diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..1409e46
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1 @@
+SOURCES/neon-0.30.0.tar.gz
diff --git a/.neon.metadata b/.neon.metadata
new file mode 100644
index 0000000..98c5c30
--- /dev/null
+++ b/.neon.metadata
@@ -0,0 +1 @@
+9e6297945226f90d66258b7ee05f757ff5cea10a SOURCES/neon-0.30.0.tar.gz
diff --git a/SOURCES/neon-0.27.0-multilib.patch b/SOURCES/neon-0.27.0-multilib.patch
new file mode 100644
index 0000000..5f8f86d
--- /dev/null
+++ b/SOURCES/neon-0.27.0-multilib.patch
@@ -0,0 +1,56 @@
+--- neon-0.27.0/neon-config.in.multilib
++++ neon-0.27.0/neon-config.in
+@@ -5,7 +5,11 @@
+ prefix=@prefix@
+ exec_prefix=@exec_prefix@
+ includedir=@includedir@
+-libdir=@libdir@
++
++libdir=`pkg-config --variable=libdir neon`
++CFLAGS=`pkg-config --cflags neon`
++LIBS=`pkg-config --libs neon`
++has_lfs=`pkg-config --variable=has_lfs neon`
+ 
+ usage()
+ {
+@@ -23,7 +27,7 @@
+   --support FEATURE     exit with success if feature is supported
+ 
+  Known features: 
+-    dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [@NE_FLAG_LFS@],
++    dav [@NE_FLAG_DAV@], ssl [@NE_FLAG_SSL@], zlib [@NE_FLAG_ZLIB@], ipv6 [@NE_FLAG_IPV6@], lfs [${has_lfs}],
+     i18n [@NE_FLAG_I18N@], ts_ssl [@NE_FLAG_TS_SSL@]
+ 
+ EOF
+@@ -69,11 +73,10 @@
+ 	;;
+ 
+     --cflags)
+-       	echo -I${includedir}/neon @NEON_CFLAGS@
++       	echo ${CFLAGS}
+        	;;
+ 
+     --libs)
+-        LIBS="-lneon @NEON_LIBS@"
+ 	# Don't add standard library paths
+         if test "$prefix" != "/usr"; then
+            LIBS="-L${libdir} ${LIBS}"
+@@ -93,7 +96,7 @@
+ 	zlib|ZLIB) support @NE_FLAG_ZLIB@ ;;
+ 	ipv6|IPV6) support @NE_FLAG_IPV6@ ;;
+ 	dav|DAV) support @NE_FLAG_DAV@ ;;
+-	lfs|LFS) support @NE_FLAG_LFS@ ;;
++	lfs|LFS) support ${has_lfs} ;;
+ 	i18n|I18N) support @NE_FLAG_I18N@ ;;
+ 	ts_ssl|TS_SSL) support @NE_FLAG_TS_SSL@ ;;
+ 	*) support no ;;
+--- neon-0.27.0/neon.pc.in.multilib
++++ neon-0.27.0/neon.pc.in
+@@ -2,6 +2,7 @@
+ exec_prefix=@exec_prefix@
+ libdir=@libdir@
+ includedir=@includedir@
++has_lfs=@NE_FLAG_LFS@
+ 
+ Name: neon
+ Description: HTTP/WebDAV client library
diff --git a/SOURCES/neon-0.30.0-pkcs11.patch b/SOURCES/neon-0.30.0-pkcs11.patch
new file mode 100644
index 0000000..a8d7910
--- /dev/null
+++ b/SOURCES/neon-0.30.0-pkcs11.patch
@@ -0,0 +1,300 @@
+--- neon-0.30.0/macros/neon.m4.pkcs11
++++ neon-0.30.0/macros/neon.m4
+@@ -982,10 +982,11 @@
+ 
+    # Check for functions in later releases
+    NE_CHECK_FUNCS([gnutls_session_get_data2 gnutls_x509_dn_get_rdn_ava \
+-                  gnutls_sign_callback_set \
+                   gnutls_certificate_get_issuer \
+                   gnutls_certificate_get_x509_cas \
+-                  gnutls_x509_crt_sign2])
++                  gnutls_x509_crt_sign2 \
++                  gnutls_certificate_set_retrieve_function2 \
++                  gnutls_privkey_import_ext])
+ 
+    # fail if gnutls_x509_crt_sign2 is not found (it was introduced in 1.2.0, which is required)
+    if test x${ac_cv_func_gnutls_x509_crt_sign2} != xyes; then
+@@ -1039,7 +1040,7 @@
+   ;;
+ esac
+ 
+-case ${with_pakchois}X${ac_cv_func_gnutls_sign_callback_set}Y${ne_cv_lib_ssl097} in
++case ${with_pakchois}X${ac_cv_func_gnutls_privkey_import_ext}Y${ne_cv_lib_ssl097} in
+ noX*Y*) ;;
+ *X*Yyes|*XyesY*)
+     # PKCS#11... ho!
+--- neon-0.30.0/src/ne_gnutls.c.pkcs11
++++ neon-0.30.0/src/ne_gnutls.c
+@@ -89,6 +89,13 @@
+     ne_ssl_certificate cert;
+     gnutls_x509_privkey_t pkey;
+     char *friendly_name;
++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT
++    /* Signing callback & userdata provided by ne_pkcs11.c.  It would
++     * be better to rewrite the whole module to use gnutls_privkey_t
++     * directly, but it seems impossible to dup such an object. */
++    gnutls_privkey_sign_func sign_func;
++    void *sign_ud;
++#endif
+ };
+ 
+ /* Returns the highest used index in subject (or issuer) DN of
+@@ -189,7 +196,7 @@
+ char *ne_ssl_readable_dname(const ne_ssl_dname *name)
+ {
+     gnutls_x509_dn_t dn;
+-    int ret, rdn = 0, flag = 0;
++    int ret, rdn = 0;
+     ne_buffer *buf;
+     gnutls_x509_ava_st val;
+ 
+@@ -227,7 +234,6 @@
+                 && ((!CMPOID(&val, OID_emailAddress)
+                      && !CMPOID(&val, OID_commonName))
+                     || (buf->used == 1 && rdn == 0))) {
+-                flag = 1;
+                 if (buf->used > 1) ne_buffer_append(buf, ", ", 2);
+ 
+                 append_dirstring(buf, &val.value, val.value_tag);
+@@ -526,6 +532,10 @@
+     
+     if (cc->keyless) {
+         newcc->keyless = 1;
++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT
++        newcc->sign_func = cc->sign_func;
++        newcc->sign_ud = cc->sign_ud;
++#endif
+     }
+     else {
+         ret = gnutls_x509_privkey_init(&newcc->pkey);
+@@ -554,7 +564,15 @@
+ static int provide_client_cert(gnutls_session_t session,
+                                const gnutls_datum_t *req_ca_rdn, int nreqs,
+                                const gnutls_pk_algorithm_t *sign_algos,
+-                               int sign_algos_length, gnutls_retr_st *st)
++                               int sign_algos_length, 
++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2
++                               gnutls_pcert_st **pcert, 
++                               unsigned int *pcert_length, 
++                               gnutls_privkey_t *pkey
++#else
++                               gnutls_retr2_st *st
++#endif
++    )
+ {
+     ne_session *sess = gnutls_session_get_ptr(session);
+     
+@@ -612,27 +630,58 @@
+     if (sess->client_cert) {
+         gnutls_certificate_type_t type = gnutls_certificate_type_get(session);
+         if (type == GNUTLS_CRT_X509
+-#if LIBGNUTLS_VERSION_NUMBER > 0x030000
+-            /* Ugly hack; prevent segfaults w/GnuTLS 3.0. */
+-            && sess->client_cert->pkey != NULL
++            && (sess->client_cert->pkey || sess->client_cert->keyless)) {
++            int ret;
++
++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2
++            gnutls_privkey_init(pkey);
++
++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT
++            if (sess->client_cert->sign_func) {
++                int algo = gnutls_x509_crt_get_pk_algorithm(sess->client_cert->cert.subject, NULL);
++                NE_DEBUG(NE_DBG_SSL, "ssl: Signing for %s.\n", gnutls_pk_algorithm_get_name(algo));
++                         
++                ret = gnutls_privkey_import_ext(*pkey, algo, sess->client_cert->sign_ud,
++                                                sess->client_cert->sign_func, NULL, 0);
++            }
++            else
+ #endif
+-            ) {
+-            NE_DEBUG(NE_DBG_SSL, "Supplying client certificate.\n");
++            if (sess->client_cert->keyless) {
++                ret = GNUTLS_E_UNSUPPORTED_CERTIFICATE_TYPE;
++            }
++            else {
++                ret = gnutls_privkey_import_x509(*pkey, sess->client_cert->pkey, 0);
++            }
+ 
+-            st->type = type;
++            if (ret) {
++                NE_DEBUG(NE_DBG_SSL, "ssl: Failed to import private key: %s.\n", gnutls_strerror(ret));
++                ne_set_error(sess, _("Failed to import private key: %s"), gnutls_strerror(ret));
++                return ret;
++            }
++            
++            *pcert = gnutls_calloc(1, sizeof **pcert);
++            gnutls_pcert_import_x509(*pcert, sess->client_cert->cert.subject, 0);
++            *pcert_length = 1;
++#else /* !HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2 */
++            st->cert_type = type;
+             st->ncerts = 1;
+             st->cert.x509 = &sess->client_cert->cert.subject;
+             st->key.x509 = sess->client_cert->pkey;
+             
+             /* tell GNU TLS not to deallocate the certs. */
+             st->deinit_all = 0;
++#endif
+         } else {
+             return GNUTLS_E_UNSUPPORTED_CERTIFICATE_TYPE;
+         }
+     } 
+     else {
+-        NE_DEBUG(NE_DBG_SSL, "No client certificate supplied.\n");
++        NE_DEBUG(NE_DBG_SSL, "ssl: No client certificate supplied.\n");
++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2
++        *pcert_length = 0;
++#else        
+         st->ncerts = 0;
++#endif
+         sess->ssl_cc_requested = 1;
+         return 0;
+     }
+@@ -650,8 +699,12 @@
+     ne_ssl_context *ctx = ne_calloc(sizeof *ctx);
+     gnutls_certificate_allocate_credentials(&ctx->cred);
+     if (flags == NE_SSL_CTX_CLIENT) {
++#ifdef HAVE_GNUTLS_CERTIFICATE_SET_RETRIEVE_FUNCTION2
++        gnutls_certificate_set_retrieve_function2(ctx->cred, provide_client_cert);
++#else
+         gnutls_certificate_client_set_retrieve_function(ctx->cred,
+                                                         provide_client_cert);
++#endif
+     }
+     gnutls_certificate_set_verify_flags(ctx->cred, 
+                                         GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT);
+@@ -694,7 +747,11 @@
+ {
+     gnutls_certificate_free_credentials(ctx->cred);
+     if (ctx->cache.client.data) {
++#if defined(HAVE_GNUTLS_SESSION_GET_DATA2)
++        gnutls_free(ctx->cache.client.data);
++#else
+         ne_free(ctx->cache.client.data);
++#endif
+     } else if (ctx->cache.server.key.data) {
+         gnutls_free(ctx->cache.server.key.data);
+         gnutls_free(ctx->cache.server.data.data);
+@@ -1164,7 +1221,9 @@
+     gnutls_x509_crt_t cert = NULL;
+     gnutls_x509_privkey_t pkey = NULL;
+ 
+-    data.data = buffer;
++    /* The datum structure is not modified by gnutls_pkcs12_import,
++     * cast safely: */
++    data.data = (unsigned char *)buffer;
+     data.size = buflen;
+ 
+     if (gnutls_pkcs12_init(&p12) != 0) {
+@@ -1201,8 +1260,10 @@
+     }
+ }
+ 
+-ne_ssl_client_cert *ne__ssl_clicert_exkey_import(const unsigned char *der,
+-                                                 size_t der_len)
++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT
++ne_ssl_client_cert *ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len,
++                                                 gnutls_privkey_sign_func sign_func,
++                                                 void *userdata)
+ {
+     ne_ssl_client_cert *cc;
+     gnutls_x509_crt_t x5;
+@@ -1221,9 +1282,12 @@
+     cc->keyless = 1;
+     cc->decrypted = 1;
+     populate_cert(&cc->cert, x5);
++    cc->sign_func = sign_func;
++    cc->sign_ud = userdata;
+ 
+-    return cc;    
++    return cc;
+ }
++#endif
+ 
+ int ne_ssl_clicert_encrypted(const ne_ssl_client_cert *cc)
+ {
+--- neon-0.30.0/src/ne_pkcs11.c.pkcs11
++++ neon-0.30.0/src/ne_pkcs11.c
+@@ -160,6 +160,13 @@
+ }
+ #endif
+ 
++#ifdef HAVE_GNUTLS
++static int pk11_sign_callback(gnutls_privkey_t pkey,
++                              void *userdata,
++                              const gnutls_datum_t *raw_data,
++                              gnutls_datum_t *signature);
++#endif
++
+ static int pk11_find_x509(ne_ssl_pkcs11_provider *prov,
+                           pakchois_session_t *pks, 
+                           unsigned char *certid, unsigned long *cid_len)
+@@ -207,9 +214,9 @@
+             ne_ssl_client_cert *cc;
+             
+ #ifdef HAVE_GNUTLS
+-            cc = ne__ssl_clicert_exkey_import(value, a[0].value_len);
++            cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, pk11_sign_callback, prov);
+ #else
+-            cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, pk11_rsa_method(prov));
++            cc = ne__ssl_clicert_exkey_import(value, a[0].value_len, prov->method);
+ #endif
+             if (cc) {
+                 NE_DEBUG(NE_DBG_SSL, "pk11: Imported X.509 cert.\n");
+@@ -302,10 +309,8 @@
+ #ifdef HAVE_GNUTLS
+ /* Callback invoked by GnuTLS to provide the signature.  The signature
+  * operation is handled here by the PKCS#11 provider.  */
+-static int pk11_sign_callback(gnutls_session_t session,
++static int pk11_sign_callback(gnutls_privkey_t pkey,
+                               void *userdata,
+-                              gnutls_certificate_type_t cert_type,
+-                              const gnutls_datum_t *cert,
+                               const gnutls_datum_t *hash,
+                               gnutls_datum_t *signature)
+ {
+@@ -575,11 +580,6 @@
+ void ne_ssl_set_pkcs11_provider(ne_session *sess, 
+                                 ne_ssl_pkcs11_provider *provider)
+ {
+-#ifdef HAVE_GNUTLS
+-    sess->ssl_context->sign_func = pk11_sign_callback;
+-    sess->ssl_context->sign_data = provider;
+-#endif
+-
+     ne_ssl_provide_clicert(sess, pk11_provide, provider);
+ }
+ 
+--- neon-0.30.0/src/ne_privssl.h.pkcs11
++++ neon-0.30.0/src/ne_privssl.h
+@@ -58,6 +58,10 @@
+ 
+ #include <gnutls/gnutls.h>
+ 
++#ifdef HAVE_GNUTLS_PRIVKEY_IMPORT_EXT
++#include <gnutls/abstract.h>
++#endif
++
+ struct ne_ssl_context_s {
+     gnutls_certificate_credentials_t cred;
+     int verify; /* non-zero if client cert verification required */
+@@ -78,17 +82,13 @@
+         } client;
+ #endif
+     } cache;
+-
+-#ifdef HAVE_GNUTLS_SIGN_CALLBACK_SET
+-    gnutls_sign_func sign_func;
+-    void *sign_data;
+-#endif
+ };
+ 
+ typedef gnutls_session_t ne_ssl_socket;
+ 
+ NE_PRIVATE ne_ssl_client_cert *
+-ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len);
++ne__ssl_clicert_exkey_import(const unsigned char *der, size_t der_len,
++                             gnutls_privkey_sign_func sign_func, void *userdata);
+ 
+ #endif /* HAVE_GNUTLS */
+ 
diff --git a/SPECS/neon.spec b/SPECS/neon.spec
new file mode 100644
index 0000000..d8e0956
--- /dev/null
+++ b/SPECS/neon.spec
@@ -0,0 +1,328 @@
+Summary: An HTTP and WebDAV client library
+Name: neon
+Version: 0.30.0
+Release: 4%{?dist}
+License: LGPLv2+
+Group: System Environment/Libraries
+URL: http://www.webdav.org/neon/
+Source0: http://www.webdav.org/neon/neon-%{version}.tar.gz
+Patch0: neon-0.27.0-multilib.patch
+Patch1: neon-0.30.0-pkcs11.patch
+BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
+BuildRequires: expat-devel, gnutls-devel, zlib-devel, krb5-devel, libproxy-devel
+BuildRequires: pkgconfig, pakchois-devel, autoconf, automake, libtool
+Requires: ca-certificates
+
+%description
+neon is an HTTP and WebDAV client library, with a C interface;
+providing a high-level interface to HTTP and WebDAV methods along
+with a low-level interface for HTTP request handling.  neon
+supports persistent connections, proxy servers, basic, digest and
+Kerberos authentication, and has complete SSL support.
+
+%package devel
+Summary: Development libraries and C header files for the neon library
+Group: Development/Libraries
+Requires: neon = %{version}-%{release}, gnutls-devel, zlib-devel, expat-devel
+Requires: pkgconfig
+# Documentation is GPLv2+
+License: LGPLv2+ and GPLv2+
+
+%description devel
+The development library for the C language HTTP and WebDAV client library.
+
+%prep
+%setup -q
+%patch0 -p1 -b .multilib
+%patch1 -p1 -b .pkcs11
+
+%build
+./autogen.sh
+export CC="%{__cc} -pthread"
+# Use standard system CA bundle:
+%define cabundle %{_sysconfdir}/pki/tls/certs/ca-bundle.crt
+%configure --with-expat --enable-shared --disable-static \
+        --enable-warnings --with-ca-bundle=%{cabundle} \
+        --with-ssl=gnutls --enable-threadsafe-ssl=posix \
+        --with-libproxy
+make %{?_smp_mflags}
+
+%install
+rm -rf $RPM_BUILD_ROOT
+make install DESTDIR=$RPM_BUILD_ROOT INSTALL="install -p"
+
+sed -ri "/^dependency_libs/{s,-l[^ ']*,,g}" \
+      $RPM_BUILD_ROOT%{_libdir}/libneon.la
+
+%find_lang %{name}
+
+%clean
+rm -rf $RPM_BUILD_ROOT
+
+%post -p /sbin/ldconfig
+
+%postun -p /sbin/ldconfig
+
+%files -f %{name}.lang
+%defattr(-,root,root)
+%doc AUTHORS BUGS TODO src/COPYING.LIB NEWS README THANKS
+%{_libdir}/*.so.*
+
+%files devel
+%defattr(-,root,root)
+%{_bindir}/*
+%{_includedir}/*
+%{_libdir}/pkgconfig/neon.pc
+%{_mandir}/man1/*
+%{_mandir}/man3/*
+%{_libdir}/*.*a
+%{_libdir}/*.so
+
+%changelog
+* Fri Mar 22 2019 Joe Orton <jorton@redhat.com> - 0.30.0-4
+- fix PKCS#11 support (#1482769)
+
+* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 0.30.0-3
+- Mass rebuild 2014-01-24
+
+* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 0.30.0-2
+- Mass rebuild 2013-12-27
+
+* Wed Jul 31 2013 Joe Orton <jorton@redhat.com> - 0.30.0-1
+- update to 0.30.0 (#983563, #926212)
+
+* Mon Mar 18 2013 Joe Orton <jorton@redhat.com> - 0.29.6-6
+- fix strict-aliasing warning (upstream r1896)
+
+* Mon Feb 25 2013 Tomáš Mráz <tmraz@redhat.com> - 0.29.6-5
+- fix build with gnutls3 - patch by Bartosz Brachaczek
+
+* Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.29.6-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
+
+* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.29.6-3
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
+
+* Fri Jan 13 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.29.6-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
+
+* Tue May  3 2011 Joe Orton <jorton@redhat.com> - 0.29.6-1
+- update to 0.29.6
+- correct -devel License; drop old Conflicts
+
+* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.29.5-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
+
+* Thu Oct 14 2010 Joe Orton <jorton@redhat.com> - 0.29.5-1
+- update to 0.29.5
+
+* Fri Oct  1 2010 Joe Orton <jorton@redhat.com> - 0.29.4-1
+- update to 0.29.4
+
+* Thu Mar 25 2010 Joe Orton <jorton@redhat.com> - 0.29.3-1
+- update to 0.29.3
+
+* Fri Jan  8 2010 Joe Orton <jorton@redhat.com> - 0.29.2-1
+- update to 0.29.2
+
+* Tue Dec 15 2009 Joe Orton <jorton@redhat.com> - 0.29.1-1
+- update to 0.29.1
+
+* Sun Sep 13 2009 Joe Orton <jorton@redhat.com> 0.29.0-3
+- enable libproxy support
+
+* Sun Sep 13 2009 Joe Orton <jorton@redhat.com> 0.29.0-1
+- update to 0.29.0
+
+* Wed Aug 19 2009 Joe Orton <jorton@redhat.com> 0.28.6-1
+- update to 0.28.6
+
+* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.28.5-2
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
+
+* Thu Jul  9 2009 Joe Orton <jorton@redhat.com> 0.28.5-1
+- update to 0.28.5
+
+* Fri Mar  6 2009 Joe Orton <jorton@redhat.com> 0.28.4-1
+- update to 0.28.4
+
+* Wed Feb 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.28.3-4
+- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
+
+* Mon Jan 19 2009 Joe Orton <jorton@redhat.com> 0.28.3-3
+- use install-p in "make install" (Robert Scheck, #226189)
+
+* Thu Aug 28 2008 Joe Orton <jorton@redhat.com> 0.28.3-2
+- update to 0.28.3
+
+* Wed Jun 25 2008 Joe Orton <jorton@redhat.com> 0.28.2-4
+- rebuild for new GnuTLS
+
+* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 0.28.2-3
+- require ca-certificates package
+
+* Thu Apr  3 2008 Joe Orton <jorton@redhat.com> 0.28.2-2
+- update to 0.28.2
+
+* Wed Apr  2 2008 Joe Orton <jorton@redhat.com> 0.28.1-3
+- use the OpenSSL CA bundle
+
+* Mon Mar 10 2008 Joe Orton <jorton@redhat.com> 0.28.1-2
+- update to 0.28.1
+
+* Tue Feb 26 2008 Joe Orton <jorton@redhat.com> 0.28.0-3
+- rebuild against pakchois
+
+* Wed Dec  5 2007 Joe Orton <jorton@redhat.com> 0.27.2-4
+- trim dependency_libs in .la file
+
+* Tue Dec  4 2007 Joe Orton <jorton@redhat.com> 0.27.2-3
+- rebuild against GnuTLS
+- drop static library
+
+* Tue Sep 25 2007 Joe Orton <jorton@redhat.com> 0.27.2-2
+- update to 0.27.2
+
+* Thu Sep 20 2007 Joe Orton <jorton@redhat.com> 0.27.0-3
+- fix Negotiate response verification
+
+* Thu Aug 30 2007 Joe Orton <jorton@redhat.com> 0.27.0-2
+- enable OpenSSL thread-safety hooks
+
+* Wed Aug 22 2007 Joe Orton <jorton@redhat.com> 0.27.0-1
+- update to 0.27.0 (#243638)
+
+* Mon Aug 20 2007 Joe Orton <jorton@redhat.com> 0.25.5-7
+- fix License
+
+* Mon Feb  5 2007 Joe Orton <jorton@redhat.com> 0.25.5-6
+- remove trailing dot in -devel Summary
+- use standard BuildRoot
+- change Group to System Environment/Libraries
+- drop Prefix
+
+* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 0.25.5-5.1
+- rebuild
+
+* Thu Jun  1 2006 Joe Orton <jorton@redhat.com> 0.25.5-5
+- have -devel require pkgconfig (#193355)
+
+* Wed May 24 2006 Joe Orton <jorton@redhat.com> 0.25.5-4
+- add multilib fixes for neon-config (#192734)
+
+* Wed May 17 2006 Joe Orton <jorton@redhat.com> 0.25.5-3
+- rebuild
+
+* Mon Feb 27 2006 Joe Orton <jorton@redhat.com> 0.25.5-2
+- don't trim exported libraries (#182997)
+
+* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 0.25.5-1.2
+- bump again for double-long bug on ppc(64)
+
+* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 0.25.5-1.1
+- rebuilt for new gcc4.1 snapshot and glibc changes
+
+* Tue Jan 31 2006 Joe Orton <jorton@redhat.com> 0.25.5-1
+- update to 0.25.5
+
+* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
+- rebuilt
+
+* Wed Dec  7 2005 Joe Orton <jorton@redhat.com> 0.24.7-10
+- strip unnecessary exports from .la file/neon-config
+
+* Tue Nov  8 2005 Tomas Mraz <tmraz@redhat.com> 0.24.7-9
+- rebuilt with new openssl
+
+* Fri Sep 23 2005 Joe Orton <jorton@redhat.com> 0.24.7-8
+- restore static libs for rpm
+
+* Mon Sep 19 2005 Joe Orton <jorton@redhat.com> 0.24.7-7
+- drop static libs, doc/html from devel docdir
+
+* Wed Mar  2 2005 Joe Orton <jorton@redhat.com> 0.24.7-6
+- rebuild
+
+* Thu Feb 10 2005 Joe Orton <jorton@redhat.com> 0.24.7-5
+- don't define min() in ne_utils.h (Caolan McNamara, #147228)
+
+* Tue Oct 12 2004 Joe Orton <jorton@redhat.com> 0.24.7-4
+- update to GSSAPI code from trunk
+
+* Fri Jul 23 2004 Joe Orton <jorton@redhat.com> 0.24.7-3
+- rebuild
+
+* Tue Jul 20 2004 Joe Orton <jorton@redhat.com> 0.24.7-2.1
+- rebuild
+
+* Tue Jul  6 2004 Joe Orton <jorton@redhat.com> 0.24.7-2
+- devel requires neon of same release, expat-devel (#127330)
+
+* Mon Jul  5 2004 Joe Orton <jorton@redhat.com> 0.24.7-1
+- update to 0.24.7
+
+* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Wed May 19 2004 Joe Orton <jorton@redhat.com> 0.24.6-1
+- update to 0.24.6
+
+* Wed Apr 14 2004 Joe Orton <jorton@redhat.com> 0.24.5-2
+- rebuild
+
+* Wed Apr 14 2004 Joe Orton <jorton@redhat.com> 0.24.5-1
+- update to 0.24.5 for CVE CAN-2004-0179 fix
+
+* Thu Mar 25 2004 Joe Orton <jorton@redhat.com> 0.24.4-4
+- implement the Negotate auth scheme, and only over SSL
+
+* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Wed Feb 25 2004 Joe Orton <jorton@redhat.com> 0.24.4-3
+- use BuildRequires not BuildPrereq, drop autoconf, libtool;
+  -devel requires {openssl,zlib}-devel (#116744)
+
+* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com> 0.24.4-2
+- rebuilt
+
+* Mon Feb  9 2004 Joe Orton <jorton@redhat.com> 0.24.4-1
+- update to 0.24.4
+
+* Thu Oct  9 2003 Joe Orton <jorton@redhat.com> 0.24.3-1
+- update to 0.24.3
+
+* Wed Sep 24 2003 Joe Orton <jorton@redhat.com> 0.24.2-1
+- update to 0.24.2
+
+* Tue Jul 22 2003 Nalin Dahyabhai <nalin@redhat.com> 0.23.9-7
+- rebuild
+
+* Tue Jun 24 2003 Joe Orton <jorton@redhat.com> 0.23.9-6
+- never print libdir in --libs output
+
+* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com>
+- rebuilt
+
+* Tue Jun  3 2003 Joe Orton <jorton@redhat.com> 0.23.9-4
+- don't regenerate docs; limit conflict with subversion
+
+* Wed May 28 2003 Jeff Johnson <jbj@redhat.com> 0.23.9-3
+- build.
+
+* Sat May 24 2003 Florian La Roche <Florian.LaRoche@redhat.de>
+- add ldconfig to post/postun
+
+* Tue May 20 2003 Jeff Johnson <jbj@redhat.com> 0.23.9-2
+- force expat, include neon-config, for subversion build.
+- do "make check" (but ignore failure for now)
+
+* Mon May 19 2003 Jeff Johnson <jbj@redhat.com> 0.23.9-1
+- upgrade to 0.23.9.
+- avoid xmlto breakage generating man pages for now.
+
+* Mon Nov 11 2002 Jeff Johnson <jbj@redhat.com> 0.23.5-2
+- avoid subversion-devel until libxml2 vs. expat is resolved.
+
+* Sat Nov  9 2002 Jeff Johnson <jbj@redhat.com> 0.23.5-1
+- Create.