Skip to content

Releases: mirleft/ocaml-tls

0.15.5

25 Oct 20:16
Compare
Choose a tag to compare

CHANGES:

0.15.4

27 Sep 11:54
Compare
Choose a tag to compare

CHANGES:

0.15.3

29 Mar 20:16
Compare
Choose a tag to compare

CHANGES:

0.15.2

14 Nov 14:55
Compare
Choose a tag to compare

CHANGES:

0.15.1

29 Oct 10:56
Compare
Choose a tag to compare

CHANGES:

  • Tls_lwt: avoid exception if connect is executed with a non-host name string
    (e.g. an IP address) (#441 @hannesm)
  • Bugfix: log a warning if certificate decoding fails (#441 @hannesm)
  • Remove rresult dependency (#441 @hannesm)

0.15.0

07 Oct 14:55
Compare
Choose a tag to compare

CHANGES:

0.14.1

13 Sep 12:59
Compare
Choose a tag to compare

CHANGES:

  • Bugfix: do not filter signature_algorithms based on server certificate. Since
    signature_algorithms is also used for client authentication (as
    SignatureAlgorithms extension in CertificateVerify), previously the client
    needed the same key type as the server.
    Discovered in robur-coop/albatross@df434da

0.14.0

02 Aug 09:07
Compare
Choose a tag to compare

CHANGES:

  • Breaking: peer_name (in config and epoch data, also own_name) is now a
    [`host] Domain_name.t instead of a string. (#434 #438 @torinnd @hannesm)
  • Add a X509_async module (#435 @torinnd)
  • Client and server constructor log messages are on the debug level (#436
    reported by @talex5, fix by @hannesm)
  • Adapt to cstruct 6.0.0 API (Cstruct.len is deprecated) #439 @hannesm

v0.13.2

04 Jun 14:45
Compare
Choose a tag to compare

CHANGES:

v0.13.1

22 Apr 16:11
Compare
Choose a tag to compare

CHANGES:

  • Breaking: use deriving sexp_of instead of sexp. Constructing a state from
    a sexp has not been supported (lead to exception), and is now removed
    (#430 by @torinnd, continued in #431 by @hannesm)
  • Bugfix: TLS 1.3 client authentication with certificate, client side. This
    used to work accidentally before 0.13.0 changed the signature algorithms
    handling, now the right signature algorithm (as requested by server) is used.
    (#431 @hannesm, @talex5 reported mirage/capnp-rpc#228)
  • adapt to x509 0.13.0 and mirage-crypto-ec 0.10.0 changes (#431 @hannesm)