pkgsrc/www/neon/distinfo

7 lines
296 B
Text
Raw Normal View History

$NetBSD: distinfo,v 1.26 2014/10/01 16:10:53 wiz Exp $
SHA1 (neon-0.30.1.tar.gz) = efec2a6f17d9bd2323345320e3067349ddc9cf79
RMD160 (neon-0.30.1.tar.gz) = db4645f8204870e4e11c4a3ee9c50412bbf00dae
Size (neon-0.30.1.tar.gz) = 911414 bytes
Update "neon" package to version 0.29. Changes since version 0.28.5: * Interface changes: o none, API and ABI backwards-compatible with 0.28.x and 0.27.x * New interfaces and features: o added NTLM auth support for Unix builds (Kai Sommerfeld, Daniel Stenberg) o ne_auth.h: added NE_AUTH_GSSAPI and NE_AUTH_NTLM auth protocol codes o added ne_acl3744.h, updated WebDAV ACL support (Henrik Holst) o added built-in SOCKS v4/v4a/v5 support: ne_socket.h:ne_sock_proxy(), and ne_session.h:ne_session_socks_proxy() o added support for system-default proxies: ne_session_system_proxy(), implemented using libproxy where available o ne_session.h: added NE_SESSFLAG_EXPECT100 session flag, SSL verification failure bits extended by NE_SSL_BADCHAIN and NE_SSL_REVOKED, better handling of failures within the cert chain (thanks to Ludwig Nussel) o ne_socket.h: ne_sock_writev() (Julien Reichel), ne_sock_set_error(), ne_iaddr_raw(), ne_iaddr_parse() o ne_string.h: ne_buffer_qappend(), ne_strnqdup() * Deprecated interfaces: o ne_acl.h is obsoleted by ne_acl3744.h (but is still present) o obsolete feature "NE_FEATURE_SOCKS" now never marked present * Other changes: o fix handling of "stale" flag in RFC2069-style Digest auth challenge o ne_free() implemented as a function on Win32 (thanks to Helge Hess) o symbol versioning used for new symbols, where supported o ensure SSL connections are closed cleanly with OpenSSL o fix build with OpenSSL 1.0 beta o updated Polish (pl) translation (Arfrever Frehtes Taifersar Arahesis) * SECURITY (CVE-2009-2473): Fix "billion laughs" attack against expat; could allow a Denial of Service attack by a malicious server. * SECURITY (CVE-2009-2474): Fix handling of an embedded NUL byte in a certificate subject name; could allow an undetected MITM attack against an SSL server if a trusted CA issues such a cert. Tested by Daniel Horecki with SVN client.
2009-09-14 18:48:43 +02:00
SHA1 (patch-ab) = da95144b8c4ebc7cdd5ae0dfdb86d457c43ec58d