head	1.5;
access;
symbols
	neon-0_26_0:1.5
	neon-0_25_5:1.4
	pjones-sparse-experiment:1.3.0.2
	neon-20050105:1.3
	neon-0_24_7:1.2.0.2
	rpm-4_3_1-start:1.1.1.20
	rpm-4_3:1.1.1.20.0.2
	postmerge-neon-0_23_9:1.1.1.20
	premerge-neon-0_23_9:1.1.1.20
	neon-0_23_9:1.1.1.20
	pre-neon-0_23_9:1.1.1.20
	postmerge-neon-0_23_8:1.1.1.20
	premerge-neon-0_23_8:1.1.1.20
	neon-0_23_8:1.1.1.20
	pre-neon-0_23_8:1.1.1.20
	postmerge-neon-0_23_7:1.1.1.20
	premerge-neon-0_23_7:1.1.1.20
	neon-0_23_7:1.1.1.20
	pre-neon-0_23_7:1.1.1.20
	postmerge-neon-0_23_6:1.1.1.20
	premerge-neon-0_23_6:1.1.1.20
	neon-0_23_6:1.1.1.20
	pre-neon-0_23_6:1.1.1.20
	postmerge-neon-0_23_5:1.1.1.20
	premerge-neon-0_23_5:1.1.1.20
	neon-0_23_5:1.1.1.20
	pre-neon-0_23_5:1.1.1.19
	postmerge-neon-0_23_4:1.1.1.19
	premerge-neon-0_23_4:1.1.1.19
	neon-0_23_4:1.1.1.19
	pre-neon-0_23_4:1.1.1.19
	postmerge-neon-0_23_3:1.1.1.19
	premerge-neon-0_23_3:1.1.1.19
	neon-0_23_3:1.1.1.19
	pre-neon-0_23_3:1.1.1.19
	postmerge-neon-0_23_2:1.1.1.19
	premerge-neon-0_23_2:1.1.1.19
	neon-0_23_2:1.1.1.19
	pre-neon-0_23_2:1.1.1.19
	postmerge-neon-0_23_1:1.1.1.19
	premerge-neon-0_23_1:1.1.1.19
	neon-0_23_1:1.1.1.19
	pre-neon-0_23_1:1.1.1.19
	postmerge-neon-0_23_0:1.1.1.19
	premerge-neon-0_23_0:1.1.1.19
	neon-0_23_0:1.1.1.19
	pre-neon-0_23_0:1.1.1.18
	postmerge-neon-0_22_0:1.1.1.18
	premerge-neon-0_22_0:1.1.1.18
	neon-0_22_0:1.1.1.18
	pre-neon-0_22_0:1.1.1.17
	postmerge-neon-0_21_3:1.1.1.17
	premerge-neon-0_21_3:1.1.1.17
	neon-0_21_3:1.1.1.17
	pre-neon-0_21_3:1.1.1.17
	postmerge-neon-0_21_2:1.1.1.17
	premerge-neon-0_21_2:1.1.1.17
	neon-0_21_2:1.1.1.17
	pre-neon-0_21_2:1.1.1.16
	postmerge-neon-0_21_1:1.1.1.16
	premerge-neon-0_21_1:1.1.1.16
	neon-0_21_1:1.1.1.16
	pre-neon-0_21_1:1.1.1.15
	postmerge-neon-0_21_0:1.1.1.15
	premerge-neon-0_21_0:1.1.1.15
	neon-0_21_0:1.1.1.15
	pre-neon-0_21_0:1.1.1.15
	postmerge-neon-0_20_0:1.1.1.15
	premerge-neon-0_20_0:1.1.1.15
	neon-0_20_0:1.1.1.15
	pre-neon-0_20_0:1.1.1.14
	postmerge-neon-0_19_4:1.1.1.14
	premerge-neon-0_19_4:1.1.1.14
	neon-0_19_4:1.1.1.14
	pre-neon-0_19_4:1.1.1.14
	postmerge-neon-0_19_3:1.1.1.14
	premerge-neon-0_19_3:1.1.1.14
	neon-0_19_3:1.1.1.14
	pre-neon-0_19_3:1.1.1.14
	postmerge-neon-0_19_2:1.1.1.14
	premerge-neon-0_19_2:1.1.1.14
	neon-0_19_2:1.1.1.14
	pre-neon-0_19_2:1.1.1.14
	postmerge-neon-0_19_1:1.1.1.14
	premerge-neon-0_19_1:1.1.1.14
	neon-0_19_1:1.1.1.14
	pre-neon-0_19_1:1.1.1.14
	postmerge-neon-0_19_0:1.1.1.14
	premerge-neon-0_19_0:1.1.1.14
	neon-0_19_0:1.1.1.14
	pre-neon-0_19_0:1.1.1.13
	postmerge-neon-0_18_5:1.1.1.13
	premerge-neon-0_18_5:1.1.1.13
	neon-0_18_5:1.1.1.13
	pre-neon-0_18_5:1.1.1.12
	postmerge-neon-0_18_4:1.1.1.12
	premerge-neon-0_18_4:1.1.1.12
	neon-0_18_4:1.1.1.12
	pre-neon-0_18_4:1.1.1.11
	postmerge-neon-0_18_3:1.1.1.11
	premerge-neon-0_18_3:1.1.1.11
	neon-0_18_3:1.1.1.11
	pre-neon-0_18_3:1.1.1.10
	postmerge-neon-0_18_2:1.1.1.10
	premerge-neon-0_18_2:1.1.1.10
	neon-0_18_2:1.1.1.10
	pre-neon-0_18_2:1.1.1.10
	postmerge-neon-0_18_1:1.1.1.10
	premerge-neon-0_18_1:1.1.1.10
	neon-0_18_1:1.1.1.10
	pre-neon-0_18_1:1.1.1.10
	postmerge-neon-0_18_0:1.1.1.10
	premerge-neon-0_18_0:1.1.1.10
	neon-0_18_0:1.1.1.10
	pre-neon-0_18_0:1.1.1.9
	postmerge-neon-0_17_2:1.1.1.9
	premerge-neon-0_17_2:1.1.1.9
	neon-0_17_2:1.1.1.9
	pre-neon-0_17_2:1.1.1.9
	postmerge-neon-0_17_1:1.1.1.9
	premerge-neon-0_17_1:1.1.1.9
	neon-0_17_1:1.1.1.9
	pre-neon-0_17_1:1.1.1.9
	postmerge-neon-0_17_0:1.1.1.9
	premerge-neon-0_17_0:1.1.1.9
	neon-0_17_0:1.1.1.9
	pre-neon-0_17_0:1.1.1.9
	postmerge-neon-0_16_1:1.1.1.9
	premerge-neon-0_16_1:1.1.1.9
	neon-0_16_1:1.1.1.9
	pre-neon-0_16_1:1.1.1.8
	postmerge-neon-0_16_0:1.1.1.8
	premerge-neon-0_16_0:1.1.1.8
	neon-0_16_0:1.1.1.8
	pre-neon-0_16_0:1.1.1.7
	postmerge-neon-0_15_3:1.1.1.7
	premerge-neon-0_15_3:1.1.1.7
	neon-0_15_3:1.1.1.7
	pre-neon-0_15_3:1.1.1.7
	postmerge-neon-0_15_2:1.1.1.7
	premerge-neon-0_15_2:1.1.1.7
	neon-0_15_2:1.1.1.7
	pre-neon-0_15_2:1.1.1.7
	postmerge-neon-0_15_1:1.1.1.7
	premerge-neon-0_15_1:1.1.1.7
	neon-0_15_1:1.1.1.7
	pre-neon-0_15_1:1.1.1.7
	postmerge-neon-0_15_0:1.1.1.7
	premerge-neon-0_15_0:1.1.1.7
	neon-0_15_0:1.1.1.7
	pre-neon-0_15_0:1.1.1.6
	postmerge-neon-0_14_0:1.1.1.6
	premerge-neon-0_14_0:1.1.1.6
	neon-0_14_0:1.1.1.6
	pre-neon-0_14_0:1.1.1.5
	postmerge-neon-0_13_0:1.1.1.5
	premerge-neon-0_13_0:1.1.1.5
	neon-0_13_0:1.1.1.5
	pre-neon-0_13_0:1.1.1.4
	postmerge-neon-0_12_0:1.1.1.4
	premerge-neon-0_12_0:1.1.1.4
	neon-0_12_0:1.1.1.4
	pre-neon-0_12_0:1.1.1.4
	postmerge-neon-0_11_0:1.1.1.4
	premerge-neon-0_11_0:1.1.1.4
	neon-0_11_0:1.1.1.4
	pre-neon-0_11_0:1.1.1.3
	postmerge-neon-0_10_0:1.1.1.3
	premerge-neon-0_10_0:1.1.1.3
	neon-0_10_0:1.1.1.3
	pre-neon-0_10_0:1.1.1.3
	postmerge-neon-0_9_1:1.1.1.3
	premerge-neon-0_9_1:1.1.1.3
	neon-0_9_1:1.1.1.3
	pre-neon-0_9_1:1.1.1.3
	postmerge-neon-0_9_0:1.1.1.3
	premerge-neon-0_9_0:1.1.1.3
	neon-0_9_0:1.1.1.3
	pre-neon-0_9_0:1.1.1.3
	postmerge-neon-0_8_1:1.1.1.3
	premerge-neon-0_8_1:1.1.1.3
	neon-0_8_1:1.1.1.3
	pre-neon-0_8_1:1.1.1.3
	postmerge-neon-0_8_0:1.1.1.3
	premerge-neon-0_8_0:1.1.1.3
	neon-0_8_0:1.1.1.3
	pre-neon-0_8_0:1.1.1.2
	postmerge-neon-0_7_7:1.1.1.2
	premerge-neon-0_7_7:1.1.1.2
	neon-0_7_7:1.1.1.2
	pre-neon-0_7_7:1.1.1.2
	postmerge-neon-0_7_6:1.1.1.2
	premerge-neon-0_7_6:1.1.1.2
	neon-0_7_6:1.1.1.2
	pre-neon-0_7_6:1.1.1.2
	postmerge-neon-0_7_5:1.1.1.2
	premerge-neon-0_7_5:1.1.1.2
	neon-0_7_5:1.1.1.2
	pre-neon-0_7_5:1.1.1.2
	postmerge-neon-0_7_4:1.1.1.2
	premerge-neon-0_7_4:1.1.1.2
	neon-0_7_4:1.1.1.2
	pre-neon-0_7_4:1.1.1.2
	postmerge-neon-0_7_3:1.1.1.2
	premerge-neon-0_7_3:1.1.1.2
	neon-0_7_3:1.1.1.2
	pre-neon-0_7_3:1.1.1.1
	postmerge-neon-0_7_2:1.1.1.1
	premerge-neon-0_7_2:1.1.1.1
	neon-0_7_2:1.1.1.1
	pre-neon-0_7_2:1.1.1.1
	postmerge-neon-0_7_1:1.1.1.1
	premerge-neon-0_7_1:1.1.1.1
	neon-0_7_1:1.1.1.1
	pre-neon-0_7_1:1.1.1.1
	postmerge-neon-0_7_0:1.1.1.1
	premerge-neon-0_7_0:1.1.1.1
	neon-0_7_0:1.1.1.1
	pre-neon-0_7_0:1.1.1.1
	postmerge-neon-0_6_0:1.1.1.1
	premerge-neon-0_6_0:1.1.1.1
	neon-0_6_0:1.1.1.1
	pre-neon-0_6_0:1.1.1.1
	postmerge-neon-0_5_1:1.1.1.1
	premerge-neon-0_5_1:1.1.1.1
	neon-0_5_1:1.1.1.1
	pre-neon-0_5_1:1.1.1.1
	postmerge-neon-0_5_0:1.1.1.1
	premerge-neon-0_5_0:1.1.1.1
	neon-0_5_0:1.1.1.1
	pre-neon-0_5_0:1.1.1.1
	postmerge-neon-0_4_2:1.1.1.1
	premerge-neon-0_4_2:1.1.1.1
	neon-0_4_2:1.1.1.1
	pre-neon-0_4_2:1.1.1.1
	postmerge-neon-0_4_1:1.1.1.1
	premerge-neon-0_4_1:1.1.1.1
	neon-0_4_1:1.1.1.1
	pre-neon-0_4_1:1.1.1.1
	postmerge-neon-0_4_0:1.1.1.1
	premerge-neon-0_4_0:1.1.1.1
	neon-0_4_0:1.1.1.1
	neon:1.1.1;
locks; strict;
comment	@# @;


1.5
date	2006.03.12.21.08.50;	author jbj;	state Exp;
branches;
next	1.4;

1.4
date	2006.03.12.20.57.54;	author jbj;	state Exp;
branches;
next	1.3;

1.3
date	2004.10.29.13.57.41;	author jbj;	state Exp;
branches;
next	1.2;

1.2
date	2004.10.29.13.34.35;	author jbj;	state Exp;
branches;
next	1.1;

1.1
date	2003.02.28.19.24.07;	author jbj;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	2003.02.28.19.24.07;	author jbj;	state Exp;
branches;
next	1.1.1.2;

1.1.1.2
date	2003.02.28.19.25.05;	author jbj;	state Exp;
branches;
next	1.1.1.3;

1.1.1.3
date	2003.02.28.19.25.43;	author jbj;	state Exp;
branches;
next	1.1.1.4;

1.1.1.4
date	2003.02.28.19.26.25;	author jbj;	state Exp;
branches;
next	1.1.1.5;

1.1.1.5
date	2003.02.28.19.26.36;	author jbj;	state Exp;
branches;
next	1.1.1.6;

1.1.1.6
date	2003.02.28.19.26.41;	author jbj;	state Exp;
branches;
next	1.1.1.7;

1.1.1.7
date	2003.02.28.19.26.53;	author jbj;	state Exp;
branches;
next	1.1.1.8;

1.1.1.8
date	2003.02.28.19.30.52;	author jbj;	state Exp;
branches;
next	1.1.1.9;

1.1.1.9
date	2003.02.28.19.31.00;	author jbj;	state Exp;
branches;
next	1.1.1.10;

1.1.1.10
date	2003.02.28.19.31.44;	author jbj;	state Exp;
branches;
next	1.1.1.11;

1.1.1.11
date	2003.02.28.19.32.06;	author jbj;	state Exp;
branches;
next	1.1.1.12;

1.1.1.12
date	2003.02.28.19.32.14;	author jbj;	state Exp;
branches;
next	1.1.1.13;

1.1.1.13
date	2003.02.28.19.32.27;	author jbj;	state Exp;
branches;
next	1.1.1.14;

1.1.1.14
date	2003.02.28.19.32.35;	author jbj;	state Exp;
branches;
next	1.1.1.15;

1.1.1.15
date	2003.02.28.19.33.17;	author jbj;	state Exp;
branches;
next	1.1.1.16;

1.1.1.16
date	2003.02.28.19.33.39;	author jbj;	state Exp;
branches;
next	1.1.1.17;

1.1.1.17
date	2003.02.28.19.33.47;	author jbj;	state Exp;
branches;
next	1.1.1.18;

1.1.1.18
date	2003.02.28.19.34.20;	author jbj;	state Exp;
branches;
next	1.1.1.19;

1.1.1.19
date	2003.02.28.19.34.31;	author jbj;	state Exp;
branches;
next	1.1.1.20;

1.1.1.20
date	2003.02.28.19.35.25;	author jbj;	state Exp;
branches;
next	;


desc
@@


1.5
log
@Upgrade to neon-0.26.0.
@
text
@
Known problems/bugs in neon                                      -*- text -*-
---------------------------

* 2818 requires that a on rejection of the SSL server cert, a "bad certificate"
 message should be sent - this is not being done currently (and can probably
 only be done with OpenSSL by actually doing cert verification in the verify
 callback)

* ne_lock_discover does not handle multiple (shared) locks on
  a single resource.

* SSL session caching issues; only cache for clean shutdowns, and
 only cache on shutdown, since the SSL_SESSION may change during
 an ne_session?

* It would be nice to fail with a friendly error message if a client
cert is requested by the srever but one is not provided.  Currently,
returning -1 from the provide_client_cert function would allow that
(as it forces the SSL handshake to fail), but that would prevent
opportunistic use of client certificates, of the "SSLVerifyClient
optional" variety.

@


1.4
log
@Upgrade to neon-0.25.5.
@
text
@a16 4
* what is passed as 'path' to req create hook: auth needs Request-URI;
  how does that interact with proxies?  also they will be passed NULL
  for a CONNECT request, or "*" possibly as well.

@


1.3
log
@Update to neon trunk.
@
text
@a4 2
* look at escaping logic again w.r.t. ?, # characters?

a12 2
* ne_lock_refresh does not update the passed-in lock structure.

a26 12

* D.J. Heap has a proxy which returns a 401 in response to a CONNECT;
relax the ne_auth rules to allow this since it's unambiguous.

* Error handling from ne__pull_request_body/send_request_body is
buggy: socket errors are not distinguished from body provider errors;
the connection must be closed in ne_request after a body provider
error.

* Check whether the following always return UTF-8-encoded strings:
  - ne_ssl_clicert_name
  - ne_ssl_cert_identity
@


1.2
log
@Update to 0.24.7.
@
text
@d5 2
d15 2
d19 1
a19 1
 an ne_session.
a24 2
* expect100 support is broken.

d31 13
@


1.1
log
@Initial revision
@
text
@d2 2
a3 2
Known problems/bugs in neon                                        -*- text -*-
---------------------------      Id: BUGS,v 1.2 2000/07/27 20:59:19 joe Exp 
d5 4
a8 2
1.  Each new SSL request is opening a new connection to the server.
    VERY slow.
d10 19
@


1.1.1.1
log
@track: auto import
@
text
@@


1.1.1.2
log
@track: auto import
@
text
@d3 1
a3 1
---------------------------      Id: BUGS,v 1.3 2000/09/11 23:41:02 joe Exp 
d5 2
a6 7
1. Each new SSL request is opening a new connection to the server.
   VERY slow.

2. http_request.c:send_request will cause infinite loops in certain
   circumstances, it needs rewriting.

3. expect-100 is turned ON by default, FIX THIS
@


1.1.1.3
log
@track: auto import
@
text
@d3 1
a3 1
---------------------------      Id: BUGS,v 1.4 2000/10/18 21:09:50 joe Exp 
a12 2
4. If --with-neon is given it must fail if it doesn't find anything in
   the given location.@


1.1.1.4
log
@track: auto import
@
text
@d3 1
a3 1
---------------------------
d11 2
d14 1
a14 1
   the given location.
@


1.1.1.5
log
@track: auto import
@
text
@a12 2

5. Redirects with digest auth will fail.
@


1.1.1.6
log
@track: auto import
@
text
@d14 1
a14 3
6. HTTP auth doesn't cope with callback-provided request bodies.
   Refactor.

@


1.1.1.7
log
@track: auto import
@
text
@d14 3
@


1.1.1.8
log
@track: auto import
@
text
@d9 1
a9 4
   circumstances, it needs rewriting.  Occurs when remote server is
   an FTP server etc.

   Just stop retrying things so much in this function, it's crap.
@


1.1.1.9
log
@track: auto import
@
text
@d6 1
a6 1
   VERY slow. (session caching may help)
@


1.1.1.10
log
@track: auto import
@
text
@d5 2
a6 3
* Need to check that SSL over persistent connections is working
  correctly.  Add session ID caching to give much-needed boost to SSL
  over non-persistent connections.
d8 3
a10 1
* SSL cert verification hooks aren't done yet.
d12 1
a12 2
* SSL fails on platforms without a /dev/random. Need a mini-PRNG, or
  just require EGD where necessary.
d14 2
a15 2
* If --with-neon is given it should fail if it doesn't find anything
  in the given location.
@


1.1.1.11
log
@track: auto import
@
text
@d14 2
a15 2
* redirect code should escape Location URL before calling 
  ne_set_request_uri.
a16 1
* fix the FIXME in ne_pull_request_body
@


1.1.1.12
log
@track: auto import
@
text
@d2 1
a2 1
Known problems/bugs in neon                                      -*- text -*-
a17 7

* if connection is aborted while reading a chunked response body,
  ne_end_request will still attempt to read from the trailing headers?
  (not verified)

* when name resolution returns >1 IP address, should cycle through
  addresses if first one fails.
@


1.1.1.13
log
@track: auto import
@
text
@a24 12

* SSL shutdown problems when using non-persistent connections? seems
to be messy problem; any way to avoid the RST? Probably it is just an
inherent race between server&client sending the SSL closure alert.

2 11 0.2233 (0.0050)  C>S  application_data
2 12 0.2572 (0.0338)  C>S  application_data
2 13 0.2781 (0.0209)  S>C  application_data
2 14 0.2784 (0.0002)  S>C  Alert
2    0.2785 (0.0000)  S>C  TCP FIN
2 15 0.2827 (0.0042)  C>S  Alert
2    0.2853 (0.0025)  C>S  TCP RST
@


1.1.1.14
log
@track: auto import
@
text
@d5 6
d27 1
a27 1
to be a messy problem; any way to avoid the RST? Probably it's just an
@


1.1.1.15
log
@track: auto import
@
text
@a10 5
* should automatic redirect following happen at all. Generally the caller 
  needs to know about it and re-issue the request (e.g. OPTIONS then PROPFIND).
  Automatic following, though tempting, breaks so many things it seems like
  they are a Bad Idea.

a16 3
* XML API should not expose expat/libxml difference where attrs array may 
  be NULL or non-NULL to startelm callbacks.

a19 2
* expect100 support is broken.

a30 7

* It would be nice to fail with a friendly error message if a client
cert is requested by the srever but one is not provided.  Currently,
returning -1 from the provide_client_cert function would allow that
(as it forces the SSL handshake to fail), but that would prevent
opportunistic use of client certificates, of the "SSLVerifyClient
optional" variety.
@


1.1.1.16
log
@track: auto import
@
text
@d8 7
a14 1
* test/request.c:unbounded_folding fails on some platforms.
a20 2

* compress code should not try to inflateFree if inflateInit fails.
@


1.1.1.17
log
@track: auto import
@
text
@a11 4
* what is passed as 'path' to req create hook: auth needs Request-URI;
  how does that interact with proxies?  also they will be passed NULL
  for a CONNECT request, or "*" possibly as well.

@


1.1.1.18
log
@track: auto import
@
text
@a4 4
* server auth should not run on a CONNECT request; once a connection
  has been CONNECT tunneled, subsequent requests through the tunnel
  should not give proxy auth.

d8 4
d16 4
d26 1
a26 1
  addresses if connect to first one fails.
d29 12
@


1.1.1.19
log
@track: auto import
@
text
@a4 5
* test failures in `socket' on some non-Linux platforms:

19. write_reset........... FAIL (write got 0 not reset)
20. read_reset............ FAIL (read got -3 not reset)

d9 3
d20 3
@


1.1.1.20
log
@track: auto import
@
text
@a4 9
* ne_lock_discover does not handle multiple (shared) locks on
  a single resource.

* ne_version_pre_http11 gives inverse results to documentation.

* SSL session caching issues; only cache for clean shutdowns, and
 only cache on shutdown, since the SSL_SESSION may change during
 an ne_session.

d17 2
@


