04-231-1/+2
|
* Remove last traces of gethostbyname().Matthias Andree2017-04-221-4/+1
|
* Bump version to beta3.Matthias Andree2017-02-111-1/+1
|
* Fix portability to C90 and C++.Matthias Andree2016-12-111-0/+1
|
* Flip the switch and configure OpenSSL by default.Matthias Andree2016-01-301-3/+2
|
* Drop unneeded AC_CHECK_DECLS for SSLv2_client_method.Matthias Andree2015-04-111-1/+0
|
* Bump version.Matthias Andree2015-04-081-1/+1
|
* Update gettext infrastructure.Matthias Andree2015-03-151-1/+1
|
* TLS overhaul, bumping version to 6.4Matthias Andree2015-01-261-1/+1
| | | | | | | | | | | | | | | Removes SSLv2, enables TLSv1.1 and v1.2 more easily, permits SSLv3 (only if specified) and newer TLSv1.1+ for STLS/STARTTLS. Only negotiates TLSv1 and newer by default, SSLv3 must now be specified explicitly, as a consequence of the POODLE attack. This is meant to be a minimally upgraded version, and cannot be usefully done as a 6.3.X release. It is strongly recommended that users review their configuration - especially --sslproto - per instructions in the NEWS file and manual page. It has changed semantics and in many cases --sslproto auto or perhaps --sslproto tls1.2+ should be used now.
* Permit build on SSLv3-disabled OpenSSL,Matthias Andree2015-01-161-0/+1
| | | | | | | providing that these also omit the declaration of SSLv3_client_method(). Related to Debian Bug#775255. Version report lists -SSLv3 on +SSL builds that omit SSLv3_client_method(). Version report lists -SSLv2 on +SSL builds that omit SSLv2_client_method().
* Convert most references from berlios.de to sourceforge.net.Matthias Andree2014-05-211-1/+1
| | | | Re-sign EN and SAs because that broke signatures.
* Bump version.Matthias Andree2013-04-231-1/+1
|
* Bump version.Matthias Andree2013-02-031-1/+1
|
* Remove LSM-related stuff from the distribution.Matthias Andree2012-12-231-1/+1
| | | | | | | IBiblio no longer accepts submissions, and considers itself an archive. There is no point in our carrying forward any related material, if needed for reference purposes, it can be fetched from older versions in the Git repository.
* Repair --logfile regression of 6.3.23,Matthias Andree2012-12-131-1/+1
| | | | reported by Heinz Diehl.
* Release 6.3.23.Matthias Andree2012-12-101-1/+1
|