pkgsrc/www/neon/patches/patch-ab

54 lines
1.5 KiB
Text
Raw Normal View History

Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
$NetBSD: patch-ab,v 1.2 2009/09/14 16:48:44 tron Exp $
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
--- src/ne_socket.c.orig 2009-08-18 14:16:07.000000000 +0100
+++ src/ne_socket.c 2009-09-14 13:40:37.000000000 +0100
@@ -1192,6 +1192,9 @@
in6.sin6_port = htons(port);
/* fill in the _family field for AIX 4.3, which forgets to do so. */
in6.sin6_family = AF_INET6;
+#ifdef __NetBSD__
+ in6.sin6_len = sizeof in6;
+#endif
return bind(fd, (struct sockaddr *)&in6, sizeof in6);
} else
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
@@ -1210,6 +1213,9 @@
}
in.sin_port = htons(port);
in.sin_family = AF_INET;
+#ifdef __NetBSD__
+ in.sin_len = sizeof in;
+#endif
return bind(fd, (struct sockaddr *)&in, sizeof in);
}
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
@@ -1329,7 +1335,7 @@
ia = ne_calloc(sizeof *ia);
#ifdef USE_GETADDRINFO
- ia->ai_addr = ne_malloc(sizeof *ia);
+ ia->ai_addr = ne_malloc(len);
ia->ai_addrlen = len;
memcpy(ia->ai_addr, sad, len);
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
ia->ai_family = saun.sa.sa_family;
@@ -1365,6 +1371,9 @@
ia->ai_addr = (struct sockaddr *)in4;
ia->ai_addrlen = sizeof *in4;
in4->sin_family = AF_INET;
+#ifdef __NetBSD__
+ in4->sin_len = sizeof *in4;
+#endif
memcpy(&in4->sin_addr.s_addr, raw, sizeof in4->sin_addr.s_addr);
}
#ifdef AF_INET6
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
@@ -1374,6 +1383,9 @@
ia->ai_addr = (struct sockaddr *)in6;
ia->ai_addrlen = sizeof *in6;
in6->sin6_family = AF_INET6;
+#ifdef __NetBSD__
+ in6->sin6_len = sizeof *in6;
+#endif
memcpy(&in6->sin6_addr, raw, sizeof in6->sin6_addr.s6_addr);
}
#endif