Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 6DE0071871 for ; Thu, 4 Jul 2013 17:34:44 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id BEC9414A1EF; Thu, 4 Jul 2013 17:34:43 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 3C20814A1B8 for ; Thu, 4 Jul 2013 17:34:43 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id TW_ml7BQY7C6 for ; Thu, 4 Jul 2013 17:34:42 +0000 (UTC) Received: from nef.pbox.org (ns.pbox.org [IPv6:2001:41d0:1:e836::1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id EF27714A170 for ; Thu, 4 Jul 2013 17:34:41 +0000 (UTC) Received: from nef.pbox.org (localhost [127.0.0.1]) by nef.pbox.org (8.14.5/8.14.5/) with ESMTP id r64HYb69028051 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 4 Jul 2013 19:34:38 +0200 (CEST) Received: (from agc@localhost) by nef.pbox.org (8.14.5/8.14.5/Submit) id r64HYbLJ024443 for pkgsrc-changes@netbsd.org; Thu, 4 Jul 2013 19:34:37 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id E474C14A18D for ; Thu, 4 Jul 2013 15:21:54 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id EOGdVB4J7vK6 for ; Thu, 4 Jul 2013 15:21:51 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 4BBF914A135 for ; Thu, 4 Jul 2013 15:21:51 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id 4238E96; Thu, 4 Jul 2013 15:21:51 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Date: Thu, 4 Jul 2013 15:21:51 +0000 From: "Thomas Klausner" Subject: CVS commit: pkgsrc/devel/apr-util To: pkgsrc-changes@netbsd.org Reply-To: wiz@netbsd.org X-Mailer: log_accum Message-Id: <20130704152151.4238E96@cvs.netbsd.org> X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.4.3 (nef.pbox.org [0.0.0.0]); Thu, 04 Jul 2013 19:34:38 +0200 (CEST) Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: wiz Date: Thu Jul 4 15:21:51 UTC 2013 Modified Files: pkgsrc/devel/apr-util: Makefile distinfo pkgsrc/devel/apr-util/patches: patch-aa Log Message: Update to 1.5.2: Changes with APR-util 1.5.2 *) Windows: Add command line makefiles. [Gregg Smith] *) apr_uri_parse(): Do not accept invalid characters in the scheme. Per RFC 3986 3.3, enforce that the first segment of a relative path does not contain a colon. PR 52479. [Stefan Fritsch] *) Fix memory leak in hook sorting function. PR 51256. [] *) Speedup md5 calculation by avoiding some copying on little endian architectures. PR 49011. [Stefan Fritsch, Stefan Fuhrmann ] *) Use heap memory for crypt in apr_password_validate(), to reduce stack usage. PR 54572. [Stefan Fritsch] *) Fix password validation failure for all crypt and crypt_r based algorithms. PR 54603. [Harvey Eneman ] *) Fix syntax error in crypto/apr_passwd.c on non-glibc systems. PR 54275. [Stefan Fritsch] *) Fix potential data corruption in apr_brigade_write() and friends if the last bucket of the brigade is a heap bucket that has been split, and there are still references to the next part of the original bucket in use. [Stefan Fritsch] *) Remove duplicated logic in apr_brigade_puts(). PR 53740. [Christophe Jaillet ] *) apr_crypto: If --with-crypto is passed to configure but no crypto libraries are enabled, autodetect available libraries. [Jeff Trawick] *) memcache: Fix dead server retry logic. [Gavin Shelley ] Changes with APR-util 1.5.1 *) testmemcache: Fix crash. PR 52705. [Peter Poeml ] *) MinGW: Support shared builds of apr-util when apr is shared. PR 46175. [Carlo Bramini , Jeff Trawick] *) Add support for Berkeley DB 5.2 and 5.3. Simplify detection script. PR 53684. [Rainer Jung] *) configure: Allow to specify library specific custom linker flags via the LDADD_XXX variables. [Rainer Jung] *) apr_password_validate(): Fix intermittent errors on systems such as FreeBSD where the crypt() function is used. (Broken only in 1.5.0) [Jeff Trawick] *) Improve platform detection for bundled expat by updating config.guess and config.sub. [Rainer Jung] Changes with APR-util 1.5.0 *) dbd_pgsql_escape: Use PQescapeStringConn. [Nick Kew] *) apr_password_validate, apr_bcrypt_encode: Add support for bcrypt encoded passwords. The bcrypt implementation uses code from crypt_blowfish written by Solar Designer . apr_bcrypt_encode creates hashes with "$2y$" prefix, but apr_password_validate also accepts the old prefix "$2a$". PR 49288. [Stefan Fritsch] *) APR dbd: Allow to use apr_dbd_get_row() with a different pool than apr_dbd_select(). PR 53533. [] *) APR dbd FreeTDS support: Fix spurious API errors caused by uninitialized fields. [TROY.LIU 劉春偉 ] *) apr_password_validate: Increase maximum hash string length to allow more than 9999 rounds with sha512-crypt. PR 53410. [Stefan Fritsch] *) Fix segfaults in crypt() and crypt_r() failure modes. PR 47272. [Arkadiusz Miskiewicz ] *) apr_crypto: Ensure that the if/else that governs the static initialisation of each crypto driver works when the first driver isn't in use. [Graham Leggett] *) apr_crypto: Ensure the *driver variable is initialised when a statically compiled library is initialised for the first time. [Graham Leggett] *) apr_crypto: Ensure the *driver variable is initialised when the library has already been loaded. Fix ported from apr_dbd. [Graham Leggett] *) apr_crypto: Move the static initialisation of DRIVER_LOAD from apr_crypto_init() to apr_crypto_get_driver(), so that we don't lose the parameters. [Graham Leggett] Changes with APR-util 1.4.3 *) Fix potential data corruption in apr_brigade_write() and friends if the last bucket of the brigade is a heap bucket that has been split, and there are still references to the next part of the original bucket in use. [Stefan Fritsch] *) Remove duplicated logic in apr_brigade_puts(). PR 53740. [Christophe Jaillet ] *) memcache: Fix dead server retry logic. [Gavin Shelley ] *) Improve platform detection for bundled expat by updating config.guess and config.sub. [Rainer Jung] *) APR dbd: Allow to use apr_dbd_get_row() with a different pool than apr_dbd_select(). PR 53533. [] *) APR dbd FreeTDS support: Fix spurious API errors caused by uninitialized fields. [TROY.LIU 劉春偉 ] *) apr_password_validate: Increase maximum hash string length to allow more than 9999 rounds with sha512-crypt. PR 53410. [Stefan Fritsch] *) Fix segfaults in crypt() and crypt_r() failure modes. PR 47272. [Arkadiusz Miskiewicz ] *) apr_crypto: Ensure that the if/else that governs the static initialisation of each crypto driver works when the first driver isn't in use. [Graham Leggett] *) apr_crypto: Ensure the *driver variable is initialised when a statically compiled library is initialised for the first time. [Graham Leggett] *) apr_crypto: Ensure the *driver variable is initialised when the library has already been loaded. Fix ported from apr_dbd. [Graham Leggett] Changes with APR-util 1.4.2 (not released) *) apr_crypto: Move the static initialisation of DRIVER_LOAD from apr_crypto_init() to apr_crypto_get_driver(), so that we don't lose the parameters. [Graham Leggett] To generate a diff of this commit: cvs rdiff -u -r1.31 -r1.32 pkgsrc/devel/apr-util/Makefile cvs rdiff -u -r1.14 -r1.15 pkgsrc/devel/apr-util/distinfo cvs rdiff -u -r1.3 -r1.4 pkgsrc/devel/apr-util/patches/patch-aa Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.