| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: libneon27 | Distribution: openSUSE Tumbleweed |
| Version: 0.35.0 | Vendor: openSUSE |
| Release: 1.1 | Build date: Thu Sep 4 21:15:30 2025 |
| Group: Development/Libraries/Other | Build host: reproducible |
| Size: 267846 | Source RPM: neon-0.35.0-1.1.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://notroj.github.io/neon/ | |
| Summary: An HTTP and WebDAV Client Library | |
neon is an HTTP and WebDAV client library with a C interface.
LGPL-2.0-or-later
* Thu Sep 04 2025 Andreas Stieger <andreas.stieger@gmx.de>
- update to 0.35.0:
* API and ABI backwards-compatible with 0.27.x and later
* pakchois-based PKCS#11 support is now deprecated
- includes changes from release 0.34.2:
* Fix regression in NTLM auth in 0.34.0
- includes changes from 0.34.1:
* Fix regression in 207 parsing of elements which omit a
reason-phrase
- more developer visible bug fixes and interface clarifications
- Fix the license declaration: Library is LGPL, manual/tests are
GPL, macros are permissive
* Sat Feb 08 2025 Dirk Müller <dmueller@suse.com>
- update to 0.34.0:
* New interfaces and features:
- ne_request.h: add ne_get_response_location(),
add ne_get_request_target()
- ne_redirect.h: adds relative URI resolution per RFC 9110
- ne_socket.h: add ne_iaddr_set_scope(),
ne_iaddr_get_scope(), ne_sock_getproto()
- ne_session.h: add NE_SESSFLAG_STRICT session flag
- ne_session.h: ne_session_create() now accepts scoped IPv6
link-local literal addresses following the RFC 6874
syntax;
- ne_session.h: add ne_ssl_set_protovers() to configure TLS
protocol version ranges
- ne_utils.h: add NE_FEATURE_GSSAPI, NE_FEATURE_LIBPXY
feature flags
- ne_ssl.h: add ne_ssl_proto_name()
- HTTP strictness/compliance updated for RFC 9110/9112;
notably stricter in parsing header field line, chunked
transfer-coding, status-line.
Bug fixes:
- auth: the 'realm' string passed to credentials callback is
now cleaned of non-printable characters.
* Documentation & header updates for RFC 9110/9112.
* New NE_MINIMUM_VERSION() autoconf macro for better version
handling.
* Fri May 17 2024 Andreas Stieger <andreas.stieger@gmx.de>
- update to 0.33.0:
* Interface clarifications
* added DAV:lockroot support per RFC 4918
* Improved handling of interim (1xx) responses, headers in
interim responses are now accessible
* TLS name verification updated to match RFC 9110/6125, added
strict handling of IP literals vs DNS names
* bug fixes
- drop fix_timeout_tests_for_ppc64le.patch
- replace replace_manpage_with_links.sh with fdupes
* Thu Feb 22 2024 Dominique Leuenberger <dimstar@opensuse.org>
- Use %patch -P N instead of deprecated %patchN.
* Sat Jan 28 2023 Dirk Müller <dmueller@suse.com>
- update to 0.32.5:
* NOTE: Since 0.32.0 the "$KRB5_CONFIG" environment variable is ignored
when running configure. Use KRB5_CONF_TOOL instead to specify an
alternative to /usr/bin/krb5-config.
* Fail for configure --with-gssapi if GSSAPI can't be enabled
* Add Georgian translation
* Fixes for Windows MSYS2/MinGW build, including cross-build
* Tue Sep 13 2022 Dirk Müller <dmueller@suse.com>
- update to 0.32.4:
* Fix Digest regression in allowing implicit algorithm= (issue #88)
* Fix Digest to safely allow spaces in usernames (without userhash)
* ne_ssl_trust_default_ca() now uses the system's trusted CAs
with GnuTLS where supported (matching behaviour of OpenSSL)
* Improvements and fixes to Windows build (Chun-wei Fan)
* Fix finding pkg-config when cross-compiling (Hugh McMaster)
* Fix Digest cnonce entropy sources in non-SSL builds
* Fix cases where Digest usernames were rejected as non-ASCII
* Fix build failures with OpenSSL 1.1 on some platforms
* Sun Jan 23 2022 Andreas Stieger <andreas.stieger@gmx.de>
- update to 0.32.2:
* Fix auth handling for request-target of "*"
* Sat Dec 11 2021 Andreas Stieger <andreas.stieger@gmx.de>
- update to 0.32.1:
* Fix configure CFLAGS handling in Kerberos detection.
- includes changes from 0.32.0:
* NE_AUTH_DIGEST now only enables RFC 2617/7616 auth by default;
to enable weaker RFC 2069 Digest, use NE_AUTH_LEGACY_DIGEST
(treated as a security enhancement, not an API/ABI break)
* Interface additions and bug fixes
- drop patches:
* neon-0.31.2-sha1-tests.patch
* neon-0.31.2-CA-tests.patch
* Thu Oct 08 2020 Pedro Monreal Gonzalez <pmonreal@suse.com>
- Disable tests fail_ca_* that fail since OpenSSL update to 1.1.1h.
* Upstream report: https://github.com/notroj/neon/issues/38
- Add neon-0.31.2-CA-tests.patch
* Thu Oct 08 2020 Pedro Monreal Gonzalez <pmonreal@suse.com>
- Disable fail_nul_* tests broken with OpenSSL configured to reject
certificates created with a SHA1.
- Add neon-0.31.2-sha1-tests.patch
/usr/lib64/libneon.so.27 /usr/lib64/libneon.so.27.8.0 /usr/share/doc/packages/libneon27 /usr/share/doc/packages/libneon27/AUTHORS /usr/share/doc/packages/libneon27/NEWS /usr/share/doc/packages/libneon27/THANKS /usr/share/doc/packages/libneon27/TODO /usr/share/licenses/libneon27 /usr/share/licenses/libneon27/COPYING.LIB
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Oct 8 23:32:53 2025