diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..8874a5b --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/neon-0.30.2.tar.gz diff --git a/.neon.metadata b/.neon.metadata new file mode 100644 index 0000000..05d05b7 --- /dev/null +++ b/.neon.metadata @@ -0,0 +1 @@ +d1c020f96731135263476ebaa72b2da07c4727cd SOURCES/neon-0.30.2.tar.gz diff --git a/SOURCES/neon-0.27.0-multilib.patch b/SOURCES/neon-0.27.0-multilib.patch new file mode 100644 index 0000000..5f8f86d --- /dev/null +++ b/SOURCES/neon-0.27.0-multilib.patch @@ -0,0 +1,56 @@ +--- neon-0.27.0/neon-config.in.multilib ++++ neon-0.27.0/neon-config.in +@@ -5,7 +5,11 @@ + prefix=@prefix@ + exec_prefix=@exec_prefix@ + includedir=@includedir@ +-libdir=@libdir@ ++ ++libdir=`pkg-config --variable=libdir neon` ++CFLAGS=`pkg-config --cflags neon` ++LIBS=`pkg-config --libs neon` ++has_lfs=`pkg-config --variable=has_lfs neon` + + usage() + { +@@ -23,7 +27,7 @@ + --support FEATURE exit with success if feature is supported + + Known features: +- dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [@NE_FLAG_LFS@], ++ dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [${has_lfs}], + i18n [@NE_FLAG_I18N@], ts_ssl [@NE_FLAG_TS_SSL@] + + EOF +@@ -69,11 +73,10 @@ + ;; + + --cflags) +- echo -I${includedir}/neon @NEON_CFLAGS@ ++ echo ${CFLAGS} + ;; + + --libs) +- LIBS="-lneon @NEON_LIBS@" + # Don't add standard library paths + if test "$prefix" != "/usr"; then + LIBS="-L${libdir} ${LIBS}" +@@ -93,7 +96,7 @@ + zlib|ZLIB) support @NE_FLAG_ZLIB@ ;; + ipv6|IPV6) support @NE_FLAG_IPV6@ ;; + dav|DAV) support @NE_FLAG_DAV@ ;; +- lfs|LFS) support @NE_FLAG_LFS@ ;; ++ lfs|LFS) support ${has_lfs} ;; + i18n|I18N) support @NE_FLAG_I18N@ ;; + ts_ssl|TS_SSL) support @NE_FLAG_TS_SSL@ ;; + *) support no ;; +--- neon-0.27.0/neon.pc.in.multilib ++++ neon-0.27.0/neon.pc.in +@@ -2,6 +2,7 @@ + exec_prefix=@exec_prefix@ + libdir=@libdir@ + includedir=@includedir@ ++has_lfs=@NE_FLAG_LFS@ + + Name: neon + Description: HTTP/WebDAV client library diff --git a/SOURCES/neon-0.30.2-warnings.patch b/SOURCES/neon-0.30.2-warnings.patch new file mode 100644 index 0000000..2823b6f --- /dev/null +++ b/SOURCES/neon-0.30.2-warnings.patch @@ -0,0 +1,284 @@ +--- test/request.c (.../tags/0.30.2) (revision 2045) ++++ test/request.c (.../branches/0.30.x) (revision 2045) +@@ -902,8 +902,6 @@ + ONREQ(ne_request_dispatch(req)); + + while ((cursor = ne_response_header_iterate(req, cursor, &name, &value))) { +- n = -1; +- + ONV(strncmp(name, "x-", 2) || strncmp(value, "Y-", 2) + || strcmp(name + 2, value + 2) + || (n = atoi(name + 2)) >= MANY_HEADERS +@@ -2358,6 +2356,21 @@ + return await_server(); + } + ++static int safe_flags(void) ++{ ++ ne_session *sess = ne_session_create("http", "localhost", 80); ++ ne_request *req = ne_request_create(sess, "GET", "/"); ++ ++ ne_set_request_flag(req, NE_REQFLAG_LAST, 0xAAAAAAAA); ++ ++ ONN("flags array bound check failed", ne_get_session(req) != sess); ++ ++ ne_request_destroy(req); ++ ne_session_destroy(sess); ++ ++ return OK; ++} ++ + /* TODO: test that ne_set_notifier(, NULL, NULL) DTRT too. */ + + ne_test tests[] = { +@@ -2451,5 +2464,6 @@ + T(socks_fail), + T(fail_lookup), + T(fail_double_lookup), ++ T(safe_flags), + T(NULL) + }; +--- test/lock.c (.../tags/0.30.2) (revision 2045) ++++ test/lock.c (.../branches/0.30.x) (revision 2045) +@@ -73,11 +73,13 @@ + const char *token_href) + { + static char buf[BUFSIZ]; +- sprintf(buf, +- "\n" +- "" +- "%s\n", +- activelock(scope, depth, owner, timeout, token_href)); ++ ++ ne_snprintf(buf, sizeof buf, ++ "\n" ++ "" ++ "%s\n", ++ activelock(scope, depth, owner, timeout, token_href)); ++ + return buf; + } + +--- test/string-tests.c (.../tags/0.30.2) (revision 2045) ++++ test/string-tests.c (.../branches/0.30.x) (revision 2045) +@@ -320,7 +320,7 @@ + { + char expect[200], actual[200]; + +- strncpy(expect, strerror(ENOENT), sizeof(expect)); ++ strncpy(expect, strerror(ENOENT), sizeof(expect)-1); + ONN("ne_strerror did not return passed-in buffer", + ne_strerror(ENOENT, actual, sizeof(actual)) != actual); + +--- test/util-tests.c (.../tags/0.30.2) (revision 2045) ++++ test/util-tests.c (.../branches/0.30.x) (revision 2045) +@@ -203,18 +203,24 @@ + return OK; + } + +-/* trigger segfaults in ne_rfc1036_parse() in <=0.24.5. */ +-static int regress_dates(void) ++#define BAD_DATE(format, result) \ ++ ONN(format " date parse must fail", result != -1) ++ ++/* Test for bad dates; trigger segfaults in ne_rfc1036_parse() in ++ * <=0.24.5. */ ++static int bad_dates(void) + { + static const char *dates[] = { +- "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" ++ "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", ++ "Friday, 08-Jun-01", + }; + size_t n; + + for (n = 0; n < sizeof(dates)/sizeof(dates[0]); n++) { +- ne_rfc1036_parse(dates[n]); +- ne_iso8601_parse(dates[n]); +- ne_rfc1123_parse(dates[n]); ++ BAD_DATE("rfc1036", ne_rfc1036_parse(dates[n])); ++ BAD_DATE("iso8601", ne_iso8601_parse(dates[n])); ++ BAD_DATE("rfc1123", ne_rfc1123_parse(dates[n])); ++ BAD_DATE("asctime", ne_asctime_parse(dates[n])); + } + + return OK; +@@ -303,7 +309,7 @@ + T(md5), + T(md5_alignment), + T(parse_dates), +- T(regress_dates), ++ T(bad_dates), + T(versioning), + T(version_string), + T(support), +--- src/ne_dates.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_dates.c (.../branches/0.30.x) (revision 2045) +@@ -171,11 +171,12 @@ + int n; + time_t result; + +-/* it goes: Sun, 06 Nov 1994 08:49:37 GMT */ +- n = sscanf(date, RFC1123_FORMAT, +- wkday, &gmt.tm_mday, mon, &gmt.tm_year, &gmt.tm_hour, +- &gmt.tm_min, &gmt.tm_sec); +- /* Is it portable to check n==7 here? */ ++ /* it goes: Sun, 06 Nov 1994 08:49:37 GMT */ ++ if (sscanf(date, RFC1123_FORMAT, ++ wkday, &gmt.tm_mday, mon, &gmt.tm_year, &gmt.tm_hour, ++ &gmt.tm_min, &gmt.tm_sec) != 7) ++ return (time_t) -1; ++ + gmt.tm_year -= 1900; + for (n=0; n<12; n++) + if (strcmp(mon, short_months[n]) == 0) +@@ -204,7 +205,6 @@ + return (time_t)-1; + } + +- /* portable to check n here? */ + for (n=0; n<12; n++) + if (strcmp(mon, short_months[n]) == 0) + break; +@@ -232,11 +232,12 @@ + char wkday[4], mon[4]; + time_t result; + +- n = sscanf(date, ASCTIME_FORMAT, +- wkday, mon, &gmt.tm_mday, +- &gmt.tm_hour, &gmt.tm_min, &gmt.tm_sec, +- &gmt.tm_year); +- /* portable to check n here? */ ++ if (sscanf(date, ASCTIME_FORMAT, ++ wkday, mon, &gmt.tm_mday, ++ &gmt.tm_hour, &gmt.tm_min, &gmt.tm_sec, ++ &gmt.tm_year) != 7) ++ return (time_t)-1; ++ + for (n=0; n<12; n++) + if (strcmp(mon, short_months[n]) == 0) + break; +--- src/ne_locks.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_locks.c (.../branches/0.30.x) (revision 2045) +@@ -32,6 +32,7 @@ + #ifdef HAVE_LIMITS_H + #include + #endif ++#include + + #include /* for isdigit() */ + +@@ -332,6 +333,9 @@ + for (item = store->locks; item != NULL; item = item->next) + if (item->lock == lock) + break; ++ ++ /* API condition that lock is present in the store. */ ++ assert(item); + + if (item->prev != NULL) { + item->prev->next = item->next; +--- src/ne_session.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_session.c (.../branches/0.30.x) (revision 2045) +@@ -569,7 +569,8 @@ + }; + int n, flag = 0; + +- strcpy(sess->error, _("Server certificate verification failed: ")); ++ ne_strnzcpy(sess->error, _("Server certificate verification failed: "), ++ sizeof sess->error); + + for (n = 0; reasons[n].bit; n++) { + if (failures & reasons[n].bit) { +--- src/ne_xml.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_xml.c (.../branches/0.30.x) (revision 2045) +@@ -576,7 +576,7 @@ + if (p->bom_pos == 0) { + p->bom_pos = 3; /* no BOM */ + } else if (p->bom_pos > 0 && p->bom_pos < 3) { +- strcpy(p->error, _("Invalid Byte Order Mark")); ++ ne_strnzcpy(p->error, _("Invalid Byte Order Mark"), sizeof p->error); + return p->failure = 1; + } + } +--- src/ne_request.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_request.c (.../branches/0.30.x) (revision 2045) +@@ -329,7 +329,7 @@ + /* errno was set */ + ne_strerror(errno, err, sizeof err); + } else { +- strcpy(err, _("offset invalid")); ++ ne_strnzcpy(err, _("offset invalid"), sizeof err); + } + ne_snprintf(offstr, sizeof offstr, "%" FMT_NE_OFF_T, + req->body.file.offset); +@@ -585,7 +585,7 @@ + + void ne_set_request_flag(ne_request *req, ne_request_flag flag, int value) + { +- if (flag < (ne_request_flag)NE_SESSFLAG_LAST) { ++ if (flag < (ne_request_flag)NE_REQFLAG_LAST) { + req->flags[flag] = value; + } + } +--- src/ne_socket.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_socket.c (.../branches/0.30.x) (revision 2045) +@@ -27,7 +27,7 @@ + #include "config.h" + + #include +-#ifdef HAVE_SYS_UIO_h ++#ifdef HAVE_SYS_UIO_H + #include /* writev(2) */ + #endif + #ifdef HAVE_SYS_TIME_H +--- src/ne_openssl.c (.../tags/0.30.2) (revision 2045) ++++ src/ne_openssl.c (.../branches/0.30.x) (revision 2045) +@@ -1130,7 +1130,10 @@ + return 0; + } + +-#ifdef NE_HAVE_TS_SSL ++#if defined(NE_HAVE_TS_SSL) && OPENSSL_VERSION_NUMBER < 0x10101000L ++/* For OpenSSL 1.1.1 locking callbacks are no longer need at all. */ ++#define WITH_OPENSSL_LOCKING (1) ++ + /* Implementation of locking callbacks to make OpenSSL thread-safe. + * If the OpenSSL API was better designed, this wouldn't be necessary. + * In OpenSSL releases without CRYPTO_set_idptr_callback, it's not +@@ -1184,8 +1187,6 @@ + } + } + +-#endif +- + /* ID_CALLBACK_IS_{NEON,OTHER} evaluate as true if the currently + * registered OpenSSL ID callback is the neon function (_NEON), or has + * been overwritten by some other app (_OTHER). */ +@@ -1196,6 +1197,8 @@ + #define ID_CALLBACK_IS_OTHER (CRYPTO_get_id_callback() != NULL) + #define ID_CALLBACK_IS_NEON (CRYPTO_get_id_callback() == thread_id_neon) + #endif ++ ++#endif /* NE_HAVE_TS_SSL && OPENSSL_VERSION_NUMBER < 1.1.1 */ + + int ne__ssl_init(void) + { +@@ -1205,7 +1208,7 @@ + SSL_library_init(); + OpenSSL_add_all_algorithms(); + +-#ifdef NE_HAVE_TS_SSL ++#ifdef WITH_OPENSSL_LOCKING + /* If some other library has already come along and set up the + * thread-safety callbacks, then it must be presumed that the + * other library will have a longer lifetime in the process than +@@ -1252,7 +1255,7 @@ + /* Cannot call ERR_free_strings() etc here in case any other code + * in the process using OpenSSL. */ + +-#ifdef NE_HAVE_TS_SSL ++#ifdef WITH_OPENSSL_LOCKING + /* Only unregister the callbacks if some *other* library has not + * come along in the mean-time and trampled over the callbacks + * installed by neon. */ diff --git a/SPECS/neon.spec b/SPECS/neon.spec new file mode 100644 index 0000000..eddd3db --- /dev/null +++ b/SPECS/neon.spec @@ -0,0 +1,354 @@ +Summary: An HTTP and WebDAV client library +Name: neon +Version: 0.30.2 +Release: 6%{?dist} +License: LGPLv2+ +Group: System Environment/Libraries +URL: http://www.webdav.org/neon/ +Source0: http://www.webdav.org/neon/neon-%{version}.tar.gz +Patch0: neon-0.27.0-multilib.patch +Patch1: neon-0.30.2-warnings.patch +BuildRequires: expat-devel, openssl-devel, zlib-devel, krb5-devel, libproxy-devel +BuildRequires: pkgconfig, pakchois-devel, gcc +Requires: ca-certificates + +%description +neon is an HTTP and WebDAV client library, with a C interface; +providing a high-level interface to HTTP and WebDAV methods along +with a low-level interface for HTTP request handling. neon +supports persistent connections, proxy servers, basic, digest and +Kerberos authentication, and has complete SSL support. + +%package devel +Summary: Development libraries and C header files for the neon library +Group: Development/Libraries +Requires: neon = %{version}-%{release}, openssl-devel, zlib-devel, expat-devel +Requires: pkgconfig +# Documentation is GPLv2+ +License: LGPLv2+ and GPLv2+ + +%description devel +The development library for the C language HTTP and WebDAV client library. + +%prep +%setup -q +%patch0 -p1 -b .multilib +%patch1 -p0 -b .warnings + +# prevent installation of HTML docs +sed -ibak '/^install-docs/s/install-html//' Makefile.in + +%build +export CC="%{__cc} -pthread" +%configure --with-expat --enable-shared --disable-static \ + --enable-warnings \ + --with-ssl=openssl --enable-threadsafe-ssl=posix \ + --with-libproxy +make %{?_smp_mflags} + +%install +rm -rf $RPM_BUILD_ROOT +make install DESTDIR=$RPM_BUILD_ROOT INSTALL="install -p" + +sed -ri "/^dependency_libs/{s,-l[^ ']*,,g}" \ + $RPM_BUILD_ROOT%{_libdir}/libneon.la + +%find_lang %{name} + +%post -p /sbin/ldconfig + +%postun -p /sbin/ldconfig + +%files -f %{name}.lang +%defattr(-,root,root) +%doc AUTHORS BUGS TODO src/COPYING.LIB NEWS README THANKS +%{_libdir}/*.so.* + +%files devel +%defattr(-,root,root) +%{_bindir}/* +%{_includedir}/* +%{_libdir}/pkgconfig/neon.pc +%{_mandir}/man1/* +%{_mandir}/man3/* +%{_libdir}/*.*a +%{_libdir}/*.so + +%changelog +* Tue Dec 11 2018 Joe Orton - 0.30.2-6 +- fix covscan warnings (#1602627) + +* Thu Feb 08 2018 Fedora Release Engineering - 0.30.2-5 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild + +* Thu Aug 03 2017 Fedora Release Engineering - 0.30.2-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild + +* Wed Jul 26 2017 Fedora Release Engineering - 0.30.2-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild + +* Fri Feb 10 2017 Fedora Release Engineering - 0.30.2-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild + +* Fri Sep 30 2016 Joe Orton - 0.30.2-1 +- update to 0.30.2 + +* Thu Feb 04 2016 Fedora Release Engineering - 0.30.1-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild + +* Wed Jun 17 2015 Fedora Release Engineering - 0.30.1-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild + +* Tue Sep 23 2014 Joe Orton - 0.30.1-2 +- switch to OpenSSL + +* Tue Sep 23 2014 Joe Orton - 0.30.1-1 +- update to 0.30.1 + +* Sun Aug 17 2014 Fedora Release Engineering - 0.30.0-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild + +* Sat Jun 07 2014 Fedora Release Engineering - 0.30.0-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild + +* Wed Jul 31 2013 Joe Orton - 0.30.0-2 +- prevent installation of HTML docs + +* Wed Jul 31 2013 Joe Orton - 0.30.0-1 +- update to 0.30.0 (#983563, #926212) + +* Mon Mar 18 2013 Joe Orton - 0.29.6-6 +- fix strict-aliasing warning (upstream r1896) + +* Mon Feb 25 2013 Tomáš Mráz - 0.29.6-5 +- fix build with gnutls3 - patch by Bartosz Brachaczek + +* Thu Feb 14 2013 Fedora Release Engineering - 0.29.6-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild + +* Fri Jul 20 2012 Fedora Release Engineering - 0.29.6-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Fri Jan 13 2012 Fedora Release Engineering - 0.29.6-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Tue May 3 2011 Joe Orton - 0.29.6-1 +- update to 0.29.6 +- correct -devel License; drop old Conflicts + +* Tue Feb 08 2011 Fedora Release Engineering - 0.29.5-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Thu Oct 14 2010 Joe Orton - 0.29.5-1 +- update to 0.29.5 + +* Fri Oct 1 2010 Joe Orton - 0.29.4-1 +- update to 0.29.4 + +* Thu Mar 25 2010 Joe Orton - 0.29.3-1 +- update to 0.29.3 + +* Fri Jan 8 2010 Joe Orton - 0.29.2-1 +- update to 0.29.2 + +* Tue Dec 15 2009 Joe Orton - 0.29.1-1 +- update to 0.29.1 + +* Sun Sep 13 2009 Joe Orton 0.29.0-3 +- enable libproxy support + +* Sun Sep 13 2009 Joe Orton 0.29.0-1 +- update to 0.29.0 + +* Wed Aug 19 2009 Joe Orton 0.28.6-1 +- update to 0.28.6 + +* Sat Jul 25 2009 Fedora Release Engineering - 0.28.5-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Thu Jul 9 2009 Joe Orton 0.28.5-1 +- update to 0.28.5 + +* Fri Mar 6 2009 Joe Orton 0.28.4-1 +- update to 0.28.4 + +* Wed Feb 25 2009 Fedora Release Engineering - 0.28.3-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Mon Jan 19 2009 Joe Orton 0.28.3-3 +- use install-p in "make install" (Robert Scheck, #226189) + +* Thu Aug 28 2008 Joe Orton 0.28.3-2 +- update to 0.28.3 + +* Wed Jun 25 2008 Joe Orton 0.28.2-4 +- rebuild for new GnuTLS + +* Mon Jun 2 2008 Joe Orton 0.28.2-3 +- require ca-certificates package + +* Thu Apr 3 2008 Joe Orton 0.28.2-2 +- update to 0.28.2 + +* Wed Apr 2 2008 Joe Orton 0.28.1-3 +- use the OpenSSL CA bundle + +* Mon Mar 10 2008 Joe Orton 0.28.1-2 +- update to 0.28.1 + +* Tue Feb 26 2008 Joe Orton 0.28.0-3 +- rebuild against pakchois + +* Wed Dec 5 2007 Joe Orton 0.27.2-4 +- trim dependency_libs in .la file + +* Tue Dec 4 2007 Joe Orton 0.27.2-3 +- rebuild against GnuTLS +- drop static library + +* Tue Sep 25 2007 Joe Orton 0.27.2-2 +- update to 0.27.2 + +* Thu Sep 20 2007 Joe Orton 0.27.0-3 +- fix Negotiate response verification + +* Thu Aug 30 2007 Joe Orton 0.27.0-2 +- enable OpenSSL thread-safety hooks + +* Wed Aug 22 2007 Joe Orton 0.27.0-1 +- update to 0.27.0 (#243638) + +* Mon Aug 20 2007 Joe Orton 0.25.5-7 +- fix License + +* Mon Feb 5 2007 Joe Orton 0.25.5-6 +- remove trailing dot in -devel Summary +- use standard BuildRoot +- change Group to System Environment/Libraries +- drop Prefix + +* Wed Jul 12 2006 Jesse Keating - 0.25.5-5.1 +- rebuild + +* Thu Jun 1 2006 Joe Orton 0.25.5-5 +- have -devel require pkgconfig (#193355) + +* Wed May 24 2006 Joe Orton 0.25.5-4 +- add multilib fixes for neon-config (#192734) + +* Wed May 17 2006 Joe Orton 0.25.5-3 +- rebuild + +* Mon Feb 27 2006 Joe Orton 0.25.5-2 +- don't trim exported libraries (#182997) + +* Fri Feb 10 2006 Jesse Keating - 0.25.5-1.2 +- bump again for double-long bug on ppc(64) + +* Tue Feb 07 2006 Jesse Keating - 0.25.5-1.1 +- rebuilt for new gcc4.1 snapshot and glibc changes + +* Tue Jan 31 2006 Joe Orton 0.25.5-1 +- update to 0.25.5 + +* Fri Dec 09 2005 Jesse Keating +- rebuilt + +* Wed Dec 7 2005 Joe Orton 0.24.7-10 +- strip unnecessary exports from .la file/neon-config + +* Tue Nov 8 2005 Tomas Mraz 0.24.7-9 +- rebuilt with new openssl + +* Fri Sep 23 2005 Joe Orton 0.24.7-8 +- restore static libs for rpm + +* Mon Sep 19 2005 Joe Orton 0.24.7-7 +- drop static libs, doc/html from devel docdir + +* Wed Mar 2 2005 Joe Orton 0.24.7-6 +- rebuild + +* Thu Feb 10 2005 Joe Orton 0.24.7-5 +- don't define min() in ne_utils.h (Caolan McNamara, #147228) + +* Tue Oct 12 2004 Joe Orton 0.24.7-4 +- update to GSSAPI code from trunk + +* Fri Jul 23 2004 Joe Orton 0.24.7-3 +- rebuild + +* Tue Jul 20 2004 Joe Orton 0.24.7-2.1 +- rebuild + +* Tue Jul 6 2004 Joe Orton 0.24.7-2 +- devel requires neon of same release, expat-devel (#127330) + +* Mon Jul 5 2004 Joe Orton 0.24.7-1 +- update to 0.24.7 + +* Tue Jun 15 2004 Elliot Lee +- rebuilt + +* Wed May 19 2004 Joe Orton 0.24.6-1 +- update to 0.24.6 + +* Wed Apr 14 2004 Joe Orton 0.24.5-2 +- rebuild + +* Wed Apr 14 2004 Joe Orton 0.24.5-1 +- update to 0.24.5 for CVE CAN-2004-0179 fix + +* Thu Mar 25 2004 Joe Orton 0.24.4-4 +- implement the Negotate auth scheme, and only over SSL + +* Tue Mar 02 2004 Elliot Lee +- rebuilt + +* Wed Feb 25 2004 Joe Orton 0.24.4-3 +- use BuildRequires not BuildPrereq, drop autoconf, libtool; + -devel requires {openssl,zlib}-devel (#116744) + +* Fri Feb 13 2004 Elliot Lee 0.24.4-2 +- rebuilt + +* Mon Feb 9 2004 Joe Orton 0.24.4-1 +- update to 0.24.4 + +* Thu Oct 9 2003 Joe Orton 0.24.3-1 +- update to 0.24.3 + +* Wed Sep 24 2003 Joe Orton 0.24.2-1 +- update to 0.24.2 + +* Tue Jul 22 2003 Nalin Dahyabhai 0.23.9-7 +- rebuild + +* Tue Jun 24 2003 Joe Orton 0.23.9-6 +- never print libdir in --libs output + +* Wed Jun 04 2003 Elliot Lee +- rebuilt + +* Tue Jun 3 2003 Joe Orton 0.23.9-4 +- don't regenerate docs; limit conflict with subversion + +* Wed May 28 2003 Jeff Johnson 0.23.9-3 +- build. + +* Sat May 24 2003 Florian La Roche +- add ldconfig to post/postun + +* Tue May 20 2003 Jeff Johnson 0.23.9-2 +- force expat, include neon-config, for subversion build. +- do "make check" (but ignore failure for now) + +* Mon May 19 2003 Jeff Johnson 0.23.9-1 +- upgrade to 0.23.9. +- avoid xmlto breakage generating man pages for now. + +* Mon Nov 11 2002 Jeff Johnson 0.23.5-2 +- avoid subversion-devel until libxml2 vs. expat is resolved. + +* Sat Nov 9 2002 Jeff Johnson 0.23.5-1 +- Create.