forked from pool/gnutls
Accepting request 294011 from Base:System
- updated to 3.3.13 (released 2015-03-30) ** libgnutls: When retrieving OCTET STRINGS from PKCS #12 ContentInfo structures use BER to decode them (requires libtasn1 4.3). That allows to decode some more complex structures. ** libgnutls: When an end-certificate with no name is present and there are CA name constraints, don't reject the certificate. This follows RFC5280 advice closely. Reported by Fotis Loukos. ** libgnutls: Fixed handling of supplemental data with types > 255. Patch by Thierry Quemerais. ** libgnutls: Fixed double free in the parsing of CRL distribution points certificate extension. Reported by Robert Święcki. ** libgnutls: Fixed a two-byte stack overflow in DTLS 0.9 protocol. That protocol is not enabled by default (used by openconnect VPN). ** libgnutls: The maximum user data send size is set to be the same for block and non-block ciphersuites. This addresses a regression with wine: https://bugs.winehq.org/show_bug.cgi?id=37500 ** libgnutls: When generating PKCS #11 keys, set CKA_ID, CKA_SIGN, and CKA_DECRYPT when needed. ** libgnutls: Allow names with zero size to be set using gnutls_server_name_set(). That will disable the Server Name Indication. Resolves issue with wine: https://gitlab.com/gnutls/gnutls/issues/2 OBS-URL: https://build.opensuse.org/request/show/294011 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/gnutls?expand=0&rev=82
This commit is contained in:
@@ -1,3 +1,36 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 1 14:26:31 UTC 2015 - meissner@suse.com
|
||||
|
||||
- updated to 3.3.13 (released 2015-03-30)
|
||||
|
||||
** libgnutls: When retrieving OCTET STRINGS from PKCS #12 ContentInfo
|
||||
structures use BER to decode them (requires libtasn1 4.3). That allows
|
||||
to decode some more complex structures.
|
||||
|
||||
** libgnutls: When an end-certificate with no name is present and there
|
||||
are CA name constraints, don't reject the certificate. This follows RFC5280
|
||||
advice closely. Reported by Fotis Loukos.
|
||||
|
||||
** libgnutls: Fixed handling of supplemental data with types > 255.
|
||||
Patch by Thierry Quemerais.
|
||||
|
||||
** libgnutls: Fixed double free in the parsing of CRL distribution points certificate
|
||||
extension. Reported by Robert Święcki.
|
||||
|
||||
** libgnutls: Fixed a two-byte stack overflow in DTLS 0.9 protocol. That
|
||||
protocol is not enabled by default (used by openconnect VPN).
|
||||
|
||||
** libgnutls: The maximum user data send size is set to be the same for
|
||||
block and non-block ciphersuites. This addresses a regression with wine:
|
||||
https://bugs.winehq.org/show_bug.cgi?id=37500
|
||||
|
||||
** libgnutls: When generating PKCS #11 keys, set CKA_ID, CKA_SIGN,
|
||||
and CKA_DECRYPT when needed.
|
||||
|
||||
** libgnutls: Allow names with zero size to be set using
|
||||
gnutls_server_name_set(). That will disable the Server Name Indication.
|
||||
Resolves issue with wine: https://gitlab.com/gnutls/gnutls/issues/2
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Mar 25 20:52:43 UTC 2015 - astieger@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user