Releases: mirleft/ocaml-tls
Releases · mirleft/ocaml-tls
v0.13.2
v0.13.1
CHANGES:
- Breaking: use deriving sexp_of instead of sexp. Constructing a state from
a sexp has not been supported (lead to exception), and is now removed
(#430 by @torinnd, continued in #431 by @hannesm) - Bugfix: TLS 1.3 client authentication with certificate, client side. This
used to work accidentally before 0.13.0 changed the signature algorithms
handling, now the right signature algorithm (as requested by server) is used.
(#431 @hannesm, @talex5 reported mirage/capnp-rpc#228) - adapt to x509 0.13.0 and mirage-crypto-ec 0.10.0 changes (#431 @hannesm)
v0.13.0
CHANGES:
- Remove static RSA and CBC ciphersuites from default configuration. The
default configuration now includes FFDHE and ECDHE key exchanges with RSA or
ECDSA/EdDSA certificates, and AEAD ciphers
(AES-GCM, AES-CCM, ChaCha20-Poly1305) (#429 by @hannesm) - Remove SHA1 from signature_algorithms in the default configuration
(#429 by @hannesm) - Support ECDSA and EdDSA certificates and private keys via x509 0.12.0 and
mirage-crypto-ec (#428 by @hannesm)
Breaking changes:- the second part of type Tls.Config.certchain is now a X509.Private_key.t
(previously Mirage_crypto_pk.Rsa.priv) - the type aliases X509_lwt.priv and X509_lwt.authenticator have been removed
- the second part of type Tls.Config.certchain is now a X509.Private_key.t
- Use mirage-crypto-ec instead of fiat-p256 and hacl_x25519 for elliptic curve
support - this adds P384 and P521 ECDH support (#428 by @hannesm) - Remove custom Monad implementation, use Result and Rresult instead
(#429 by @hannesm) - Remove Utils.Cs submodule, use Cstruct API instead (#429 by @hannesm)
- Breaking: Tls.Engine.ret type is now a result instead of a custom variant type
(#429 by @hannesm) - Breaking: Tls_lwt.Unix.epoch results in (Tls.Core.epoch_data, unit) result -
it was a custom error type previously (#429 by @hannesm)
v0.12.8
CHANGES:
- Re-add ECPointFormats hello extension (both client and server) to avoid
handshake failures with Go's TLS stack (RFC 8422 makes it optional, but go
(1.15.5) requires it) - reported by @jeffa5 at
https://discuss.ocaml.org/t/strange-prohibited-tls-1-2-cipher-suite-9d-issue/
fix by @hannesm #424