Skip to content

Releases: mirleft/ocaml-tls

v0.13.0

14 Apr 09:38
f9dd61f
Compare
Choose a tag to compare

CHANGES:

  • Remove static RSA and CBC ciphersuites from default configuration. The
    default configuration now includes FFDHE and ECDHE key exchanges with RSA or
    ECDSA/EdDSA certificates, and AEAD ciphers
    (AES-GCM, AES-CCM, ChaCha20-Poly1305) (#429 by @hannesm)
  • Remove SHA1 from signature_algorithms in the default configuration
    (#429 by @hannesm)
  • Support ECDSA and EdDSA certificates and private keys via x509 0.12.0 and
    mirage-crypto-ec (#428 by @hannesm)
    Breaking changes:
    • the second part of type Tls.Config.certchain is now a X509.Private_key.t
      (previously Mirage_crypto_pk.Rsa.priv)
    • the type aliases X509_lwt.priv and X509_lwt.authenticator have been removed
  • Use mirage-crypto-ec instead of fiat-p256 and hacl_x25519 for elliptic curve
    support - this adds P384 and P521 ECDH support (#428 by @hannesm)
  • Remove custom Monad implementation, use Result and Rresult instead
    (#429 by @hannesm)
  • Remove Utils.Cs submodule, use Cstruct API instead (#429 by @hannesm)
  • Breaking: Tls.Engine.ret type is now a result instead of a custom variant type
    (#429 by @hannesm)
  • Breaking: Tls_lwt.Unix.epoch results in (Tls.Core.epoch_data, unit) result -
    it was a custom error type previously (#429 by @hannesm)

v0.12.8

08 Dec 11:51
Compare
Choose a tag to compare

CHANGES:

v0.12.7

04 Dec 12:09
Compare
Choose a tag to compare

CHANGES:

  • Tls.lwt: make the receive buffer connection-local to avoid potential data
    races (#422 by @dinosaure)
  • Tls_mirage: remove unneeded type alias (@hannesm)
  • Add Tls.Config.Ciphers.http2 - a list of ciphersuites allowed to be negotiated
    for HTTP2 sessions (#423 by @jeffa5)

v0.12.6

05 Nov 23:29
Compare
Choose a tag to compare

CHANGES:

v0.12.5

22 Sep 13:56
Compare
Choose a tag to compare

CHANGES:

  • Rename length to v_length to be compatible with cstruct 6.0.0 (#419 @dinosaure)

v0.12.4

08 Aug 10:57
8ab44be
Compare
Choose a tag to compare

CHANGES:

  • handshake_server13: demote group and cipher log level (#417 by @xguerin)
  • tls_lwt: register printers for Tls_alert and Tls_failure (#418 by @hannesm)

v0.12.3

04 Jul 19:45
Compare
Choose a tag to compare

CHANGES:

  • Adapt to new GCM and CCM API of mirage-crypto (#416 by @hannesm)
  • Add support for ChaCha20/Poly1305 ciphersuite (#416 by @hannesm)

v0.12.2

20 Jun 11:27
Compare
Choose a tag to compare

CHANGES:

  • tls_lwt again calls Mirage_crypto_rng_lwt.initialize () -- which is since
    mirage-crypto-rng 0.8 no longer inside the lwt monad, and safe to be called
    multiple times and on top level (#415 by @hannesm)

v0.12.1

12 Jun 16:10
Compare
Choose a tag to compare

CHANGES:

in #414 by @hannesm

  • Drop support for RC4 ciphersuite
  • Raise lower TLS version in default configuration to 1.2
  • tls_lwt no longer calls Mirage_crypto_rng_unix.initialize -- this needs to be
    done in the application, inside Lwt_main.run:
    Mirage_crypto_rng_lwt.initialize () >>= fun () ->
  • Support ECDHE ciphersuites in TLS 1.2 and below as specified in RFC 8422
    (requested in #413 by @ryanakca, also in #362 by @orbitz @annubiz)
  • drop "TLS_" prefix from ciphersuite constructors
  • BUGFIX: TLS client (<= 1.2) assembling an empty Certificate message
    (noticed in #413, present since 0.12.0 release)
  • Cleanup Packet.any_ciphersuite list (remove ARIA, CAMELLIA, KRB5, EXPORT)
  • Adapt interoperability test scripts with TLS 1.3 support

v0.12.0

12 May 14:37
Compare
Choose a tag to compare

CHANGES:

in #405 by @hannesm

  • TLS 1.3 support
  • Tracing now uses the logs library (log source tls.tracing on debug level)
  • bugfix for padding in ClientHello, which computed wrong length
  • bugfix hs_fragments to be set before executing the protocol handling logic
  • bugfix guard RSA signature with an Insufficient_key handler, which may occur
    when using an RSA key which size is too small for the used digest algorithm