ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/NEWS
(Generate patch)

Comparing gvpe/NEWS (file contents):
Revision 1.108 by root, Fri Jul 5 10:04:21 2013 UTC vs.
Revision 1.112 by root, Sat Jul 13 04:10:29 2013 UTC

1GVPE NEWS 1GVPE NEWS
2 2
3New option OPENSSL_NO_SSL_INTERN. If an application can be compiled
4 with this defined it will not be affected by any changes to ssl internal
5 structures. Add several utility functions to allow openssl application
6 to work with OPENSSL_NO_SSL_INTERN defined.
7 [Steve Henson]
8TODO: bridge mode, finally? 3TODO: bridge mode, finally?
4TODO: gcm mode?
5TODO: replace ripemd160 as the only authentication hash.
6TODO: increase rsa size.
9 7
10 - INCOMPATIBLE CHANGE: no longer enable udp protocol if no other 8 - INCOMPATIBLE CHANGE: no longer enable udp protocol if no other
11 protocols are enabled - this is necessary when you have nodes with 9 protocols are enabled - this is necessary when you have nodes with
12 completely unknown protocols, to force mediated connection requests. 10 completely unknown protocols, to force mediated connection requests.
13 - INCOMPATIBLE CHANGE: dns transport protocol bumped to version 2. 11 - INCOMPATIBLE CHANGE: dns transport protocol bumped to version 2.
12 - core protocol version 0.1, compatible with older releases.
14 - switch to using RSA_generate_key_ex, which is the undocumented 13 - switch to using RSA_generate_key_ex, which is the badly documented
15 and needlessly more complicated replacement for the RSA_generate_key 14 and needlessly more complicated replacement for the RSA_generate_key
16 function which is now deprecated. 15 function which is now deprecated.
16 - support additional hmac hashes: sha256 and sha512, usually truncated.
17 - change public exponent for rsa keys from 65535 to 65537, for 17 - change public exponent for rsa keys from 65535 to 65537, for
18 efficiency reasons. 18 efficiency reasons - only affects new keys.
19 - nodes would sometimes declare transport endpoints valid despite 19 - nodes would sometimes declare transport endpoints valid despite
20 the protocol not being configured locally. 20 the protocol not being configured locally.
21 - core protocol version 0.1, compatible with older releases.
22 - new global configuration options: chroot, chuser, chuid, chgid, 21 - new global configuration options: chroot, chuser, chuid, chgid,
23 to chroot to a specified or anonymous new root, and change user id. 22 to chroot to a specified or anonymous new root, and change user id.
23 - new global configuration options seed_device and seed_interval,
24 to configure another device than /dev/urandom for random seeds,
25 and to configure a regular imterval to reseed the rng.
24 - prefer inet_aton over gethostbyname, as the latter is not guaranteed 26 - prefer inet_aton over gethostbyname, as the latter is not guaranteed
25 to "resolve" literal ip addresses. 27 to "resolve" literal ip addresses.
26 - configure didn't detect openssl 1.0 because SHA1_version became private 28 - configure didn't detect openssl 1.0 because SHA1_version became private
27 (patch by TANIGUCHI Takaki). 29 (patch by TANIGUCHI Takaki).
28 - fix a bug where nodes would tell the other side that it supports 30 - fix a bug where nodes would tell the other side that it supports
101 - work around the horribly inconsistent, ad-hoc, ever-changing 103 - work around the horribly inconsistent, ad-hoc, ever-changing
102 and broken texinfo syntax. YMMV. avoid texinfo. 104 and broken texinfo syntax. YMMV. avoid texinfo.
103 - keepalive is more aggressive now, sensding ping's every 3 seconds 105 - keepalive is more aggressive now, sensding ping's every 3 seconds
104 and killing the conenction after 15 seconds. 106 and killing the conenction after 15 seconds.
105 - bugfixes. 107 - bugfixes.
108 - autoconf 2.69, automake 1.11.
106 109
1072.01 Thu Mar 29 19:26:04 CEST 2007 1102.01 Thu Mar 29 19:26:04 CEST 2007
108 - protocol version 0.1, compatible with older releases. 111 - protocol version 0.1, compatible with older releases.
109 - bugfix of callback.h, might have cause callback return values to 112 - bugfix of callback.h, might have cause callback return values to
110 be corrupted on architectures like sparc before. 113 be corrupted on architectures like sparc before.

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines