summaryrefslogtreecommitdiff
path: root/NEWS
Commit message (Collapse)AuthorAgeFilesLines
* *** empty log message ***gnutls_0_8_7Nikos Mavrogiannopoulos2003-05-111-1/+1
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-05-031-2/+4
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-03-281-0/+3
|
* *** empty log message ***gnutls_0_8_6Nikos Mavrogiannopoulos2003-03-251-1/+1
|
* * Corrected a parsing error in the Certificate request message.Nikos Mavrogiannopoulos2003-03-241-0/+6
| | | | | | | * Corrected behaviour when a certificate request message is received. Now a certificate packet is always sent, and in SSL 3.0 cipher suites a no_certificate alert is sent instead. * Some fixes in the certificate callback function.
* *** empty log message ***gnutls_0_8_5Nikos Mavrogiannopoulos2003-03-221-3/+4
|
* * Implemented the counter measure discussed in the paper "AttackingNikos Mavrogiannopoulos2003-03-201-0/+3
| | | | | RSA-based Sessions in SSL/TLS", against the attack discussed in the same paper.
* *** empty log message ***Nikos Mavrogiannopoulos2003-03-201-0/+3
|
* changes for 0.8.4 release.gnutls_0_8_4Nikos Mavrogiannopoulos2003-03-101-2/+4
|
* Corrected a broken buffer check in _gnutls_io_read_buffered()Nikos Mavrogiannopoulos2003-03-061-0/+3
|
* changes for 0.8.3 release.gnutls_0_8_3Nikos Mavrogiannopoulos2003-03-041-1/+1
|
* Corrected a bug in 64 bit architectures, which affected theNikos Mavrogiannopoulos2003-03-041-0/+4
| | | | serial number calculation in the record layer.
* *** empty log message ***Nikos Mavrogiannopoulos2003-03-031-1/+1
|
* Commited the TLS 1.0 record layer, timing attack fix in the 0.8.x branch.Nikos Mavrogiannopoulos2003-03-031-26/+1
|
* Added protection against the new TLS 1.0 record layer timing attack.Nikos Mavrogiannopoulos2003-03-031-0/+4
|
* Added support for MD2 signature verification in X.509 certificates.Nikos Mavrogiannopoulos2003-02-271-0/+1
|
* The RSA and DH parameter handling has been updated.Nikos Mavrogiannopoulos2003-02-161-4/+4
|
* ported to libtasn1 0.2.x. Also the included minitasn1 was replaced by the ↵Nikos Mavrogiannopoulos2003-02-141-0/+1
| | | | 0.2.1 version of libtasn1.
* Added some private key handling functions. They are primitive enough for now.Nikos Mavrogiannopoulos2003-02-121-2/+2
|
* gnutls_x509_certificate_* were renamed gnutls_x509_crt_*.Nikos Mavrogiannopoulos2003-02-121-1/+1
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-02-081-0/+1
|
* More stuff for the new certificate API.Nikos Mavrogiannopoulos2003-02-071-0/+2
|
* The old certificate parsing API was reimplemented over the new one. It will ↵Nikos Mavrogiannopoulos2003-02-071-0/+4
| | | | stay in the 1.0.0 release for compatibility reasons.
* Added preliminary CRL support. This will be under the new X.509 API. Other ↵Nikos Mavrogiannopoulos2003-02-051-4/+4
| | | | x509 functions will be updated later.
* * Added gnutls_pkcs3_extract_dh_params() and gnutls_pkcs3_export_dh_params()Nikos Mavrogiannopoulos2003-02-031-3/+3
| | | | | | | which extracts and export parameters from and to PKCS#3 encoded structures. These were added to read parameters generated using the openssl dhparam tool. * The prime program was modified to also print the generated prime and generator using the PKCS#3 format.
* * gnutls_dh_params_generate() and gnutls_rsa_params_generate() now useNikos Mavrogiannopoulos2003-02-031-0/+8
| | | | | | | | | | | | gnutls_malloc() to allocate the output parameters. * Added gnutls_pkcs3_extract_dh_params() which extracts parameters from PKCS#3 encoded structures. This was in order to read parameters generated using the openssl dhparam tool. * Several changes in the temporary (DH/RSA) parameter codebase. No DH parameters are now included in the library. Also a credentials structure can now hold only one temporary parameter.
* removed backward compatibility functions for 0.9.0 version.Nikos Mavrogiannopoulos2003-01-301-1/+2
|
* Added ability to send some messages back to the application usingNikos Mavrogiannopoulos2003-01-231-0/+2
| | | | the gnutls_global_set_log_function(). This is quite experimental.
* The library notifies the application on empty and illegal SRP usernames,Nikos Mavrogiannopoulos2003-01-231-2/+6
| | | | | | | | so that proper notification (via an alert) is sent to the peer. Currently when the SRP ciphersuite is advertized but no username is sent by the peer, the library returns GNUTLS_E_EMPTY_SRP_USERNAME, and the alert associated with this is GNUTLS_A_ACCESS_DENIED (to be changed when the srp draft defines something more appropriate).
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-221-2/+2
|
* *** empty log message ***gnutls_0_8_1Nikos Mavrogiannopoulos2003-01-221-2/+4
|
* Improved the SRP support, to prevent attackers guessing theNikos Mavrogiannopoulos2003-01-221-0/+4
| | | | | available usernames by brute force. The g,n values sent are now obtained by the password conf file. (they were static ones)
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-201-1/+1
|
* *** empty log message ***Nikos Mavrogiannopoulos2003-01-141-1/+3
|
* Added some information about the SRP patents in the documentation.Nikos Mavrogiannopoulos2003-01-111-0/+1
|
* Only the documented symbols are now exported.Nikos Mavrogiannopoulos2003-01-091-1/+1
|
* Added gnutls_x509_extract_certificate_ca_status() which returnsNikos Mavrogiannopoulos2003-01-081-0/+2
| | | | the CA status of the given certificate.
* If liblzo is found in the system then libgnutls-extra will depend on it, ↵Nikos Mavrogiannopoulos2003-01-011-0/+2
| | | | instead of including minilzo.
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-281-2/+2
|
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-281-1/+3
|
* Finished SRP-6 stuff. It should work fine now.Nikos Mavrogiannopoulos2002-12-161-0/+1
|
* Added gnutls_openpgp_extract_key_name_string() which returnsNikos Mavrogiannopoulos2002-12-131-0/+2
| | | | a single string for a pgp user id.
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-121-0/+4
|
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-081-1/+1
|
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-081-2/+3
|
* Exported the more convenient gnutls_malloc() and gnutls_free() functions. ↵Nikos Mavrogiannopoulos2002-12-071-4/+4
| | | | Actually pointers to functions.
* Changed the semantics of gnutls_pem_base64_encode_alloc()Nikos Mavrogiannopoulos2002-12-061-0/+4
| | | | | | | | | and gnutls_pem_base64_decode_alloc(). In the default case were the gnutls library is used with malloc/realloc/free, these are binary compatible. They now require the returned data to be freed using the gnutls_global_get_free_function().
* Added the new functions gnutls_get_malloc_function(), ↵Nikos Mavrogiannopoulos2002-12-061-0/+4
| | | | gnutls_get_free_function(). Also changed the way callback functions must allocate data. They now need to use these functions, instead of just calling malloc().
* *** empty log message ***Nikos Mavrogiannopoulos2002-12-021-1/+1
|
* Added the function gnutls_srp_server_set_credentials_function()Nikos Mavrogiannopoulos2002-12-011-0/+3
| | | | | to allow retrieving SRP parameters from an external backend - other than password files.