From d49476ac75f5db748f44b7fa7b8f50bb837c17a5 Mon Sep 17 00:00:00 2001 From: Hannes Mehnert Date: Tue, 14 Feb 2023 15:05:46 +0100 Subject: [PATCH] changes for 0.16.0, minor adjustments to opam files --- CHANGES.md | 18 ++++++++++++++++++ tls-lwt.opam | 16 ++-------------- tls.opam | 2 +- 3 files changed, 21 insertions(+), 15 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index 12318b87..48194adb 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -1,3 +1,21 @@ +## v0.16.0 (2023-02-14) + +* BREAKING: new opam package tls-lwt (formerly tls.lwt), in dune: + (libraries tls.lwt) should now be libraries (tls-lwt) + (#468 @hannesm, reported #449 by @mbacarella) +* tls: update to mirage-crypto 0.11 API (#468 @hannesm) +* tls: relax SignatureAlgorithms extension handling to allow OpenSSL + interoperability tests with TLS 1.0 and TLS 1.1 (#469 @hannesm) +* tls: remove Utils.filter_map and and Utils.option, use Stdlib instead (#455 + @hannesm) +* tls: do not globally open Utils (#455 @hannesm) +* tls: export log source of Tracing module (#461 @bikallem) +* tls: remove unused ciphersuites to reduce binary size (#467 @hannesm) +* tls-lwt: do not catch out of memory exception (#469 @hannesm) +* tls-eio: add fuzz testing using crowbar (#456 #463 @talex5) +* tls-eio: update to eio 0.7 (#456 @talex5) +* tls-eio: fix test for develop with vendoring (#462 @bikallem) + ## v0.15.5 (2022-10-25) * tls-eio release only: fix end-of-file handling (#454 @talex5), avoid diff --git a/tls-lwt.opam b/tls-lwt.opam index 52775ac2..9ac8da1f 100644 --- a/tls-lwt.opam +++ b/tls-lwt.opam @@ -24,19 +24,7 @@ depends: [ ] conflicts: [ "result" {< "1.5"} ] tags: [ "org:mirage"] -synopsis: "Transport Layer Security purely in OCaml" +synopsis: "Transport Layer Security purely in OCaml, Lwt layer" description: """ -Transport Layer Security (TLS) is probably the most widely deployed security -protocol on the Internet. It provides communication privacy to prevent -eavesdropping, tampering, and message forgery. Furthermore, it optionally -provides authentication of the involved endpoints. TLS is commonly deployed for -securing web services ([HTTPS](http://tools.ietf.org/html/rfc2818)), emails, -virtual private networks, and wireless networks. - -TLS uses asymmetric cryptography to exchange a symmetric key, and optionally -authenticate (using X.509) either or both endpoints. It provides algorithmic -agility, which means that the key exchange method, symmetric encryption -algorithm, and hash algorithm are negotiated. - -Read [further](https://nqsb.io) and our [Usenix Security 2015 paper](https://usenix15.nqsb.io). +Tls-lwt provides an effectful Tls_lwt module to be used with Lwt. """ diff --git a/tls.opam b/tls.opam index b42493a1..94b2bd90 100644 --- a/tls.opam +++ b/tls.opam @@ -21,7 +21,7 @@ depends: [ "cstruct" {>= "6.0.0"} "cstruct-sexp" "sexplib" - "mirage-crypto" {>= "0.8.1"} + "mirage-crypto" {>= "0.11.0"} "mirage-crypto-ec" {>= "0.10.0"} "mirage-crypto-pk" "mirage-crypto-rng" {>= "0.8.0"}