The -v8 patch in Fedora has what I hope is the correct fix for this (no
other changes in there):
http://pkgs.fedoraproject.org/gitweb/?p=php.git;a=blob;f=php-5.3.1-systzdata-v8.patch;h=6caf9e0b0a64815360c6d9b532cc40e205380ef7;hb=b90996e56d0ee96d5db0ee2600defd7bf40c37d7
Let me know if that
On Wed, Feb 01, 2012 at 05:24:38PM +0100, sean finney wrote:
On Wed, Feb 01, 2012 at 01:36:31AM +0100, Ondřej Surý wrote:
But if you provide a clean patch to fix the issue, I'll apply it in
the git and it will be part
of some next release.
We should make sure to bring the system tzdata
Hi Sean, sorry I didn't see your comments earlier.
On Wed, Jul 15, 2009 at 01:14:46AM +0200, sean finney wrote:
in your comments you say:
/* Parse an ISO-6709 date as used in zone.tab. Returns end of the
s/date/coordinate/ ? :)
Hah! I've fixed this in patch v7.
but more seriously:
v6 attached, which now passes all the tests in the ext/date testsuite
and fixes some significant bugs in v5 and earlier.
Regards, Joe
Add support for use of the system timezone database, rather
than embedding a copy. Discussed upstream but was not desired.
History:
r6: fix fd leak in r5, fix
Hi folks, I've attached v5 of the system timezone patch, which is
updated for 5.3.0.
This contains the changes to parse zone.tab which I proposed in my
previous mail, and should fix the crash reported in the Debian bug
535770. It seems to work fine though I have not tested it exhaustively.
Hi Sean - adding the Fedora PHP devel list to CC. Thanks for getting in
touch. For Fedora folks, Sean has referenced this Debian bug report:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535770
Quoting in full:
On Tue, Jul 07, 2009 at 12:05:31AM +0200, sean finney wrote:
...and hi again
On Sun, May 24, 2009 at 12:45:12PM +0200, Laszlo Boszormenyi wrote:
Hi all,
On Sat, 2009-05-23 at 09:55 -0500, Peter Samuelson wrote:
On Fri, May 22, 2009 at 01:26:58PM +0200, Johann Glaser wrote:
$ uname -a
Linux glaser 2.6.26 #1 PREEMPT Thu Dec 25 21:38:28 CET 2008 i686
On Sat, Nov 22, 2008 at 12:51:05AM -0500, Daniel Kahn Gillmor wrote:
On Fri 2008-11-21 08:20:40 -0500, Joe Orton wrote:
neon already has a callback which does that, yeah.
Daniel, can you try this neon patch?
OK, after figuring out how to build neon27 (don't try it in a path
On Sat, Nov 22, 2008 at 01:54:43PM -0500, Daniel Kahn Gillmor wrote:
On Sat 2008-11-22 03:05:03 -0500, Joe Orton wrote:
[0 [EMAIL PROTECTED] cdtemp.oNUHIC]$ svn co
https://foo.example.org/svn/monkey/trunk/gorilla
svn: OPTIONS of 'https://foo.example.org/svn/monkey/trunk/gorilla:
Could
On Fri, Nov 21, 2008 at 09:24:02AM +0200, Nikos Mavrogiannopoulos wrote:
For neon to solve this, it has to perform a handshake after the
rehandshake request has been required.
Ah, I didn't realise that - OpenSSL will automatically rehandshake
whenever requested by the server. So to provide
On Fri, Nov 21, 2008 at 03:03:49PM +0200, Nikos Mavrogiannopoulos wrote:
Actually you only need to do this test on record_recv().
OK.
Note that usually servers request upgrade in order to receive a client
certificate, thus it might be a good idea to notify or prompt the user
about that.
On Fri, Nov 21, 2008 at 12:31:14PM -0500, Daniel Kahn Gillmor wrote:
On Fri 2008-11-21 08:20:40 -0500, Joe Orton wrote:
neon already has a callback which does that, yeah.
Daniel, can you try this neon patch?
neon27 FTBFS for me right now (i opened http://bugs.debian.org/506464
to try
On Fri, Nov 21, 2008 at 11:58:36AM -0500, Daniel Kahn Gillmor wrote:
On Fri 2008-11-21 02:24:02 -0500, Nikos Mavrogiannopoulos wrote:
Hello, this does not seem to be a gnutls error. The server merely asks
for renegotiation, gnutls-cli ignores it (legal behavior) and server
does not like
The AuthDigestDomain parameter is incorrectly configured on this server:
[hdr] WWW-Authenticate: Digest realm=project,
nonce=5R5MeXFWBAA=673bce354e24a5c28c6c348e07a13e5278f7534e,
algorithm=MD5, domain=project, qop=auth
remove the AuthDigestDomain parameter or set it to a path or URI prefix.
This issue (Debian bug 480041) is almost certainly a neon bug.
I can reproduce the error with a PKCS#12 cert with an embedded CA cert;
if anybody else seeing this problem can confirm it's fixed with the
patch below, that would be great.
Regards, Joe
Index: src/ne_gnutls.c
On Thu, Oct 30, 2008 at 07:08:41PM +, Joe Orton wrote:
This issue (Debian bug 480041) is almost certainly a neon bug.
I can reproduce the error with a PKCS#12 cert with an embedded CA cert;
if anybody else seeing this problem can confirm it's fixed with the
patch below, that would
On Thu, Oct 16, 2008 at 04:10:29PM +0200, Yves-Alexis Perez wrote:
...
[status-line] HTTP/1.1 401 Authorization Required
[hdr] Date: Thu, 16 Oct 2008 13:56:07 GMT
Header Name: [date], Value: [Thu, 16 Oct 2008 13:56:07 GMT]
[hdr] Server: Apache
Header Name: [server], Value: [Apache]
[hdr]
On Sat, May 17, 2008 at 03:00:03AM +0200, Jelmer Vernooij wrote:
It would be nice if cadaver supported WWW-Authenticate: Negotiate for
DAV servers that require authentication using Kerberos.
This should work out of the box. Note that neon does not (by default)
support Negotiate for non-SSL
On Tue, Sep 09, 2008 at 01:25:56PM +0200, Yves-Alexis wrote:
It was working perfectly fine with -3, now with -5 svn keeps asking
username/password.
Adding --verbose to svn doesn't help. I'll try to see if I can debug with neon
directly, but I'm not sure how to do that.
Can you add:
On Fri, May 30, 2008 at 02:42:45PM +0200, Benjamin Gufler wrote:
Package: libneon27-gnutls
Version: 0.28.2-2
Followup-For: Bug #474139
Hi,
same problem on my box - when using svn, I get:
[EMAIL PROTECTED]:~/am$ svn up
svn: PROPFIND request failed on '/repo/hb/src/am/trunk'
svn:
For the four possible build configurations:
neon built with (GnuTLS, OpenSSL) x (configure --with-ca-bundle, or not)
the behaviour of ne_ssl_trust_default_ca() is as follows:
1) GnuTLS, no --with-ca-bundle: no CAs trusted
2) GnuTLS, --with-ca-bundle: trust the set of CAs in given file
3)
On Wed, Apr 02, 2008 at 05:13:33PM +0530, Kartik Mistry wrote:
On Wed, 2 Apr 2008 13:08:49 +0200
Lucas Nussbaum [EMAIL PROTECTED] wrote:
...
| checking linking against neon... yes
| configure: incompatible neon library version 0.28.1: wanted 0.24 25 26 27
| configure: error: could not use
This is expected behaviour. If the remote site state differs from what
sitecopy thinks is there, you need to use --fetch.
joe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
This has been supported since 0.14.0, using permissions dir in the
rcfile; this bug can be closed.
joe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
This has been configurable forever, use
sitecopy --storepath /path/to/.sitecopy
joe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
===
--- configure.in(revision 1299)
+++ configure.in(working copy)
@@ -14,7 +14,7 @@
dnl Boston, MA 02111-1307, USA.
dnl This configure script is:
-dnl Copyright (C) 2000-2006 Joe Orton ([EMAIL PROTECTED])
+dnl Copyright (C) 2000-2007 Joe Orton ([EMAIL PROTECTED])
dnl Portions
Hi Peter,
On Tue, Dec 05, 2006 at 03:27:04PM -0600, Peter Samuelson wrote:
[Joe Orton]
`neon-config --la-file` is part of the defined and documented neon
interface: removing the .la file breaks that interface, and hence
will break applications designed to build against neon.
So, I
`neon-config --la-file` is part of the defined and documented neon
interface: removing the .la file breaks that interface, and hence will
break applications designed to build against neon. It is desirable to
reference .la files directly when implementing simple portable build
systems around
On Mon, Oct 09, 2006 at 09:49:26PM +0200, Helmut Grohne wrote:
Debian: src/ne_auth.c:1358
Upstream tarball from http://www.webdav.org/neon/: src/ne_auth.c:1204:
else if (sess-protocol
sess-protocol-flags AUTH_FLAG_VERIFY_NON40x
(status-klass == 2 ||
That's not a bug; it's a private function to APR, it's not intended for
use by applications and so is not declared in the public headers.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
That's an application bug, hacking neon will work around it poorly. tla
is failing to call ne_sock_init() before using SSL; see
ne_session_create(3), neon(3), etc.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
31 matches
Mail list logo