Releases: mirleft/ocaml-tls
Releases · mirleft/ocaml-tls
v0.10.5
v0.10.5 (2019-11-01)
- adapt to mirage-flow 2.0.0, mirage-clock 3.0.0, mirage-kv 3.0.0 interfaces (#401 @hannesm)
0.10.4
0.10.4 (2019-08-15)
- tls_lwt: avoid double close by checking in the default
close
callback of
Lwt_io.make
whether the underlying file descriptor has been closed already.
(reported and discussed by @hcarthy in #395, merged #397)
0.10.3
0.10.3 (2019-07-26)
- support x509 0.7.0+
- remove dependency on Astring (was only used in the lwt-starttls example)
0.10.2
0.10.2 (2019-04-02)
- support for cstruct 4.0.0+
- remove support for < 4.04.2 (same as x509 in master)
- remove result (part of 4.03.0)
- enhance mirage/example2 to work on more platforms than unix
0.10.1
0.10.1 (2019-02-28)
- tls-mirage: fix compilation
0.10.0
0.10.0 (2019-02-28)
- tls: fix extensions length (used to include the 2 byte extension length field)
if padding is inserted (introduced on May 5, 2014 in #73)
- tls-mirage: adapt to mirage-kv 2.0.0 API (#384, @samoht)
0.9.3
0.9.3 (2019-01-07)
- tls: do not require client sent ciphersuites to be a proper set
(interoperability with some android devices)
- tls_lwt: delay error from writing to peer while reading, record errors only
if state is active (fixes #347)
- migrate opam file to opam 2.0 format
0.9.2
0.9.2 (2018-08-24)
- compatibility with ppx_sexp_conv >v0.11.0 (#381), required for 4.07.0
- support ALPN (#378, @bobbypriambodo)
0.9.1
0.9.1 (2018-02-26)
- Tls_lwt: use Tls.Config instead of Config directly to avoid polluting imported
names (#376, @rgrinberg)
0.9.0
0.9.0 (2017-12-23)
- renegotiation semantics (#375)
allow acceptable_ca, authenticator, and own_cert to be updated (Config.with_x)
semantics of reneg is blocking
{Tls_lwt.Unix|Tls_mirage}.reneg ~drop:bool
drops data of earlier epoch
- implement acceptable_ca (#332, @reynir)
- fix client renegotiation with ExtendedMasterSecret (#373, broken since 0.7.0)
- Config.client can get ~peer_name (#373)
- Asn.Time.t is Ptime.t now (asn1-combinators.0.2.0, x509.0.6.0, #372)
- cleanups (#360, #363, #369, @rgrinberg)
- remove 3DES CBC SHA from default ciphers (#359)