[blfs-book] [BLFS Trac] #8420: gnutls-3.5.5

2016-10-10 Thread BLFS Trac via blfs-book
#8420: gnutls-3.5.5
-+-
 Reporter:  bdubbs@… |  Owner:  blfs-book@…
 Type:  enhancement  | Status:  new
 Priority:  normal   |  Milestone:  7.11
Component:  BOOK |Version:  SVN
 Severity:  normal   |   Keywords:
-+-
 New point version.

--
Ticket URL: 
BLFS Trac 
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Re: [blfs-book] [BLFS Trac] #8420: gnutls-3.5.5

2016-10-10 Thread BLFS Trac via blfs-book
#8420: gnutls-3.5.5
-+--
 Reporter:  bdubbs@… |   Owner:  blfs-book@…
 Type:  enhancement  |  Status:  new
 Priority:  normal   |   Milestone:  7.11
Component:  BOOK | Version:  SVN
 Severity:  normal   |  Resolution:
 Keywords:   |
-+--
Description changed by renodr:

Old description:

> New point version.

New description:

 New point version..


 {{{
 Hello,
  I've just released gnutls 3.5.5. This is an enhancements and
 bugfix release for the 3.5.x branch.

 * Version 3.5.5 (released 2016-10-09)

 ** libgnutls: enhanced gnutls_certificate_set_ocsp_status_request_file()
to allow importing multiple OCSP request files, one for each chain
provided.

 ** libgnutls: The gnutls_certificate_set_key* functions return an
index of the added chain. That index can be used either with
gnutls_certificate_set_ocsp_status_request_file(), or with
gnutls_certificate_get_crt_raw() and friends.

 ** libgnutls: Added SHA*, AES-GCM, AES-CCM and AES-CBC optimized
 implementations
for the aarch64 architecture. Uses Andy Polyakov's assembly code.

 ** libgnutls: Ensure proper cleanups on gnutls_certificate_set_*key()
failures due to key mismatch. This prevents leaks or double freeing
on such failures.

 ** libgnutls: Increased the maximum size of the handshake message hash.
This will allow the library to cope better with larger packets, as
the ones offered by current TLS 1.3 drafts.

 ** libgnutls: Allow to use client certificates despite them containing
disallowed algorithms for a session. That allows for example a client
to use DSA-SHA1 due to his old DSA certificate, without requiring him
to enable DSA-SHA1 (and thus make it acceptable for the server's
 certificate).

 ** libgnutls: Reverted AESNI code on x86 to earlier version as the
latest version was creating position depending code. Added checks
in the CI to detect position depending code early.

 ** guile: Update code to the I/O port API of Guile >= 2.1.4
This makes sure the GnuTLS bindings will work with the forthcoming 2.2
stable series of Guile, of which 2.1 is a preview.

 ** API and ABI modifications:
 gnutls_certificate_set_ocsp_status_request_function2: Added
 gnutls_session_ext_register: Added
 gnutls_session_supplemental_register: Added
 GNUTLS_E_PK_INVALID_PUBKEY: Added
 GNUTLS_E_PK_INVALID_PRIVKEY: Added

 }}}

--

--
Ticket URL: 
BLFS Trac 
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page