diff options
author | Simon Josefsson <simon@josefsson.org> | 2005-10-28 09:43:37 +0000 |
---|---|---|
committer | Simon Josefsson <simon@josefsson.org> | 2005-10-28 09:43:37 +0000 |
commit | 7f0de78df5f34da8715cf00af3296cabd107289c (patch) | |
tree | 5ef198c7d6e41dc7f99d49f46c458c57c80a0c4a /NEWS | |
parent | da8878577e47781740e72eeb0ee5fff19f19f696 (diff) | |
download | gnutls-7f0de78df5f34da8715cf00af3296cabd107289c.tar.gz |
Fix.
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 15 |
1 files changed, 8 insertions, 7 deletions
@@ -6,13 +6,14 @@ See the end for copying conditions. * Version 1.2.9 - MD2 is now supported. - MD2 and MD5 as X.509 certificate signing algorithms are now disabled - by default. Verifying certificates signed with this hash will now - fail with a GNUTLS_CERT_INSECURE_ALGORITHM verification output. For - applications that must remain interoperable, you can use the - GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 or GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 - flags when verifying certificates. For example, call - gnutls_certificate_set_verify_flags with these flags to change the - verification mode used by gnutls_certificate_verify_peers2. + by default. Verifying untrusted certificates signed with these + hashes will now fail with a GNUTLS_CERT_INSECURE_ALGORITHM + verification output. For applications that must remain + interoperable, you can use the GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 or + GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 flags when verifying certificates. + For example, call gnutls_certificate_set_verify_flags with these + flags to change the verification mode used by + gnutls_certificate_verify_peers2. - Make it possible to send empty data through gnutls_record_send, to align with the send API. - The (experimental) low-level crypto alternative to libgcrypt used |