diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..1409e46 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/neon-0.30.0.tar.gz diff --git a/.neon.metadata b/.neon.metadata new file mode 100644 index 0000000..98c5c30 --- /dev/null +++ b/.neon.metadata @@ -0,0 +1 @@ +9e6297945226f90d66258b7ee05f757ff5cea10a SOURCES/neon-0.30.0.tar.gz diff --git a/SOURCES/neon-0.27.0-multilib.patch b/SOURCES/neon-0.27.0-multilib.patch new file mode 100644 index 0000000..5f8f86d --- /dev/null +++ b/SOURCES/neon-0.27.0-multilib.patch @@ -0,0 +1,56 @@ +--- neon-0.27.0/neon-config.in.multilib ++++ neon-0.27.0/neon-config.in +@@ -5,7 +5,11 @@ + prefix=@prefix@ + exec_prefix=@exec_prefix@ + includedir=@includedir@ +-libdir=@libdir@ ++ ++libdir=`pkg-config --variable=libdir neon` ++CFLAGS=`pkg-config --cflags neon` ++LIBS=`pkg-config --libs neon` ++has_lfs=`pkg-config --variable=has_lfs neon` + + usage() + { +@@ -23,7 +27,7 @@ + --support FEATURE exit with success if feature is supported + + Known features: +- dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [@NE_FLAG_LFS@], ++ dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [${has_lfs}], + i18n [@NE_FLAG_I18N@], ts_ssl [@NE_FLAG_TS_SSL@] + + EOF +@@ -69,11 +73,10 @@ + ;; + + --cflags) +- echo -I${includedir}/neon @NEON_CFLAGS@ ++ echo ${CFLAGS} + ;; + + --libs) +- LIBS="-lneon @NEON_LIBS@" + # Don't add standard library paths + if test "$prefix" != "/usr"; then + LIBS="-L${libdir} ${LIBS}" +@@ -93,7 +96,7 @@ + zlib|ZLIB) support @NE_FLAG_ZLIB@ ;; + ipv6|IPV6) support @NE_FLAG_IPV6@ ;; + dav|DAV) support @NE_FLAG_DAV@ ;; +- lfs|LFS) support @NE_FLAG_LFS@ ;; ++ lfs|LFS) support ${has_lfs} ;; + i18n|I18N) support @NE_FLAG_I18N@ ;; + ts_ssl|TS_SSL) support @NE_FLAG_TS_SSL@ ;; + *) support no ;; +--- neon-0.27.0/neon.pc.in.multilib ++++ neon-0.27.0/neon.pc.in +@@ -2,6 +2,7 @@ + exec_prefix=@exec_prefix@ + libdir=@libdir@ + includedir=@includedir@ ++has_lfs=@NE_FLAG_LFS@ + + Name: neon + Description: HTTP/WebDAV client library diff --git a/SOURCES/neon-0.30.0-pkcs11.patch b/SOURCES/neon-0.30.0-pkcs11.patch new file mode 100644 index 0000000..a8d7910 --- /dev/null +++ b/SOURCES/neon-0.30.0-pkcs11.patch @@ -0,0 +1,300 @@ +--- neon-0.30.0/macros/neon.m4.pkcs11 ++++ neon-0.30.0/macros/neon.m4 +@@ -982,10 +982,11 @@ + + # Check for functions in later releases + NE_CHECK_FUNCS([gnutls_session_get_data2 gnutls_x509_dn_get_rdn_ava \ +- gnutls_sign_callback_set \ + gnutls_certificate_get_issuer \ + gnutls_certificate_get_x509_cas \ +- gnutls_x509_crt_sign2]) ++ gnutls_x509_crt_sign2 \ ++ gnutls_certificate_set_retrieve_function2 \ ++ gnutls_privkey_import_ext]) + + # fail if gnutls_x509_crt_sign2 is not found (it was introduced in 1.2.0, which is required) + if test x${ac_cv_func_gnutls_x509_crt_sign2} != xyes; then +@@ -1039,7 +1040,7 @@ + ;; + esac + +-case ${with_pakchois}X${ac_cv_func_gnutls_sign_callback_set}Y${ne_cv_lib_ssl097} in ++case ${with_pakchois}X${ac_cv_func_gnutls_privkey_import_ext}Y${ne_cv_lib_ssl097} in + noX*Y*) ;; + *X*Yyes|*XyesY*) + # PKCS#11... ho! +--- neon-0.30.0/src/ne_gnutls.c.pkcs11 ++++ neon-0.30.0/src/ne_gnutls.c +@@ -89,6 +89,13 @@ + ne_ssl_certificate cert; + gnutls_x509_privkey_t pkey; + char *friendly_name; ++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT ++ /* Signing callback & userdata provided by ne_pkcs11.c. It would ++ * be better to rewrite the whole module to use gnutls_privkey_t ++ * directly, but it seems impossible to dup such an object. */ ++ gnutls_privkey_sign_func sign_func; ++ void *sign_ud; ++#endif + }; + + /* Returns the highest used index in subject (or issuer) DN of +@@ -189,7 +196,7 @@ + char *ne_ssl_readable_dname(const ne_ssl_dname *name) + { + gnutls_x509_dn_t dn; +- int ret, rdn = 0, flag = 0; ++ int ret, rdn = 0; + ne_buffer *buf; + gnutls_x509_ava_st val; + +@@ -227,7 +234,6 @@ + && ((!CMPOID(&val, OID_emailAddress) + && !CMPOID(&val, OID_commonName)) + || (buf->used == 1 && rdn == 0))) { +- flag = 1; + if (buf->used > 1) ne_buffer_append(buf, ", ", 2); + + append_dirstring(buf, &val.value, val.value_tag); +@@ -526,6 +532,10 @@ + + if (cc->keyless) { + newcc->keyless = 1; ++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT ++ newcc->sign_func = cc->sign_func; ++ newcc->sign_ud = cc->sign_ud; ++#endif + } + else { + ret = gnutls_x509_privkey_init(&newcc->pkey); +@@ -554,7 +564,15 @@ + static int provide_client_cert(gnutls_session_t session, + const gnutls_datum_t *req_ca_rdn, int nreqs, + const gnutls_pk_algorithm_t *sign_algos, +- int sign_algos_length, gnutls_retr_st *st) ++ int sign_algos_length, ++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 ++ gnutls_pcert_st **pcert, ++ unsigned int *pcert_length, ++ gnutls_privkey_t *pkey ++#else ++ gnutls_retr2_st *st ++#endif ++ ) + { + ne_session *sess = gnutls_session_get_ptr(session); + +@@ -612,27 +630,58 @@ + if (sess->client_cert) { + gnutls_certificate_type_t type = gnutls_certificate_type_get(session); + if (type == GNUTLS_CRT_X509 +-#if LIBGNUTLS_VERSION_NUMBER > 0x030000 +- /* Ugly hack; prevent segfaults w/GnuTLS 3.0. */ +- && sess->client_cert->pkey != NULL ++ && (sess->client_cert->pkey || sess->client_cert->keyless)) { ++ int ret; ++ ++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 ++ gnutls_privkey_init(pkey); ++ ++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT ++ if (sess->client_cert->sign_func) { ++ int algo = gnutls_x509_crt_get_pk_algorithm(sess->client_cert->cert.subject, NULL); ++ NE_DEBUG(NE_DBG_SSL, "ssl: Signing for %s.\n", gnutls_pk_algorithm_get_name(algo)); ++ ++ ret = gnutls_privkey_import_ext(*pkey, algo, sess->client_cert->sign_ud, ++ sess->client_cert->sign_func, NULL, 0); ++ } ++ else + #endif +- ) { +- NE_DEBUG(NE_DBG_SSL, "Supplying client certificate.\n"); ++ if (sess->client_cert->keyless) { ++ ret = GNUTLS_E_UNSUPPORTED_CERTIFICATE_TYPE; ++ } ++ else { ++ ret = gnutls_privkey_import_x509(*pkey, sess->client_cert->pkey, 0); ++ } + +- st->type = type; ++ if (ret) { ++ NE_DEBUG(NE_DBG_SSL, "ssl: Failed to import private key: %s.\n", gnutls_strerror(ret)); ++ ne_set_error(sess, _("Failed to import private key: %s"), gnutls_strerror(ret)); ++ return ret; ++ } ++ ++ *pcert = gnutls_calloc(1, sizeof **pcert); ++ gnutls_pcert_import_x509(*pcert, sess->client_cert->cert.subject, 0); ++ *pcert_length = 1; ++#else /* !HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 */ ++ st->cert_type = type; + st->ncerts = 1; + st->cert.x509 = &sess->client_cert->cert.subject; + st->key.x509 = sess->client_cert->pkey; + + /* tell GNU TLS not to deallocate the certs. */ + st->deinit_all = 0; ++#endif + } else { + return GNUTLS_E_UNSUPPORTED_CERTIFICATE_TYPE; + } + } + else { +- NE_DEBUG(NE_DBG_SSL, "No client certificate supplied.\n"); ++ NE_DEBUG(NE_DBG_SSL, "ssl: No client certificate supplied.\n"); ++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 ++ *pcert_length = 0; ++#else + st->ncerts = 0; ++#endif + sess->ssl_cc_requested = 1; + return 0; + } +@@ -650,8 +699,12 @@ + ne_ssl_context *ctx = ne_calloc(sizeof *ctx); + gnutls_certificate_allocate_credentials(&ctx->cred); + if (flags == NE_SSL_CTX_CLIENT) { ++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 ++ gnutls_certificate_set_retrieve_function2(ctx->cred, provide_client_cert); ++#else + gnutls_certificate_client_set_retrieve_function(ctx->cred, + provide_client_cert); ++#endif + } + gnutls_certificate_set_verify_flags(ctx->cred, + GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT); +@@ -694,7 +747,11 @@ + { + gnutls_certificate_free_credentials(ctx->cred); + if (ctx->cache.client.data) { ++#if defined(HAVE_GNUTLS_SESSION_GET_DATA2) ++ gnutls_free(ctx->cache.client.data); ++#else + ne_free(ctx->cache.client.data); ++#endif + } else if (ctx->cache.server.key.data) { + gnutls_free(ctx->cache.server.key.data); + gnutls_free(ctx->cache.server.data.data); +@@ -1164,7 +1221,9 @@ + gnutls_x509_crt_t cert = NULL; + gnutls_x509_privkey_t pkey = NULL; + +- data.data = buffer; ++ /* The datum structure is not modified by gnutls_pkcs12_import, ++ * cast safely: */ ++ data.data = (unsigned char *)buffer; + data.size = buflen; + + if (gnutls_pkcs12_init(&p12) != 0) { +@@ -1201,8 +1260,10 @@ + } + } + +-ne_ssl_client_cert *ne__ssl_clicert_exkey_import(const unsigned char *der, +- size_t der_len) ++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT ++ne_ssl_client_cert *ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len, ++ gnutls_privkey_sign_func sign_func, ++ void *userdata) + { + ne_ssl_client_cert *cc; + gnutls_x509_crt_t x5; +@@ -1221,9 +1282,12 @@ + cc->keyless = 1; + cc->decrypted = 1; + populate_cert(&cc->cert, x5); ++ cc->sign_func = sign_func; ++ cc->sign_ud = userdata; + +- return cc; ++ return cc; + } ++#endif + + int ne_ssl_clicert_encrypted(const ne_ssl_client_cert *cc) + { +--- neon-0.30.0/src/ne_pkcs11.c.pkcs11 ++++ neon-0.30.0/src/ne_pkcs11.c +@@ -160,6 +160,13 @@ + } + #endif + ++#ifdef HAVE_GNUTLS ++static int pk11_sign_callback(gnutls_privkey_t pkey, ++ void *userdata, ++ const gnutls_datum_t *raw_data, ++ gnutls_datum_t *signature); ++#endif ++ + static int pk11_find_x509(ne_ssl_pkcs11_provider *prov, + pakchois_session_t *pks, + unsigned char *certid, unsigned long *cid_len) +@@ -207,9 +214,9 @@ + ne_ssl_client_cert *cc; + + #ifdef HAVE_GNUTLS +- cc = ne__ssl_clicert_exkey_import(value, a[0].value_len); ++ cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, pk11_sign_callback, prov); + #else +- cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, pk11_rsa_method(prov)); ++ cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, prov->method); + #endif + if (cc) { + NE_DEBUG(NE_DBG_SSL, "pk11: Imported X.509 cert.\n"); +@@ -302,10 +309,8 @@ + #ifdef HAVE_GNUTLS + /* Callback invoked by GnuTLS to provide the signature. The signature + * operation is handled here by the PKCS#11 provider. */ +-static int pk11_sign_callback(gnutls_session_t session, ++static int pk11_sign_callback(gnutls_privkey_t pkey, + void *userdata, +- gnutls_certificate_type_t cert_type, +- const gnutls_datum_t *cert, + const gnutls_datum_t *hash, + gnutls_datum_t *signature) + { +@@ -575,11 +580,6 @@ + void ne_ssl_set_pkcs11_provider(ne_session *sess, + ne_ssl_pkcs11_provider *provider) + { +-#ifdef HAVE_GNUTLS +- sess->ssl_context->sign_func = pk11_sign_callback; +- sess->ssl_context->sign_data = provider; +-#endif +- + ne_ssl_provide_clicert(sess, pk11_provide, provider); + } + +--- neon-0.30.0/src/ne_privssl.h.pkcs11 ++++ neon-0.30.0/src/ne_privssl.h +@@ -58,6 +58,10 @@ + + #include + ++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT ++#include ++#endif ++ + struct ne_ssl_context_s { + gnutls_certificate_credentials_t cred; + int verify; /* non-zero if client cert verification required */ +@@ -78,17 +82,13 @@ + } client; + #endif + } cache; +- +-#ifdef HAVE_GNUTLS_SIGN_CALLBACK_SET +- gnutls_sign_func sign_func; +- void *sign_data; +-#endif + }; + + typedef gnutls_session_t ne_ssl_socket; + + NE_PRIVATE ne_ssl_client_cert * +-ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len); ++ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len, ++ gnutls_privkey_sign_func sign_func, void *userdata); + + #endif /* HAVE_GNUTLS */ + diff --git a/SPECS/neon.spec b/SPECS/neon.spec new file mode 100644 index 0000000..d8e0956 --- /dev/null +++ b/SPECS/neon.spec @@ -0,0 +1,328 @@ +Summary: An HTTP and WebDAV client library +Name: neon +Version: 0.30.0 +Release: 4%{?dist} +License: LGPLv2+ +Group: System Environment/Libraries +URL: http://www.webdav.org/neon/ +Source0: http://www.webdav.org/neon/neon-%{version}.tar.gz +Patch0: neon-0.27.0-multilib.patch +Patch1: neon-0.30.0-pkcs11.patch +BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) +BuildRequires: expat-devel, gnutls-devel, zlib-devel, krb5-devel, libproxy-devel +BuildRequires: pkgconfig, pakchois-devel, autoconf, automake, libtool +Requires: ca-certificates + +%description +neon is an HTTP and WebDAV client library, with a C interface; +providing a high-level interface to HTTP and WebDAV methods along +with a low-level interface for HTTP request handling. neon +supports persistent connections, proxy servers, basic, digest and +Kerberos authentication, and has complete SSL support. + +%package devel +Summary: Development libraries and C header files for the neon library +Group: Development/Libraries +Requires: neon = %{version}-%{release}, gnutls-devel, zlib-devel, expat-devel +Requires: pkgconfig +# Documentation is GPLv2+ +License: LGPLv2+ and GPLv2+ + +%description devel +The development library for the C language HTTP and WebDAV client library. + +%prep +%setup -q +%patch0 -p1 -b .multilib +%patch1 -p1 -b .pkcs11 + +%build +./autogen.sh +export CC="%{__cc} -pthread" +# Use standard system CA bundle: +%define cabundle %{_sysconfdir}/pki/tls/certs/ca-bundle.crt +%configure --with-expat --enable-shared --disable-static \ + --enable-warnings --with-ca-bundle=%{cabundle} \ + --with-ssl=gnutls --enable-threadsafe-ssl=posix \ + --with-libproxy +make %{?_smp_mflags} + +%install +rm -rf $RPM_BUILD_ROOT +make install DESTDIR=$RPM_BUILD_ROOT INSTALL="install -p" + +sed -ri "/^dependency_libs/{s,-l[^ ']*,,g}" \ + $RPM_BUILD_ROOT%{_libdir}/libneon.la + +%find_lang %{name} + +%clean +rm -rf $RPM_BUILD_ROOT + +%post -p /sbin/ldconfig + +%postun -p /sbin/ldconfig + +%files -f %{name}.lang +%defattr(-,root,root) +%doc AUTHORS BUGS TODO src/COPYING.LIB NEWS README THANKS +%{_libdir}/*.so.* + +%files devel +%defattr(-,root,root) +%{_bindir}/* +%{_includedir}/* +%{_libdir}/pkgconfig/neon.pc +%{_mandir}/man1/* +%{_mandir}/man3/* +%{_libdir}/*.*a +%{_libdir}/*.so + +%changelog +* Fri Mar 22 2019 Joe Orton - 0.30.0-4 +- fix PKCS#11 support (#1482769) + +* Fri Jan 24 2014 Daniel Mach - 0.30.0-3 +- Mass rebuild 2014-01-24 + +* Fri Dec 27 2013 Daniel Mach - 0.30.0-2 +- Mass rebuild 2013-12-27 + +* Wed Jul 31 2013 Joe Orton - 0.30.0-1 +- update to 0.30.0 (#983563, #926212) + +* Mon Mar 18 2013 Joe Orton - 0.29.6-6 +- fix strict-aliasing warning (upstream r1896) + +* Mon Feb 25 2013 Tomáš Mráz - 0.29.6-5 +- fix build with gnutls3 - patch by Bartosz Brachaczek + +* Thu Feb 14 2013 Fedora Release Engineering - 0.29.6-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild + +* Fri Jul 20 2012 Fedora Release Engineering - 0.29.6-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Fri Jan 13 2012 Fedora Release Engineering - 0.29.6-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Tue May 3 2011 Joe Orton - 0.29.6-1 +- update to 0.29.6 +- correct -devel License; drop old Conflicts + +* Tue Feb 08 2011 Fedora Release Engineering - 0.29.5-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Thu Oct 14 2010 Joe Orton - 0.29.5-1 +- update to 0.29.5 + +* Fri Oct 1 2010 Joe Orton - 0.29.4-1 +- update to 0.29.4 + +* Thu Mar 25 2010 Joe Orton - 0.29.3-1 +- update to 0.29.3 + +* Fri Jan 8 2010 Joe Orton - 0.29.2-1 +- update to 0.29.2 + +* Tue Dec 15 2009 Joe Orton - 0.29.1-1 +- update to 0.29.1 + +* Sun Sep 13 2009 Joe Orton 0.29.0-3 +- enable libproxy support + +* Sun Sep 13 2009 Joe Orton 0.29.0-1 +- update to 0.29.0 + +* Wed Aug 19 2009 Joe Orton 0.28.6-1 +- update to 0.28.6 + +* Sat Jul 25 2009 Fedora Release Engineering - 0.28.5-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Thu Jul 9 2009 Joe Orton 0.28.5-1 +- update to 0.28.5 + +* Fri Mar 6 2009 Joe Orton 0.28.4-1 +- update to 0.28.4 + +* Wed Feb 25 2009 Fedora Release Engineering - 0.28.3-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Mon Jan 19 2009 Joe Orton 0.28.3-3 +- use install-p in "make install" (Robert Scheck, #226189) + +* Thu Aug 28 2008 Joe Orton 0.28.3-2 +- update to 0.28.3 + +* Wed Jun 25 2008 Joe Orton 0.28.2-4 +- rebuild for new GnuTLS + +* Mon Jun 2 2008 Joe Orton 0.28.2-3 +- require ca-certificates package + +* Thu Apr 3 2008 Joe Orton 0.28.2-2 +- update to 0.28.2 + +* Wed Apr 2 2008 Joe Orton 0.28.1-3 +- use the OpenSSL CA bundle + +* Mon Mar 10 2008 Joe Orton 0.28.1-2 +- update to 0.28.1 + +* Tue Feb 26 2008 Joe Orton 0.28.0-3 +- rebuild against pakchois + +* Wed Dec 5 2007 Joe Orton 0.27.2-4 +- trim dependency_libs in .la file + +* Tue Dec 4 2007 Joe Orton 0.27.2-3 +- rebuild against GnuTLS +- drop static library + +* Tue Sep 25 2007 Joe Orton 0.27.2-2 +- update to 0.27.2 + +* Thu Sep 20 2007 Joe Orton 0.27.0-3 +- fix Negotiate response verification + +* Thu Aug 30 2007 Joe Orton 0.27.0-2 +- enable OpenSSL thread-safety hooks + +* Wed Aug 22 2007 Joe Orton 0.27.0-1 +- update to 0.27.0 (#243638) + +* Mon Aug 20 2007 Joe Orton 0.25.5-7 +- fix License + +* Mon Feb 5 2007 Joe Orton 0.25.5-6 +- remove trailing dot in -devel Summary +- use standard BuildRoot +- change Group to System Environment/Libraries +- drop Prefix + +* Wed Jul 12 2006 Jesse Keating - 0.25.5-5.1 +- rebuild + +* Thu Jun 1 2006 Joe Orton 0.25.5-5 +- have -devel require pkgconfig (#193355) + +* Wed May 24 2006 Joe Orton 0.25.5-4 +- add multilib fixes for neon-config (#192734) + +* Wed May 17 2006 Joe Orton 0.25.5-3 +- rebuild + +* Mon Feb 27 2006 Joe Orton 0.25.5-2 +- don't trim exported libraries (#182997) + +* Fri Feb 10 2006 Jesse Keating - 0.25.5-1.2 +- bump again for double-long bug on ppc(64) + +* Tue Feb 07 2006 Jesse Keating - 0.25.5-1.1 +- rebuilt for new gcc4.1 snapshot and glibc changes + +* Tue Jan 31 2006 Joe Orton 0.25.5-1 +- update to 0.25.5 + +* Fri Dec 09 2005 Jesse Keating +- rebuilt + +* Wed Dec 7 2005 Joe Orton 0.24.7-10 +- strip unnecessary exports from .la file/neon-config + +* Tue Nov 8 2005 Tomas Mraz 0.24.7-9 +- rebuilt with new openssl + +* Fri Sep 23 2005 Joe Orton 0.24.7-8 +- restore static libs for rpm + +* Mon Sep 19 2005 Joe Orton 0.24.7-7 +- drop static libs, doc/html from devel docdir + +* Wed Mar 2 2005 Joe Orton 0.24.7-6 +- rebuild + +* Thu Feb 10 2005 Joe Orton 0.24.7-5 +- don't define min() in ne_utils.h (Caolan McNamara, #147228) + +* Tue Oct 12 2004 Joe Orton 0.24.7-4 +- update to GSSAPI code from trunk + +* Fri Jul 23 2004 Joe Orton 0.24.7-3 +- rebuild + +* Tue Jul 20 2004 Joe Orton 0.24.7-2.1 +- rebuild + +* Tue Jul 6 2004 Joe Orton 0.24.7-2 +- devel requires neon of same release, expat-devel (#127330) + +* Mon Jul 5 2004 Joe Orton 0.24.7-1 +- update to 0.24.7 + +* Tue Jun 15 2004 Elliot Lee +- rebuilt + +* Wed May 19 2004 Joe Orton 0.24.6-1 +- update to 0.24.6 + +* Wed Apr 14 2004 Joe Orton 0.24.5-2 +- rebuild + +* Wed Apr 14 2004 Joe Orton 0.24.5-1 +- update to 0.24.5 for CVE CAN-2004-0179 fix + +* Thu Mar 25 2004 Joe Orton 0.24.4-4 +- implement the Negotate auth scheme, and only over SSL + +* Tue Mar 02 2004 Elliot Lee +- rebuilt + +* Wed Feb 25 2004 Joe Orton 0.24.4-3 +- use BuildRequires not BuildPrereq, drop autoconf, libtool; + -devel requires {openssl,zlib}-devel (#116744) + +* Fri Feb 13 2004 Elliot Lee 0.24.4-2 +- rebuilt + +* Mon Feb 9 2004 Joe Orton 0.24.4-1 +- update to 0.24.4 + +* Thu Oct 9 2003 Joe Orton 0.24.3-1 +- update to 0.24.3 + +* Wed Sep 24 2003 Joe Orton 0.24.2-1 +- update to 0.24.2 + +* Tue Jul 22 2003 Nalin Dahyabhai 0.23.9-7 +- rebuild + +* Tue Jun 24 2003 Joe Orton 0.23.9-6 +- never print libdir in --libs output + +* Wed Jun 04 2003 Elliot Lee +- rebuilt + +* Tue Jun 3 2003 Joe Orton 0.23.9-4 +- don't regenerate docs; limit conflict with subversion + +* Wed May 28 2003 Jeff Johnson 0.23.9-3 +- build. + +* Sat May 24 2003 Florian La Roche +- add ldconfig to post/postun + +* Tue May 20 2003 Jeff Johnson 0.23.9-2 +- force expat, include neon-config, for subversion build. +- do "make check" (but ignore failure for now) + +* Mon May 19 2003 Jeff Johnson 0.23.9-1 +- upgrade to 0.23.9. +- avoid xmlto breakage generating man pages for now. + +* Mon Nov 11 2002 Jeff Johnson 0.23.5-2 +- avoid subversion-devel until libxml2 vs. expat is resolved. + +* Sat Nov 9 2002 Jeff Johnson 0.23.5-1 +- Create.