head 1.26; access; symbols pkgsrc-2023Q4:1.25.0.8 pkgsrc-2023Q4-base:1.25 pkgsrc-2023Q3:1.25.0.6 pkgsrc-2023Q3-base:1.25 pkgsrc-2023Q2:1.25.0.4 pkgsrc-2023Q2-base:1.25 pkgsrc-2023Q1:1.25.0.2 pkgsrc-2023Q1-base:1.25 pkgsrc-2022Q4:1.24.0.2 pkgsrc-2022Q4-base:1.24 pkgsrc-2022Q3:1.23.0.8 pkgsrc-2022Q3-base:1.23 pkgsrc-2022Q2:1.23.0.6 pkgsrc-2022Q2-base:1.23 pkgsrc-2022Q1:1.23.0.4 pkgsrc-2022Q1-base:1.23 pkgsrc-2021Q4:1.23.0.2 pkgsrc-2021Q4-base:1.23 pkgsrc-2021Q3:1.22.0.56 pkgsrc-2021Q3-base:1.22 pkgsrc-2021Q2:1.22.0.54 pkgsrc-2021Q2-base:1.22 pkgsrc-2021Q1:1.22.0.52 pkgsrc-2021Q1-base:1.22 pkgsrc-2020Q4:1.22.0.50 pkgsrc-2020Q4-base:1.22 pkgsrc-2020Q3:1.22.0.48 pkgsrc-2020Q3-base:1.22 pkgsrc-2020Q2:1.22.0.44 pkgsrc-2020Q2-base:1.22 pkgsrc-2020Q1:1.22.0.24 pkgsrc-2020Q1-base:1.22 pkgsrc-2019Q4:1.22.0.46 pkgsrc-2019Q4-base:1.22 pkgsrc-2019Q3:1.22.0.42 pkgsrc-2019Q3-base:1.22 pkgsrc-2019Q2:1.22.0.40 pkgsrc-2019Q2-base:1.22 pkgsrc-2019Q1:1.22.0.38 pkgsrc-2019Q1-base:1.22 pkgsrc-2018Q4:1.22.0.36 pkgsrc-2018Q4-base:1.22 pkgsrc-2018Q3:1.22.0.34 pkgsrc-2018Q3-base:1.22 pkgsrc-2018Q2:1.22.0.32 pkgsrc-2018Q2-base:1.22 pkgsrc-2018Q1:1.22.0.30 pkgsrc-2018Q1-base:1.22 pkgsrc-2017Q4:1.22.0.28 pkgsrc-2017Q4-base:1.22 pkgsrc-2017Q3:1.22.0.26 pkgsrc-2017Q3-base:1.22 pkgsrc-2017Q2:1.22.0.22 pkgsrc-2017Q2-base:1.22 pkgsrc-2017Q1:1.22.0.20 pkgsrc-2017Q1-base:1.22 pkgsrc-2016Q4:1.22.0.18 pkgsrc-2016Q4-base:1.22 pkgsrc-2016Q3:1.22.0.16 pkgsrc-2016Q3-base:1.22 pkgsrc-2016Q2:1.22.0.14 pkgsrc-2016Q2-base:1.22 pkgsrc-2016Q1:1.22.0.12 pkgsrc-2016Q1-base:1.22 pkgsrc-2015Q4:1.22.0.10 pkgsrc-2015Q4-base:1.22 pkgsrc-2015Q3:1.22.0.8 pkgsrc-2015Q3-base:1.22 pkgsrc-2015Q2:1.22.0.6 pkgsrc-2015Q2-base:1.22 pkgsrc-2015Q1:1.22.0.4 pkgsrc-2015Q1-base:1.22 pkgsrc-2014Q4:1.22.0.2 pkgsrc-2014Q4-base:1.22 pkgsrc-2014Q3:1.21.0.8 pkgsrc-2014Q3-base:1.21 pkgsrc-2014Q2:1.21.0.6 pkgsrc-2014Q2-base:1.21 pkgsrc-2014Q1:1.21.0.4 pkgsrc-2014Q1-base:1.21 pkgsrc-2013Q4:1.21.0.2 pkgsrc-2013Q4-base:1.21 pkgsrc-2013Q3:1.20.0.16 pkgsrc-2013Q3-base:1.20 pkgsrc-2013Q2:1.20.0.14 pkgsrc-2013Q2-base:1.20 pkgsrc-2013Q1:1.20.0.12 pkgsrc-2013Q1-base:1.20 pkgsrc-2012Q4:1.20.0.10 pkgsrc-2012Q4-base:1.20 pkgsrc-2012Q3:1.20.0.8 pkgsrc-2012Q3-base:1.20 pkgsrc-2012Q2:1.20.0.6 pkgsrc-2012Q2-base:1.20 pkgsrc-2012Q1:1.20.0.4 pkgsrc-2012Q1-base:1.20 pkgsrc-2011Q4:1.20.0.2 pkgsrc-2011Q4-base:1.20 pkgsrc-2011Q3:1.19.0.18 pkgsrc-2011Q3-base:1.19 pkgsrc-2011Q2:1.19.0.16 pkgsrc-2011Q2-base:1.19 pkgsrc-2011Q1:1.19.0.14 pkgsrc-2011Q1-base:1.19 pkgsrc-2010Q4:1.19.0.12 pkgsrc-2010Q4-base:1.19 pkgsrc-2010Q3:1.19.0.10 pkgsrc-2010Q3-base:1.19 pkgsrc-2010Q2:1.19.0.8 pkgsrc-2010Q2-base:1.19 pkgsrc-2010Q1:1.19.0.6 pkgsrc-2010Q1-base:1.19 pkgsrc-2009Q4:1.19.0.4 pkgsrc-2009Q4-base:1.19 pkgsrc-2009Q3:1.19.0.2 pkgsrc-2009Q3-base:1.19 pkgsrc-2009Q2:1.18.0.2 pkgsrc-2009Q2-base:1.18 pkgsrc-2009Q1:1.16.0.22 pkgsrc-2009Q1-base:1.16 pkgsrc-2008Q4:1.16.0.20 pkgsrc-2008Q4-base:1.16 pkgsrc-2008Q3:1.16.0.18 pkgsrc-2008Q3-base:1.16 cube-native-xorg:1.16.0.16 cube-native-xorg-base:1.16 pkgsrc-2008Q2:1.16.0.14 pkgsrc-2008Q2-base:1.16 cwrapper:1.16.0.12 pkgsrc-2008Q1:1.16.0.10 pkgsrc-2008Q1-base:1.16 pkgsrc-2007Q4:1.16.0.8 pkgsrc-2007Q4-base:1.16 pkgsrc-2007Q3:1.16.0.6 pkgsrc-2007Q3-base:1.16 pkgsrc-2007Q2:1.16.0.4 pkgsrc-2007Q2-base:1.16 pkgsrc-2007Q1:1.16.0.2 pkgsrc-2007Q1-base:1.16 pkgsrc-2006Q4:1.15.0.8 pkgsrc-2006Q4-base:1.15 pkgsrc-2006Q3:1.15.0.6 pkgsrc-2006Q3-base:1.15 pkgsrc-2006Q2:1.15.0.4 pkgsrc-2006Q2-base:1.15 pkgsrc-2006Q1:1.15.0.2 pkgsrc-2006Q1-base:1.15 pkgsrc-2005Q4:1.14.0.10 pkgsrc-2005Q4-base:1.14 pkgsrc-2005Q3:1.14.0.8 pkgsrc-2005Q3-base:1.14 pkgsrc-2005Q2:1.14.0.6 pkgsrc-2005Q2-base:1.14 pkgsrc-2005Q1:1.14.0.4 pkgsrc-2005Q1-base:1.14 pkgsrc-2004Q4:1.14.0.2 pkgsrc-2004Q4-base:1.14 pkgsrc-2004Q3:1.13.0.2 pkgsrc-2004Q3-base:1.13 pkgsrc-2004Q2:1.12.0.2 pkgsrc-2004Q2-base:1.12 pkgsrc-2004Q1:1.10.0.2 pkgsrc-2004Q1-base:1.10 pkgsrc-2003Q4:1.9.0.2 pkgsrc-2003Q4-base:1.9 netbsd-1-6-1:1.7.0.2 netbsd-1-6-1-base:1.7 netbsd-1-6:1.3.0.4 netbsd-1-6-RELEASE-base:1.3 pkgviews:1.2.0.4 pkgviews-base:1.2 buildlink2:1.2.0.2 buildlink2-base:1.3 netbsd-1-5-PATCH003:1.2 pkgsrc-base:1.1.1.2 TNF:1.1.1; locks; strict; comment @# @; 1.26 date 2024.02.14.08.22.39; author wiz; state Exp; branches; next 1.25; commitid cOMIgSWzAkOLonYE; 1.25 date 2023.01.22.13.17.19; author wiz; state Exp; branches; next 1.24; commitid gXHzXK7WJrO4vxaE; 1.24 date 2022.10.28.09.25.26; author wiz; state Exp; branches; next 1.23; commitid zOcQsC6vd6hXYsZD; 1.23 date 2021.10.09.10.54.12; author wiz; state Exp; branches; next 1.22; commitid fNbOH96J1bKAO7cD; 1.22 date 2014.10.01.16.10.53; author wiz; state Exp; branches; next 1.21; commitid KyWzocmUewW61wSx; 1.21 date 2013.10.22.11.44.39; author wiz; state Exp; branches; next 1.20; commitid aNtV6YeRZxnkBhax; 1.20 date 2011.12.15.15.19.35; author drochner; state Exp; branches; next 1.19; 1.19 date 2009.09.14.16.48.43; author tron; state Exp; branches; next 1.18; 1.18 date 2009.06.14.22.00.29; author joerg; state Exp; branches 1.18.2.1; next 1.17; 1.17 date 2009.04.06.12.54.06; author markd; state Exp; branches; next 1.16; 1.16 date 2007.03.11.21.01.31; author adam; state Exp; branches; next 1.15; 1.15 date 2006.01.02.21.01.59; author epg; state Exp; branches; next 1.14; 1.14 date 2004.09.22.08.09.57; author jlam; state Exp; branches; next 1.13; 1.13 date 2004.07.14.16.20.30; author epg; state Exp; branches; next 1.12; 1.12 date 2004.05.19.11.03.29; author drochner; state Exp; branches; next 1.11; 1.11 date 2004.04.16.12.34.54; author xtraeme; state Exp; branches; next 1.10; 1.10 date 2003.12.04.17.00.58; author recht; state Exp; branches 1.10.2.1; next 1.9; 1.9 date 2003.09.10.04.34.09; author epg; state Exp; branches; next 1.8; 1.8 date 2003.05.09.15.44.09; author drochner; state Exp; branches; next 1.7; 1.7 date 2003.01.30.10.52.55; author drochner; state Exp; branches; next 1.6; 1.6 date 2003.01.22.16.23.39; author jmmv; state Exp; branches; next 1.5; 1.5 date 2002.11.25.20.01.43; author wiz; state Exp; branches; next 1.4; 1.4 date 2002.08.25.18.40.24; author jlam; state Exp; branches; next 1.3; 1.3 date 2002.08.03.01.24.53; author hubertf; state Exp; branches; next 1.2; 1.2 date 2002.04.01.01.28.04; author uebayasi; state Exp; branches 1.2.2.1; next 1.1; 1.1 date 2002.01.13.19.29.02; author agc; state Exp; branches 1.1.1.1; next ; 1.18.2.1 date 2009.09.15.13.32.04; author spz; state Exp; branches; next ; 1.10.2.1 date 2004.04.27.08.50.25; author agc; state Exp; branches; next ; 1.2.2.1 date 2002.08.22.11.13.00; author jlam; state Exp; branches; next ; 1.1.1.1 date 2002.01.13.19.29.02; author agc; state Exp; branches; next 1.1.1.2; 1.1.1.2 date 2002.08.03.01.20.10; author hubertf; state Exp; branches; next ; desc @@ 1.26 log @neon: update to 0.33.0. Changes in release 0.33.0: * Interface changes: - API and ABI backwards-compatible with 0.27.x and later * Interface clarifications: - ne_locks.h: note that returned lock may have a different URI than the path passed to ne_lock_discover() due to added support for RFC 4918 "lockroot" in lock discovery - ne_request.h: ne_request_create() takes a "target" rather than a path and this can also be an absolute-URI - ne_request.h: never-used ne_free_hooks typedef removed - ne_dates.h: clarified error cases (behaviour unchanged) - ne_session.h: ne_session_create() 'host' must match RFC 3986 syntax; IPv6 literal addresses must use [] brackets * New interfaces and features: - added new configure flag --enable-auto-libproxy which enables libproxy by default for new sessions (Jan-Michael Brummer) - ne_locks.h: added DAV:lockroot support per RFC 4918 - ne_ssl.h: ne_ssl_trust_default_ca() now a no-op for non-SSL sessions - ne_request.h: add ne_add_interim_handler() to handle interim (1xx) responses; headers in interim responses are now accessible - ne_basic.h: add ne_putbuf() - ne_strhash: SHA-512/256 now supported for LibreSSL 3.8+ (orbea) - response handling no longer applies a maximum limit on 1xx interim responses; an overall timeout equal to the read timeout is now applied if a read timeout is configured and 1XXTIMEOUT is enabled - ne_request.h: add NE_REQFLAG_1XXTIMEOUT * Bug fixes: - test suite now works correctly on IPv6-only hosts (Jeremy Sowden) - fixes for building against LibreSSL (orbea) - ne_uri_parse() fixes for handling URI with no path and catch some invalid URIs which were allowed (fasticc) - retry requests after a 408 response on a persisted connection - 207 error strings are cleaned and compressed to a single line - fixed thread-safety in ne_rfc1123_date where gmtime_r is available - ne_lock_refresh() fixed to use a non-idempotent request - TLS name verification updated to match RFC 9110/6125, added strict handling of IP literals vs DNS names @ text @@@comment $NetBSD$ bin/neon-config include/neon/ne_207.h include/neon/ne_acl.h include/neon/ne_acl3744.h include/neon/ne_alloc.h include/neon/ne_auth.h include/neon/ne_basic.h include/neon/ne_compress.h include/neon/ne_dates.h include/neon/ne_defs.h include/neon/ne_i18n.h include/neon/ne_locks.h include/neon/ne_md5.h include/neon/ne_pkcs11.h include/neon/ne_props.h include/neon/ne_redirect.h include/neon/ne_request.h include/neon/ne_session.h include/neon/ne_socket.h include/neon/ne_ssl.h include/neon/ne_string.h include/neon/ne_uri.h include/neon/ne_utils.h include/neon/ne_xml.h include/neon/ne_xmlreq.h lib/libneon.la lib/pkgconfig/neon.pc man/man1/neon-config.1 man/man3/ne_add_request_header.3 man/man3/ne_addr_destroy.3 man/man3/ne_addr_error.3 man/man3/ne_addr_first.3 man/man3/ne_addr_next.3 man/man3/ne_addr_resolve.3 man/man3/ne_addr_result.3 man/man3/ne_buffer.3 man/man3/ne_buffer_altered.3 man/man3/ne_buffer_append.3 man/man3/ne_buffer_clear.3 man/man3/ne_buffer_concat.3 man/man3/ne_buffer_create.3 man/man3/ne_buffer_destroy.3 man/man3/ne_buffer_finish.3 man/man3/ne_buffer_grow.3 man/man3/ne_buffer_ncreate.3 man/man3/ne_buffer_zappend.3 man/man3/ne_calloc.3 man/man3/ne_close_connection.3 man/man3/ne_forget_auth.3 man/man3/ne_get_error.3 man/man3/ne_get_request_flag.3 man/man3/ne_get_response_header.3 man/man3/ne_get_scheme.3 man/man3/ne_get_server_hostport.3 man/man3/ne_get_session_flag.3 man/man3/ne_get_status.3 man/man3/ne_has_support.3 man/man3/ne_i18n_init.3 man/man3/ne_iaddr_cmp.3 man/man3/ne_iaddr_free.3 man/man3/ne_iaddr_make.3 man/man3/ne_iaddr_parse.3 man/man3/ne_iaddr_print.3 man/man3/ne_iaddr_raw.3 man/man3/ne_iaddr_reverse.3 man/man3/ne_iaddr_typeof.3 man/man3/ne_malloc.3 man/man3/ne_oom_callback.3 man/man3/ne_print_request_header.3 man/man3/ne_qtoken.3 man/man3/ne_realloc.3 man/man3/ne_request_create.3 man/man3/ne_request_destroy.3 man/man3/ne_request_dispatch.3 man/man3/ne_response_header_iterate.3 man/man3/ne_session_create.3 man/man3/ne_session_destroy.3 man/man3/ne_session_proxy.3 man/man3/ne_session_socks_proxy.3 man/man3/ne_session_system_proxy.3 man/man3/ne_set_addrlist.3 man/man3/ne_set_connect_timeout.3 man/man3/ne_set_error.3 man/man3/ne_set_proxy_auth.3 man/man3/ne_set_read_timeout.3 man/man3/ne_set_request_body_buffer.3 man/man3/ne_set_request_body_fd.3 man/man3/ne_set_request_body_provider.3 man/man3/ne_set_request_flag.3 man/man3/ne_set_server_auth.3 man/man3/ne_set_session_flag.3 man/man3/ne_set_useragent.3 man/man3/ne_shave.3 man/man3/ne_sock_exit.3 man/man3/ne_sock_init.3 man/man3/ne_ssl_cert_cmp.3 man/man3/ne_ssl_cert_export.3 man/man3/ne_ssl_cert_free.3 man/man3/ne_ssl_cert_identity.3 man/man3/ne_ssl_cert_import.3 man/man3/ne_ssl_cert_issuer.3 man/man3/ne_ssl_cert_read.3 man/man3/ne_ssl_cert_signedby.3 man/man3/ne_ssl_cert_subject.3 man/man3/ne_ssl_cert_write.3 man/man3/ne_ssl_clicert_decrypt.3 man/man3/ne_ssl_clicert_encrypted.3 man/man3/ne_ssl_clicert_free.3 man/man3/ne_ssl_clicert_name.3 man/man3/ne_ssl_clicert_owner.3 man/man3/ne_ssl_clicert_read.3 man/man3/ne_ssl_dname_cmp.3 man/man3/ne_ssl_readable_dname.3 man/man3/ne_ssl_set_verify.3 man/man3/ne_ssl_trust_cert.3 man/man3/ne_ssl_trust_default_ca.3 man/man3/ne_status.3 man/man3/ne_strdup.3 man/man3/ne_strhash.3 man/man3/ne_strndup.3 man/man3/ne_strparam.3 man/man3/ne_token.3 man/man3/ne_version_match.3 man/man3/ne_version_string.3 man/man3/ne_vstrhash.3 man/man3/ne_xml_create.3 man/man3/ne_xml_destroy.3 man/man3/neon.3 share/doc/${PKGNAME}/README.pkgsrc share/doc/${PKGNAME}/html/api.html share/doc/${PKGNAME}/html/biblio.html share/doc/${PKGNAME}/html/compliance.html share/doc/${PKGNAME}/html/features.html share/doc/${PKGNAME}/html/index.html share/doc/${PKGNAME}/html/intro.html share/doc/${PKGNAME}/html/ref.html share/doc/${PKGNAME}/html/refalloc.html share/doc/${PKGNAME}/html/refauth.html share/doc/${PKGNAME}/html/refbuf.html share/doc/${PKGNAME}/html/refbufapp.html share/doc/${PKGNAME}/html/refbufcr.html share/doc/${PKGNAME}/html/refbufdest.html share/doc/${PKGNAME}/html/refbufutil.html share/doc/${PKGNAME}/html/refcert.html share/doc/${PKGNAME}/html/refclicert.html share/doc/${PKGNAME}/html/refconfig.html share/doc/${PKGNAME}/html/referr.html share/doc/${PKGNAME}/html/reffeat.html share/doc/${PKGNAME}/html/refgetst.html share/doc/${PKGNAME}/html/refhash.html share/doc/${PKGNAME}/html/refi18n.html share/doc/${PKGNAME}/html/refiaddr.html share/doc/${PKGNAME}/html/refneon.html share/doc/${PKGNAME}/html/refopts.html share/doc/${PKGNAME}/html/refparam.html share/doc/${PKGNAME}/html/refproxy.html share/doc/${PKGNAME}/html/refreq.html share/doc/${PKGNAME}/html/refreqbody.html share/doc/${PKGNAME}/html/refreqflags.html share/doc/${PKGNAME}/html/refreqhdr.html share/doc/${PKGNAME}/html/refresolve.html share/doc/${PKGNAME}/html/refresphdr.html share/doc/${PKGNAME}/html/refsess.html share/doc/${PKGNAME}/html/refsessflags.html share/doc/${PKGNAME}/html/refshave.html share/doc/${PKGNAME}/html/refsockinit.html share/doc/${PKGNAME}/html/refsslca.html share/doc/${PKGNAME}/html/refsslcert2.html share/doc/${PKGNAME}/html/refsslcertio.html share/doc/${PKGNAME}/html/refssldname.html share/doc/${PKGNAME}/html/refsslvfy.html share/doc/${PKGNAME}/html/refstatus.html share/doc/${PKGNAME}/html/reftok.html share/doc/${PKGNAME}/html/refvers.html share/doc/${PKGNAME}/html/refxml.html share/doc/${PKGNAME}/html/security.html share/doc/${PKGNAME}/html/using.html share/doc/${PKGNAME}/html/xml.html share/locale/cs/LC_MESSAGES/neon.mo share/locale/de/LC_MESSAGES/neon.mo share/locale/fr/LC_MESSAGES/neon.mo share/locale/ja/LC_MESSAGES/neon.mo share/locale/ka/LC_MESSAGES/neon.mo share/locale/nn/LC_MESSAGES/neon.mo share/locale/pl/LC_MESSAGES/neon.mo share/locale/ru/LC_MESSAGES/neon.mo share/locale/tr/LC_MESSAGES/neon.mo share/locale/zh_CN/LC_MESSAGES/neon.mo @ 1.25 log @neon: update to 0.32.5. Changes in release 0.32.5: * NOTE: Since 0.32.0 the "$KRB5_CONFIG" environment variable is ignored when running configure. Use KRB5_CONF_TOOL instead to specify an alternative to /usr/bin/krb5-config. * Fail for configure --with-gssapi if GSSAPI can't be enabled (issue #102) * Add Georgian translation (NorwayFun) * Fixes for Windows MSYS2/MinGW build, including cross-build (Jim Klimov) @ text @d89 1 @ 1.24 log @neon: fix PLIST for previous @ text @d183 1 @ 1.23 log @neon: update to 0.32.1. Changes in release 0.32.1: * Fix configure CFLAGS handling in Kerberos detection. * Various spelling fixes. Changes in release 0.32.0: * Interface changes: - API and ABI backwards-compatible with 0.27.x and later - NE_AUTH_DIGEST now only enables RFC 2617/7616 auth by default; to enable weaker RFC 2069 Digest, use NE_AUTH_LEGACY_DIGEST (treated as a security enhancement, not an API/ABI break) * Interface clarifications: - ne_auth.h: use of non-ASCII usernames with the ne_auth_creds callback type is now rejected for Digest auth since the encoding is not specified. ne_add_auth() can be used instead. - ne_request.h: the ne_create_request_fn callback is passed the request-target using RFC 7230 terminology * New interfaces and features: - ne_string.h: added ne_strhash(), ne_vstrhash(), ne_strparam() - ne_auth.h: added RFC 7616 (Digest authentication) support, including userhash=, username*= and SHA-2 algorithms (SHA-2 requires GnuTLS/OpenSSL). added NE_AUTH_LEGACY_DIGEST - ne_auth.h: added ne_add_auth() unified auth callback interface, accepts (only) UTF-8 usernames, uses a larger password buffer, and has different/improved attempt counter semantics. - RFC 7617 scoping rules are now applied for Basic authentication. - ne_ssl.h: added ne_ssl_cert_hdigest() - ne_socket.h: added ne_sock_shutdown() - sendmsg()/send() are used with the MSG_NOSIGNAL flag to write to sockets on Unix, rather than write()/writev(), avoiding SIGPIPE - explicit_bzero() is used where available to clear credentials * Bug fixes: - fixed TLS connection shutdown handling for OpenSSL 3 - fix various Coverity and cppcheck warnings (Sebastian Reschke) - Kerberos library detection uses pkg-config where possible. - fix some configure checks on Win32 (Christopher Degawa) - fix some configure errors on MacOS (Ryan Schmidt) @ text @d129 1 @ 1.22 log @Update to 0.30.1: Changes in release 0.30.1: * Fix memory leak with GnuTLS (Werner Baumann, Patrick Ohly). * Fix possible crash after DNS lookup errors on Windows (Olivier Goffart). * Don't fail if the SSL cert changes between connections with OpenSSL, behaviour now matches that with GnuTLS. * Fix PKCS#11 support under OpenSSL with TLS 1.2. * Fix static linking with pkg-config file (Alan H). @ text @d119 1 d121 1 d125 1 d149 1 d154 1 @ 1.21 log @Update to 0.30.0: Changes in release 0.30.0: * Interface changes: - none, API and ABI backwards-compatible with 0.27.x and later * New interfaces and features: - ne_ssl.h: added ne_ssl_clicert_import, ne_ssl_context_get_flag - ne_session.h: added ne_set_addrlist2 - ne_socket.h: added ne_addr_canonical - ne_auth.h: added NE_AUTH_GSSAPI_ONLY, NE_AUTH_SSPI (Nathanael Rensen) - ne_basic.h: added NE_CAP_EXT_MKCOL options test - ne_request.h: support chunked bodies with negative length passed to ne_set_request_body_provider (Julien Reichel) * Bug fixes: - ne_path_escape: fix excessive memory allocation (Pierre Crokaert) - SSPI auth: use canonical server hostname, clear SSPI context after successful auth (Nathanael Rensen) - build fixes for Open Watcom compiler (NormW) - fix Win32 error code handling for local ne_sock_prebind bind failure - Win32: support LFS, thread-safe OpenSSL (Diego Santa Cruz) - GnuTLS: fix GnuTLS 3.x support (Matthias Petschick, Bartosz Brachaczek) @ text @a88 1 man/man3/ne_set_request_body_fd64.3 @ 1.20 log @update to 0.29.6 changes: -bugfixes (mostly SSL releated) -docs updates @ text @d80 3 d151 1 @ 1.19 log @Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.18 2009/06/14 22:00:29 joerg Exp $ d63 1 d65 2 @ 1.18 log @Convert @@exec/@@unexec to @@pkgdir or drop it. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.17 2009/04/06 12:54:06 markd Exp $ d5 1 d164 1 @ 1.18.2.1 log @Pullup ticket 2894 - requested by tron security update Revisions pulled up: - pkgsrc/www/neon/Makefile by patch - pkgsrc/www/neon/PLIST by patch - pkgsrc/www/neon/distinfo by patch Files added: pkgsrc/www/neon/patches/patch-ab by patch Module Name: pkgsrc Committed By: tron Date: Mon Sep 14 16:48:44 UTC 2009 Modified Files: pkgsrc/www/neon: Makefile PLIST distinfo pkgsrc/www/neon/patches: patch-ab Removed Files: pkgsrc/www/neon/patches: patch-aa Log Message: Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client. To generate a diff of this commit: cvs rdiff -u -r1.48 -r1.49 pkgsrc/www/neon/Makefile cvs rdiff -u -r1.18 -r1.19 pkgsrc/www/neon/PLIST cvs rdiff -u -r1.20 -r1.21 pkgsrc/www/neon/distinfo cvs rdiff -u -r1.1 -r0 pkgsrc/www/neon/patches/patch-aa cvs rdiff -u -r1.1 -r1.2 pkgsrc/www/neon/patches/patch-ab @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.19 2009/09/14 16:48:43 tron Exp $ a4 1 include/neon/ne_acl3744.h a162 1 share/doc/${PKGNAME}/html/security.html @ 1.17 log @Update neon to 0.28.3 Remove comment about checking subversion for neon > 0.27 as 0.28.3 is in fact the prefered version for the current subversion. Several years of bug fixes. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.16 2007/03/11 21:01:31 adam Exp $ a173 3 @@dirrm share/doc/${PKGNAME}/html @@dirrm share/doc/${PKGNAME} @@dirrm include/neon @ 1.16 log @Changes 0.26.3: * Fix buffer under-read in URI parser (Laszlo Boszormenyi, CVE-2007-0157) * Fix regression in handling of "attempt" argument passed to auth callbacks; ensure the value only increments for each invocation of the callback * Fix handling of "nextnonce" parameter in Digest authentication Changes 0.26.2: * Fix error reported for LOCK responses lacking a Lock-Token header. * Use Libs.private in neon.pc for newer versions of pkg-config. * Build fix for platforms without libintl.h. * Build fixes for MinGW. * Build fix for h_errno detection on HP-UX 10. * Win32: enable debugging; build fixes with some SDKs. Changes 0.26.1: * Build fixes for Win32 (D.J. Heap) and OS X. * Add Simplified Chinese translation Changes in release 0.26.0: * Added internationalization support: * Added support for GnuTLS * Changes and additions to URI support: * Changed results callbacks for ne_lock_discover, PROPFIND interfaces: * Added functions which give control over authentication protocol use: * Added ne_unhook_* functions to remove hooks * Added ne_set_session_flags()/ne_get_session_flags() functions: * Added ne_set_request_flags()/ne_get_request_flags() functions: * Change ne_md5.h interface to make struct ne_md5_ctx opaque: * Fixed ne_get_range(), added ne_get_range64() * Removed NE_FREE() macro from ne_alloc.h * Added ne_strcasecmp(), ne_strncasecmp(), ne_tolower() functions * Changed ne_sock_init()/ne_sock_exit() such that ne_sock_exit() * Added "--enable-threadsafe-ssl=posix" configure flag, to enable * The manual is now licensed under the GPL rather than the GFDL @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.15 2006/01/02 21:01:59 epg Exp $ d14 1 d51 1 d55 1 d76 1 a77 1 man/man3/ne_set_persist.3 d83 1 a83 1 man/man3/ne_set_request_expect100.3 d85 1 d146 1 a147 1 share/doc/${PKGNAME}/html/refreqopts.html d151 1 d170 1 d173 1 a173 1 share/locale/zh/LC_MESSAGES/neon.mo @ 1.15 log @Update to 0.25.4: Changes in release 0.25.4: * GSSAPI fixes for non-MIT implementations (Mikhail Teterin). * Fix ne_print_request_header() et al to use 8K buffer size on all platforms (fixes issue with long Destination: URLs on Win32). * Win32 build fix for !USE_GETADDRINFO configuration. * Documentation updates. Changes in release 0.25.3: * ne_lock() and ne_unlock(): fix cases where NE_ERROR would be returned instead of e.g. NE_AUTH on auth failure. * Prevent use of poll() on Darwin. * Fix gethostbyname-based resolver on LP64 platforms (Matthew Sanderson). Changes in release 0.25.2: * Really fix the Win32 build. Changes in release 0.25.1: * ne_get_content_type(): fix cases where the charset field was not set to NULL after successful return (Johannes Schneider) * Compressed response handling fixes: - fix double invocation of reader callback with len=0 - fix cases where the reader callback return value was ignored * Cache the new SSL session if the old one was expired (Robert Eiglmaier) * Win32: fix build issues. Changes in release 0.25.0: * New interfaces: - ne_get_response_header() replaces ne_add_response_header_handler - ne_read_response_to_fd() and ne_discard_response() for use with ne_begin_request/ne_end_request style response handling - ne_xmlreq.h: ne_xml_parse_response() and ne_xml_dispatch_request() - ne_has_support() for feature detection, replaces ne_support_ssl() - ne_set_addrlist() can be used to bypass normal DNS hostname resolver - ne_buffer_czappend(), convenience wrapper for ne_buffer_append. - ne_iaddr_typeof() returns type of a socket object - ne_get_content_type() replaces ne_content_type_handler() - ne_set_request_expect100() replaces ne_set_expect100() * New interfaces on LFS systems for large file support: - ne_set_request_body_fd64() call for using an fd opened using O_LARGEFILE - ne_set_request_body_provider64(), takes an off64_t length argument * Interface changes: - ne_set_request_body_fd takes offset and length arguments and returns void - ne_set_request_body_provider takes length as off_t rather than size_t; provider callbacks now MUST set session error string if returning an error - response body reader callback returns an integer and can abort the response - ne_decompress_destroy() returns void; errors are caught earlier - ne_xml_failed() replaces ne_xml_valid(), with different return value logic - ne_xml_parse() can return an error; ne_xml_parse_v() aborts the response if the parse either fails or is aborted by a handler returning NE_XML_ABORT - ne_path_escape() now escapes all but unreserved characters - ne_ssl_clicert_name() and ne_ssl_cert_identity() clarified to return UTF-8 - ne_ssl_clicert_name() clicert object argument is now const - ne_uri_parse()/ne_uri_free() memory handling clarified - removed the buffer length requirement for ne_read_response_block() * Bug fixes: - properly handle multiple Authentication challenges per request - fixes and improvements to the Negotiate auth implementation - handle proxies which send a 401 auth challenge to a CONNECT request - XML: handle the UTF-8 BOM even if the underlying parser does not - Win32: Fix timezone handling (Jiang Lei) - ne_lock_refresh() works and will update timeout of passed-in lock - persistent connection timeout handling fixes for CygWin et al - impose hard limit of 1024 props per resource in ne_props.h response parsing * New platform-specific features: - Win32: Negotiate/NTLM support using SSPI (Vladimir Berezniker) - Win32: Add IPv6 support using ENABLE_IPV6 neon.mak flag (Kai Sommerfeld) * Removed features: - the cookies interface has been removed - removed functions: ne_service_lookup(), ne_put_if_unmodified() - "qop=auth-int" support removed from Digest auth implementation * Default XML parser search changed to check for expat before libxml2. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.14 2004/09/22 08:09:57 jlam Exp $ d54 2 d79 1 d84 1 a115 12 share/doc/${PKGNAME}/html/apas01.html share/doc/${PKGNAME}/html/apas02.html share/doc/${PKGNAME}/html/apas03.html share/doc/${PKGNAME}/html/apas04.html share/doc/${PKGNAME}/html/apas05.html share/doc/${PKGNAME}/html/apas06.html share/doc/${PKGNAME}/html/apas07.html share/doc/${PKGNAME}/html/apas08.html share/doc/${PKGNAME}/html/apas09.html share/doc/${PKGNAME}/html/apas10.html share/doc/${PKGNAME}/html/apas11.html share/doc/${PKGNAME}/html/apas12.html a119 1 share/doc/${PKGNAME}/html/gfdl.html d134 1 d136 1 d160 8 @ 1.14 log @Mechanical changes to package PLISTs to make use of LIBTOOLIZE_PLIST. All library names listed by *.la files no longer need to be listed in the PLIST, e.g., instead of: lib/libfoo.a lib/libfoo.la lib/libfoo.so lib/libfoo.so.0 lib/libfoo.so.0.1 one simply needs: lib/libfoo.la and bsd.pkg.mk will automatically ensure that the additional library names are listed in the installed package +CONTENTS file. Also make LIBTOOLIZE_PLIST default to "yes". @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.13 2004/07/14 16:20:30 epg Exp $ a8 1 include/neon/ne_cookies.h d24 1 d50 3 d58 1 d67 1 a71 1 man/man3/ne_set_expect100.3 d77 1 d109 2 d150 1 d152 1 d164 1 @ 1.13 log @Update neon to 0.24.7 Changes in release 0.24.7: * Compression interface fixes: - fix issues handling content decoding and request retries from authentication challenges (Justin Erenkrantz) - fix places where reader callback would receive spurious size=0 calls - fix to pass user-supplied userdata to user-supplied acceptance callback * Fix for RFC2617-style digest authentication (Hideaki Takahashi). * Fix to pick up gethostbyname() on QNX 6.2. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.12 2004/05/19 11:03:29 drochner Exp $ a24 1 lib/libneon.a a25 3 lib/libneon.so lib/libneon.so.24 lib/libneon.so.24.7 @ 1.12 log @update to 0.24.6 Security fix release @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.11 2004/04/16 12:34:54 xtraeme Exp $ d29 1 a29 1 lib/libneon.so.24.6 @ 1.11 log @Update neon to 0.24.5 Changes in release 0.24.5: * SECURITY (CVE CAN-2004-0179): Fix format string vulnerabilities in XML/207 response handling, reported by greuff@@void.at. * Performance fix: avoid seeding the SSL PRNG if not creating an SSL socket. * ne_ssl_readable_dname() is now defined to return UTF-8 strings. * Fix case where gssapi/gssapi_generic.h was included but not present. * Fix ne_utils.c build on platforms where zlib does "#define const". * Fix use of ne_proppatch_operation with some C++ compilers. * Update libtool for fix to --enable-shared on Darwin. * BeOS: check for gethostbyname in -lbind (David Reid). @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.10 2003/12/04 17:00:58 recht Exp $ d29 1 a29 1 lib/libneon.so.24.5 @ 1.10 log @update to 0.24.4 * Ignore unclean SSL closure when response body is delimited by EOF ("Could not read response body: Secure connection truncated" errors with some buggy SSL servers). * Fix test/ssl.c syntax errors with C89 compilers (Radu Greab). * Respect configure's --datadir argument (Max Bowsher). * Fix build on Windows when OpenSSL is not used. * Fix use of SSLv2 (spurious "Server did not present certificate" error). * When using SSL via a proxy, prevent leaking server auth credentials to the proxy, or proxy auth credentials to the server. * Fix name resolver with some old versions of glibc. * Fix problems with configure's "time_t format string" detection. * Fix problems when a broken Kerberos installation is found. * When verifying SSL certificates, check iPaddress names in the subjectAltName extension. Update BUILDLINK_DEPENDS to 0.24.4 since there was an XML API change in 0.24.0. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.9 2003/09/10 04:34:09 epg Exp $ d29 1 a29 1 lib/libneon.so.24.4 @ 1.10.2.1 log @Pull up a security fix to the pkgsrc-2004Q1 branch. Requested by xtraeme in ticket pkgsrc-24. "Update neon to 0.24.5 Changes in release 0.24.5: * SECURITY (CVE CAN-2004-0179): Fix format string vulnerabilities in XML/207 response handling, reported by greuff@@void.at. * Performance fix: avoid seeding the SSL PRNG if not creating an SSL socket. * ne_ssl_readable_dname() is now defined to return UTF-8 strings. * Fix case where gssapi/gssapi_generic.h was included but not present. * Fix ne_utils.c build on platforms where zlib does "#define const". * Fix use of ne_proppatch_operation with some C++ compilers. * Update libtool for fix to --enable-shared on Darwin. * BeOS: check for gethostbyname in -lbind (David Reid)." @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.11 2004/04/16 12:34:54 xtraeme Exp $ d29 1 a29 1 lib/libneon.so.24.5 @ 1.9 log @Update to 0.24.1. Changes in release 0.24.1: * Add support for "GSS-Negotiate" Kerberos authentication scheme (from Risko Gergely and Burjan Gabor). * Disable Nagle to improve performance of small requests (thanks to Jim Whitehead and Teng Xu). * Fix compatibility with OpenSSL 0.9.6 (broken in 0.24.0). * Fix prototype mismatch in ne_207.c. * Define ssize_t from ne_request.h for Win32. * Prevent segfault on zlib initialization failures. * ne_sock_init does not fail if PRNG could not be seeded. * Fix segfault in cookies code (Markus Mueller). * Documentation updates. Changes in release 0.24.0: * Major changes to XML interface: - have the start-element callback either accept, decline, abort, or return a state integer. - remove 'struct ne_xml_elm'; callbacks are passed {nspace, name} strings along with a state integer. - dropped "collect", "strip-leading-whitespace" modes - push responsibility for accumulating cdata onto caller; drop 'cdata' argument from end-element callback. - don't abort if no handler accepts a particular element, just ignore that branch of the tree. - dropped support for libxml 1.x and expat < 1.95.0. - guarantee that start_element callback is not passed attrs=NULL - add ne_xml_doc_encoding() to retrieve encoding of parsed XML document. * Major changes to SSL interface: - rewrite of interfaces for handling server and client certificates; ne_ssl.h: many new functions available. - only PKCS#12-encoded client certs are supported. - changes to most names of SSL-related functions operating on an ne_session, e.g. ne_ssl_load_cert->ne_ssl_trust_cert. - client cert provider callback is passed the set of acceptable CA names sent by the server - the entire chain of certs presented by server is now accessible * Remove unused ne_register_progress() from socket layer. * Changes to resolver interface: ne_addr_first and _next return const; ne_addr_print renamed to ne_iaddr_print; ne_iaddr_make and ne_iaddr_free have been added. * ne_request_create() now duplicates the method string passed in. * ne_redirect_location() will now return NULL in some cases. * Split socket creation to ne_sock_create() from ne_sock_connect: - should report connect() error messages properly on Win32. * Fix several memory leaks in error handling paths. * Add a pkg-config file, neon.pc.in. @ text @d1 1 a1 1 @@comment $NetBSD$ d29 1 a29 1 lib/libneon.so.24.1 @ 1.8 log @update to 0.23.9, provided by Marc Recht per PR pkg/20987 Changes are basically fixes, among them a security fix. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.7 2003/01/30 10:52:55 drochner Exp $ d20 1 d28 3 a30 2 lib/libneon.so.23 lib/libneon.so.23.9 a36 1 man/man3/ne_addr_print.3 d55 4 d81 17 a97 4 man/man3/ne_ssl_certificate.3 man/man3/ne_ssl_dname.3 man/man3/ne_ssl_load_ca.3 man/man3/ne_ssl_load_default_ca.3 d100 2 d109 1 d121 2 a122 5 share/doc/${PKGNAME}/html/auth.html share/doc/${PKGNAME}/html/basic.html share/doc/${PKGNAME}/html/ch01s02.html share/doc/${PKGNAME}/html/ch01s03.html share/doc/${PKGNAME}/html/ch02.html d124 1 a127 3 share/doc/${PKGNAME}/html/locking.html share/doc/${PKGNAME}/html/lowlevel.html share/doc/${PKGNAME}/html/props.html d136 2 d141 1 d152 2 a153 1 share/doc/${PKGNAME}/html/refsslcert.html d159 1 a159 2 share/doc/${PKGNAME}/html/ssl.html share/doc/${PKGNAME}/html/utils.html @ 1.7 log @update to 0.23.7 changes: -Fix for handling EINTR during write() call (Sergey N Ushakov). -When available, use pkg-config to determine compiler flags needed to use OpenSSL headers and libraries. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.6 2003/01/22 16:23:39 jmmv Exp $ d28 1 a28 1 lib/libneon.so.23.7 @ 1.6 log @Update neon to 0.23.6, with patch provided in PR pkg/19998 by Marc Recht. Changes since 0.23.5: * Fixes for error handling in socket layer on Win32 from Johan Lindh and Sergey N Ushakov: * meaningful error messages rather than "No error" * handle persistent connection timeouts properly * Fix to use RFC2617-style digest auth when possible (had reverted to only using RFC2068-style in 0.16.1). * Fix NULL pointer dereference on certain ill-formed PROPFIND responses. * Allow ne_sock_init to re-initialize after ne_sock_finish has been called (Sergey N Ushakov). Changes in the package: * Switch to libxml2. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.5 2002/11/25 20:01:43 wiz Exp $ d28 1 a28 1 lib/libneon.so.23.6 @ 1.5 log @Update to 0.23.5, needed by to-be-committed subversion update. Excerpt of changes (+portability and bug fixes): * Add support for `--la-file' argument to neon-config, which prints the full path of the installed libneon.la file. * Improved address resolver (ne_addr_*) replacing ne_name_lookup(): - use getaddrinfo() if found; include support for IPv6 (based on work by Noriaki Takamiya) * For a hostname with multiple addresses, each address is tried in turn until a connection is made. * RFC2818 compliance for certificate identity checks in SSL: - use `dNSname' values in subjectAltName extension if present - hostname comparison fixed to not be case-sensitive * Added NE_DBG_SSL debug channel. * ne_strerror changed to return the passed-in buffer. * Added ne_strnzcpy macro to ne_string.h. * Added reference documentation: - ne_sock_init, ne_addr_*. * Remove the const qualifier from the reason_phrase field in ne_status. - ne_parse_statusline() now strdup's the reason_phrase * Remove the status_line argument from ne_207_end_propstat and _end_response * Change ne_session_create, ne_session_proxy, ne_sock_connect, and the 'port' field of the ne_uri structure to use an unsigned int for port numbers * ne_uri_defaultport returns unsigned and '0' on an unknown port (not -1). * Changes to hooks interface: - pass an ne_request pointer to per-request hooks - replace "accessor" hooks with ne_{get,set}_{request,session}_private * Authentication changes: - the hooks changes fix a segfault if auth is enabled for an SSL session through a proxy server - fix ne_forget_auth segfault if either proxy or server auth are not used * Improvements to persistent connection retry logic and error handling in request code; fixing some cases where some errors where incorrectly treated as a persistent connection timeout - a TCP RST at the appropriate time is now treated as a persistent connection timeout. - handle persistent connection timeouts on SSL connections * Changes to SSL support: - improved error handling - fix for proxy CONNECT tunnelling with some proxies (e.g. Traffic-Server) - fix potential segfault if client cert. provider callback is used - fix to use supplied password callback for PEM-encoded client certificates (Daniel Berlin) * Remove ne_read_file(). * ne_version_match replaces ne_version_minimum (semantics changed slightly). * XML request bodies use a content-type of "application/xml" now; applications can use NE_XML_MEDIA_TYPE from ne_xml.h @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.4 2002/08/25 18:40:24 jlam Exp $ d28 1 a28 1 lib/libneon.so.23.5 @ 1.4 log @Merge changes in packages from the buildlink2 branch that have buildlink2.mk files back into the main trunk. This provides sufficient buildlink2 infrastructure to start merging other packages from the buildlink2 branch that have already been converted to use the buildlink2 framework. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.2.2.1 2002/08/22 11:13:00 jlam Exp $ d27 2 a28 2 lib/libneon.so.21 lib/libneon.so.21.3 d31 7 d75 1 d86 3 d123 1 d128 1 d131 1 d138 1 @ 1.3 log @Update neon to 0.21.3. Changes in release 0.21.3: * Fix segfault if using proxy server with SSL session and server certificate verification fails. * Fix leak of proxy hostname once per session (if a proxy is used). * Add --with-libs configure argument; e.g. --with-libs=/usr/local picks up any support libraries in /usr/local/{lib,include} Changes in release 0.21.2: * Fix 'make install' for VPATH builds. * Use $(mandir) for installing man pages (Rodney Dawes). * Follow some simple (yet illegal) relativeURI redirects. * Always build ne_compress.obj in Win32 build (Branko Èibej). * Fix decompression logic bug (Justin Erenkrantz ) (could give a decompress failure for particular responses) * Fix ne_proppatch() to submit lock tokens for available locks. * More optimisation of ne_sock_readline. Changes in release 0.21.1: * Don't include default SSL port in Host request header, which can help interoperability with misbehaving servers (thanks to Rodney Dawes ). * Don't give a "truncated response" error from ne_decompress_destroy if the acceptance function returns non-zero. * Fix for Win32 build (Sander Striker ). * Fix for cookie name/value being free()d (thanks to Dan Mullen). * Optimisation of ne_sock_readline. Changes in release 0.21.0: * Socket layer implements read buffering; efficiency and performance improvement. Based on work by Jeff Johnson * Cleanup of socket interface: - renamed everything, s/sock_/ne_sock_/, s/SOCK_/NE_SOCK_/ - removed unused and inappropriate interfaces. - renaming done by Olof Oberg - see src/ChangeLog for the gory details. * Fix typoed 'ne_destroy_fn' typedef (Olof Oberg). * Support OpenSSL/ENGINE branch. * Bogus ne_utf8_encode/decode functions removed. * ne_base64() moved to ne_string.[ch]. * ne_token drops 'quotes' parameter; ne_qtoken added. * ne_buffer_create_sized renamed to ne_buffer_ncreate. * ne_xml_get_attr takes extra arguments and can resolve namespaces. * ne_accept_response function type takes const ne_status pointer. * Drop support for automatically following redirects: - ne_redirect_register just takes a session pointer - ne_redirect_location returns an ne_uri pointer * configure changes: --with-ssl and --with-socks no longer take a directory argument. To use SOCKS or SSL libraries/headers in non-system locations, use ./configure CPPFLAGS=-I/... LDFLAGS=-L/... * Reference documentation included for most of ne_alloc.h and ne_string.h, and parts of ne_session.h and ne_request.h. - see installed man pages, HTML documentation. Changes in release 0.20.0: * Major changes to DAV lock handling interface (ne_locks.h): - struct ne_lock uses a full URI structure to identify locked resource - ne_lock() requires that owner/token fields are malloc-allocated (or NULL) on entry - introduce a "lock store" type, ne_lock_store, to replace the lock session; accessor functions all renamed to ne_lockstore_*. - ne_lock_iterate replaced with a first/next "cursor"-style interface - If: headers use an absoluteURI (RFC2518 compliance fix). - fix for handling shared locks on DAV servers which return many active locks in the LOCK response (thanks to Keith Wannamaker) * Moved URI/path manipulation functions under ne_* namespace (ne_uri.h): - path handling functions renamed to ne_path_* - URI structure handling to ne_uri_*; struct uri becomes ne_uri. - ne_uri_parse doesn't take a 'defaults' parameter any more - if URI port is unspecified, ne_uri_parse sets port to 0 not -1. - added ne_uri_unparse and ne_uri_defaultport functions. * New 'ne_fill_server_uri' function to initialize a URI structure with the server details for a given session (useful with locks interface). * ne_decompress_{reader,destroy} are defined as passthrough-functions if zlib support is not enabled. * API change: ne_ssl_provide_fn returns void not int. * Added NE_SSL_FAILMASK for verify failure sanity check. * Removed return codes NE_SERVERAUTH and and NE_AUTHPROXY; correct documentation, NE_PROXYAUTH is given for proxy auth failure. * Require zlib >= 1.1.4 to avoid possible vulnerability in earlier versions. See http://www.gzip.org/zlib/advisory-2002-03-11.txt for more details. (version check can be skipped by passing --with-force-zlib to configure) * New 'ne_ssl_readable_dname' function to create a human-readable string from an X509 distinguished name. * Fix support for newer versions of libxml2 (thanks to Jon Trowbridge ). * Fix corruption of reason_phrase in status object returned by ne_propset_status. * More lenient handling of whitespace in response headers. * ne_content_type_handler will give a charset of "ISO-8859-1" if no charset parameter is specified for a text/* media type (as per RFC2616). * Miscellaneous cleanups and fixes (Jeff Johnson ). Changes in release 0.19.4: * Support bundled build of expat 1.95.x (Branko Èibej). Update submitted by Joel Wilsson in PR 17812. @ text @d1 1 a1 1 @@comment $NetBSD$ @ 1.2 log @Update to 19.3. Supplied by Alex Newman in pkg/16078, and reviewed by the maintainer, Eric Gillespie . Major version changed so that BUILDLINK_DEPENDS.neon bumped. Part of changes from NEWS: Changes in release 0.19.1-0.19.3: * For platforms lacking snprintf or vsnprintf in libc, require trio. * Add NE_FMT_OFF_T to fix Win32 build (Dan Berlin, Branko Èibej). * Fix non-SSL build broken in 0.19.1. * Working SOCKSv5 support (thanks to Torsten Kalix ) * Add missing stubs for ne_ssl_* functions for non-SSL build. * Fix some error messages in new SSL code. Changes in release 0.19.0: * Major API change: ne_session_create now takes (scheme, hostname, port) arguments: a session is clarified to be "a group of requests to a certain server". - removal of ne_session_server, ne_set_secure, and ne_set_proxy_decider - ne_session_proxy returns void. - DNS lookups are delayed until request dispatch time. * Significant improvements to TLS/SSL support: - SSL is enabled if scheme passed to ne_session_create is "https" - new interfaces to load CA certs and to load SSL library's bundled CA certs - add server cert verification callback. An SSL connection to a server with an unknown CA will now fail unless a verification callback is used. - enable SSL session caching (performance improvement) - support for wildcard server certs where commonName is "*.example.com". - thanks to Tommi Komulainen for the contribution of code from mutt's IMAP/SSL implementation under the LGPL, from which bits of this were derived. Changes in release 0.18.4-0.18.5: * Removed old neon.dsp, neon.dsw. * Update Win32 build to add OpenSSL and zlib support (Branko Èibej). * Fixes for Content-Type parsing using ne_content_type_handler (Greg Stein) - also now parses the charset parameter from header value. * Removed ne_concat() function, which didn't work and wasn't used. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.1.1.1 2002/01/13 19:29:02 agc Exp $ d27 102 a128 2 lib/libneon.so.19 lib/libneon.so.19.3 @ 1.2.2.1 log @Merge changes from pkgsrc-current into the buildlink2 branch for the packages that have buildlink2.mk files. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.3 2002/08/03 01:24:53 hubertf Exp $ d27 2 a28 102 lib/libneon.so.21 lib/libneon.so.21.3 man/man1/neon-config.1 man/man3/ne_add_request_header.3 man/man3/ne_buffer.3 man/man3/ne_buffer_altered.3 man/man3/ne_buffer_append.3 man/man3/ne_buffer_clear.3 man/man3/ne_buffer_concat.3 man/man3/ne_buffer_create.3 man/man3/ne_buffer_destroy.3 man/man3/ne_buffer_finish.3 man/man3/ne_buffer_grow.3 man/man3/ne_buffer_ncreate.3 man/man3/ne_buffer_zappend.3 man/man3/ne_calloc.3 man/man3/ne_close_connection.3 man/man3/ne_forget_auth.3 man/man3/ne_get_error.3 man/man3/ne_get_status.3 man/man3/ne_malloc.3 man/man3/ne_oom_callback.3 man/man3/ne_print_request_header.3 man/man3/ne_qtoken.3 man/man3/ne_realloc.3 man/man3/ne_request_create.3 man/man3/ne_request_destroy.3 man/man3/ne_request_dispatch.3 man/man3/ne_session_create.3 man/man3/ne_session_destroy.3 man/man3/ne_session_proxy.3 man/man3/ne_set_error.3 man/man3/ne_set_expect100.3 man/man3/ne_set_persist.3 man/man3/ne_set_proxy_auth.3 man/man3/ne_set_read_timeout.3 man/man3/ne_set_request_body_buffer.3 man/man3/ne_set_request_body_fd.3 man/man3/ne_set_server_auth.3 man/man3/ne_set_useragent.3 man/man3/ne_shave.3 man/man3/ne_ssl_certificate.3 man/man3/ne_ssl_dname.3 man/man3/ne_ssl_load_ca.3 man/man3/ne_ssl_load_default_ca.3 man/man3/ne_ssl_readable_dname.3 man/man3/ne_ssl_set_verify.3 man/man3/ne_status.3 man/man3/ne_strdup.3 man/man3/ne_strndup.3 man/man3/ne_token.3 share/doc/${PKGNAME}/html/apas02.html share/doc/${PKGNAME}/html/apas03.html share/doc/${PKGNAME}/html/apas04.html share/doc/${PKGNAME}/html/apas05.html share/doc/${PKGNAME}/html/apas06.html share/doc/${PKGNAME}/html/apas07.html share/doc/${PKGNAME}/html/apas08.html share/doc/${PKGNAME}/html/apas09.html share/doc/${PKGNAME}/html/apas10.html share/doc/${PKGNAME}/html/apas11.html share/doc/${PKGNAME}/html/apas12.html share/doc/${PKGNAME}/html/auth.html share/doc/${PKGNAME}/html/basic.html share/doc/${PKGNAME}/html/ch01s02.html share/doc/${PKGNAME}/html/ch01s03.html share/doc/${PKGNAME}/html/ch02.html share/doc/${PKGNAME}/html/compliance.html share/doc/${PKGNAME}/html/gfdl.html share/doc/${PKGNAME}/html/index.html share/doc/${PKGNAME}/html/intro.html share/doc/${PKGNAME}/html/locking.html share/doc/${PKGNAME}/html/lowlevel.html share/doc/${PKGNAME}/html/props.html share/doc/${PKGNAME}/html/ref.html share/doc/${PKGNAME}/html/refalloc.html share/doc/${PKGNAME}/html/refauth.html share/doc/${PKGNAME}/html/refbuf.html share/doc/${PKGNAME}/html/refbufapp.html share/doc/${PKGNAME}/html/refbufcr.html share/doc/${PKGNAME}/html/refbufdest.html share/doc/${PKGNAME}/html/refbufutil.html share/doc/${PKGNAME}/html/refconfig.html share/doc/${PKGNAME}/html/referr.html share/doc/${PKGNAME}/html/refgetst.html share/doc/${PKGNAME}/html/refopts.html share/doc/${PKGNAME}/html/refreq.html share/doc/${PKGNAME}/html/refreqbody.html share/doc/${PKGNAME}/html/refreqhdr.html share/doc/${PKGNAME}/html/refsess.html share/doc/${PKGNAME}/html/refshave.html share/doc/${PKGNAME}/html/refsslca.html share/doc/${PKGNAME}/html/refsslcert.html share/doc/${PKGNAME}/html/refssldname.html share/doc/${PKGNAME}/html/refsslvfy.html share/doc/${PKGNAME}/html/refstatus.html share/doc/${PKGNAME}/html/reftok.html share/doc/${PKGNAME}/html/ssl.html share/doc/${PKGNAME}/html/utils.html share/doc/${PKGNAME}/html/xml.html @@dirrm share/doc/${PKGNAME}/html @@dirrm share/doc/${PKGNAME} @ 1.1 log @Initial revision @ text @d1 6 a6 6 @@comment $NetBSD$ include/neon/ne_request.h include/neon/ne_session.h include/neon/ne_utils.h include/neon/ne_uri.h include/neon/ne_socket.h d8 2 a9 3 include/neon/ne_207.h include/neon/ne_props.h include/neon/ne_xml.h a10 2 include/neon/ne_string.h include/neon/ne_cookies.h d12 1 a13 1 include/neon/ne_alloc.h d15 1 a15 1 include/neon/ne_i18n.h d17 9 a25 5 include/neon/ne_auth.h include/neon/ne_compress.h include/neon/ne_acl.h lib/libneon.so.18.1 lib/libneon.so.18 d27 2 a28 3 lib/libneon.la lib/libneon.a bin/neon-config @ 1.1.1.1 log @Initial import of neon-0.18.3 into the NetBSD Packages Collection. neon is an HTTP and WebDAV client library. It provides lower-level interfaces which directly implement new HTTP methods, and higher-level interfaces so that you don't have to worry about the lower-level stuff. Provided in PR 15222 by "Eric Gillespie, Jr." . The only modification was to use pkgsrc's libtool. @ text @@ 1.1.1.2 log @Add neon-0.21.3: HTTP and WebDAV client library neon is an HTTP and WebDAV client library. It provides lower-level interfaces which directly implement new HTTP methods, and higher-level interfaces so that you don't have to worry about the lower-level stuff. Submitted by Joel Wilsson in PR 17812 @ text @d2 6 a7 1 bin/neon-config d9 4 a12 5 include/neon/ne_acl.h include/neon/ne_alloc.h include/neon/ne_auth.h include/neon/ne_basic.h include/neon/ne_compress.h a13 1 include/neon/ne_dates.h a14 1 include/neon/ne_i18n.h d16 1 d18 1 a18 1 include/neon/ne_props.h d20 7 a26 7 include/neon/ne_request.h include/neon/ne_session.h include/neon/ne_socket.h include/neon/ne_string.h include/neon/ne_uri.h include/neon/ne_utils.h include/neon/ne_xml.h d28 1 a28 104 lib/libneon.la lib/libneon.so lib/libneon.so.21 lib/libneon.so.21.3 man/man1/neon-config.1 man/man3/ne_add_request_header.3 man/man3/ne_buffer.3 man/man3/ne_buffer_altered.3 man/man3/ne_buffer_append.3 man/man3/ne_buffer_clear.3 man/man3/ne_buffer_concat.3 man/man3/ne_buffer_create.3 man/man3/ne_buffer_destroy.3 man/man3/ne_buffer_finish.3 man/man3/ne_buffer_grow.3 man/man3/ne_buffer_ncreate.3 man/man3/ne_buffer_zappend.3 man/man3/ne_calloc.3 man/man3/ne_close_connection.3 man/man3/ne_forget_auth.3 man/man3/ne_get_error.3 man/man3/ne_get_status.3 man/man3/ne_malloc.3 man/man3/ne_oom_callback.3 man/man3/ne_print_request_header.3 man/man3/ne_qtoken.3 man/man3/ne_realloc.3 man/man3/ne_request_create.3 man/man3/ne_request_destroy.3 man/man3/ne_request_dispatch.3 man/man3/ne_session_create.3 man/man3/ne_session_destroy.3 man/man3/ne_session_proxy.3 man/man3/ne_set_error.3 man/man3/ne_set_expect100.3 man/man3/ne_set_persist.3 man/man3/ne_set_proxy_auth.3 man/man3/ne_set_read_timeout.3 man/man3/ne_set_request_body_buffer.3 man/man3/ne_set_request_body_fd.3 man/man3/ne_set_server_auth.3 man/man3/ne_set_useragent.3 man/man3/ne_shave.3 man/man3/ne_ssl_certificate.3 man/man3/ne_ssl_dname.3 man/man3/ne_ssl_load_ca.3 man/man3/ne_ssl_load_default_ca.3 man/man3/ne_ssl_readable_dname.3 man/man3/ne_ssl_set_verify.3 man/man3/ne_status.3 man/man3/ne_strdup.3 man/man3/ne_strndup.3 man/man3/ne_token.3 share/doc/${PKGNAME}/html/apas02.html share/doc/${PKGNAME}/html/apas03.html share/doc/${PKGNAME}/html/apas04.html share/doc/${PKGNAME}/html/apas05.html share/doc/${PKGNAME}/html/apas06.html share/doc/${PKGNAME}/html/apas07.html share/doc/${PKGNAME}/html/apas08.html share/doc/${PKGNAME}/html/apas09.html share/doc/${PKGNAME}/html/apas10.html share/doc/${PKGNAME}/html/apas11.html share/doc/${PKGNAME}/html/apas12.html share/doc/${PKGNAME}/html/auth.html share/doc/${PKGNAME}/html/basic.html share/doc/${PKGNAME}/html/ch01s02.html share/doc/${PKGNAME}/html/ch01s03.html share/doc/${PKGNAME}/html/ch02.html share/doc/${PKGNAME}/html/compliance.html share/doc/${PKGNAME}/html/gfdl.html share/doc/${PKGNAME}/html/index.html share/doc/${PKGNAME}/html/intro.html share/doc/${PKGNAME}/html/locking.html share/doc/${PKGNAME}/html/lowlevel.html share/doc/${PKGNAME}/html/props.html share/doc/${PKGNAME}/html/ref.html share/doc/${PKGNAME}/html/refalloc.html share/doc/${PKGNAME}/html/refauth.html share/doc/${PKGNAME}/html/refbuf.html share/doc/${PKGNAME}/html/refbufapp.html share/doc/${PKGNAME}/html/refbufcr.html share/doc/${PKGNAME}/html/refbufdest.html share/doc/${PKGNAME}/html/refbufutil.html share/doc/${PKGNAME}/html/refconfig.html share/doc/${PKGNAME}/html/referr.html share/doc/${PKGNAME}/html/refgetst.html share/doc/${PKGNAME}/html/refopts.html share/doc/${PKGNAME}/html/refreq.html share/doc/${PKGNAME}/html/refreqbody.html share/doc/${PKGNAME}/html/refreqhdr.html share/doc/${PKGNAME}/html/refsess.html share/doc/${PKGNAME}/html/refshave.html share/doc/${PKGNAME}/html/refsslca.html share/doc/${PKGNAME}/html/refsslcert.html share/doc/${PKGNAME}/html/refssldname.html share/doc/${PKGNAME}/html/refsslvfy.html share/doc/${PKGNAME}/html/refstatus.html share/doc/${PKGNAME}/html/reftok.html share/doc/${PKGNAME}/html/ssl.html share/doc/${PKGNAME}/html/utils.html share/doc/${PKGNAME}/html/xml.html @@dirrm share/doc/${PKGNAME}/html @@dirrm share/doc/${PKGNAME} @