Revisions of aws-c-io

Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 993724 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 17)
- Update to version 0.13.0
  * Custom TLS key operation support
    + Add asserts to aws_retry_strategy refcounts. by @graebm in (#500)
    + Custom TLS key operation support by @TwistedTwigleg in (#501)
- from version 0.12.0
  * Remove support for legacy PQ Key Exchange Algorithms
    + Explicit warnings/error when default CA certificates
      not found by @graebm in (#498)
    + Remove support for legacy PQ Key Exchange Algorithms
      by @alexw91 in (#497)
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 988389 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 16)
- Update to version 0.11.2
  * Adds a channel task scheduling API that always uses the cross-thread
    task queue. This API guarantees serialized order-of-submission is
    order-of-execution. The default API does not guarantee this because
    tasks submitted on the event loop thread may jump ahead of tasks
    already in the cross-thread queue.
- from version 0.11.1
  * Fix error codes reported by windows sockets. by @graebm in (#489)
  * New: aws_socket_get_bound_address() by @graebm in (#491)
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 973729 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 15)
- Update to version 0.11.0
  * Input Stream API change by @TingDaoK in (#444)
  * Changed Input Stream API to be refcounted
- from version 0.10.22
  * Ensure that library init/cleanup can be called
    multiple times by @graebm in (#461)
- from version 0.10.21
  * Added ECC support for PKCS11 by @JamieHunter in (#479)
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 962340 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 14)
- Update to version 0.10.20
  * Deprecate macOS keychain path function
  * Improve errors when searching windows cert store
- from version 0.10.19
  * Fix possible memory leak in aws_tls_connection_options_copy.
    + Now the aws_tls_connection_options_copy function will clean up the
      options and release memory before copy into it. Please make sure
      the copy destination option is initialized/zero out before call
      the function.
- from version 0.10.18
  * Fix Certificate Chains for Windows
  * aws_pkcs11_lib_behavior validation and spelling
  * Fix aws-crt-swift by moving PKCS#11 headers
Adam Majer's avatar Adam Majer (adamm) accepted request 944715 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 13)
- Update to version 0.10.17
  * Event loop pinning + TLS updates
    + Support for channel creation with event loop pinning
    + Additional TLS tests
    + SCH_USE_STRONG_CRYPTO enabled by default on Windows
      (monitor for potential breakage)
John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) accepted request 944468 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 12)
- Update to version 0.10.16
  * Remove platform ifdefs from tls_channel_handler.h
    + This fixes iOS builds
- from version 0.10.15
  * BUGFIX: Fix crash when crash when s2n connection
    class fails to be created
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 937773 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 11)
- Update to version 0.10.14
  * Remove Windows.h from header
    + Removed Windows.h from public header
    + Improved error reporting when getaddrinfo() fail
    + Set default cpu_id on thread_options
    + Better use of const in aws_tls_ctx_pkcs11_options
- from version 0.10.13
  * Support PKCS#11 for mutual TLS on Unix platforms
    + Support PKCS#11 for mutual TLS on Unix platforms (#451)
- from version 0.10.12
  * Path API updates
    + Moved aws_path_exist checks over to the safe variant. (#448)
- from version 0.10.11
  * Updated S2N PQ Crypto cipher preference list
    + Add Round 3 Cipher Pref List to Allowlist (#447)
- from version 0.10.10
  * Removed file utils, moved to common
    + Replace tls double channel (#441)
      - Remove test first
      - Add codebuild job spec that will run downstream integration
        tests (aws-c-http) that exercise double tls
      - Add channel API to read from initial handler
- Rename devel package to "devel"
- Switch BuildRequires to use cmake() and pkgconfig() macros
Jan Engelhardt's avatar Jan Engelhardt (jengelh) accepted request 924624 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 10)
- Update to version 0.10.9
  + TLS 1.3 Support
    * Linux support for tls1.3 and switch to CRT-specific tls
      configurations when using s2n
    * Refactor pipe signal suppression to avoid logging spurious errors
- from version 0.10.8
  + Use ephemeral credentials for TLS on Windows
    * Update secure channel configuration to use credentials in an ephemeral manner
- from version 0.10.7
  + Fix CA override functions
    * This fixes the issue where "override_default_trust_store" functions did
      not actually override the system trust store on Linux and Apple platforms.
Adam Majer's avatar Adam Majer (adamm) accepted request 904578 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 9)
- Update to version 0.10.6
  + Managed thread handle release
    * Updates the managed thread system to properly release Windows thread
      handles. Requires an associated change in aws-c-common as well.
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 901155 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 8)
- Update to version 0.10.5
  + Fix SNI check when custom root-CA used on Apple devices.
    * Validate hostname on Mac when custom root-CA is used. (#396)
- from version 0.10.4
  + Revert Windows CRL checks on root CA override
    * On Windows only, reverts the cached CRL check when validating a server
      certificate chain using a root CA override. This check was added as part
      of a larger change performing SNI validation with a root CA override (#385).
      The SNI check remains in place. The CRL check was breaking tls connections
      for multiple customers and appears to be subject to properties of the host
      beyond the CRT's control.
- from version 0.10.3
  + Inconsistent trust store override behavior logged
    * Added warning statement when trust store override is used (#394)
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 899023 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 7)
- Update to version 0.10.2
  + iOS fix
    * Removed call to sanitize pems on iOS (#391)
- from version 0.10.1
  + Fix Windows verify_peer = false issue in client mode
    * Previously on Windows, we were not properly translating "verify_peer = false"
      into a secure channel configuration that would actually skip peer verification
      in client mode. We were always verifying the certificate no matter what the
      setting's value.
- from version 0.10.0
  + All uses of aws_off_t replaced with int64_t
    * CHANGE: All uses of aws_off_t replaced with int64_t. aws_off_t used to be 32 or
      64 bits, depending on a project's compiler flags. This was leading to bugs when
      projects had different flags. Now in64_t is used instead. Beginning in aws-c-common
      v0.6.0, aws_off_t is simply a typedef for int64_t, so hopefully this change is painless
      for consumers.
- from version 0.9.14
  + Windows warnings
    * Fix some Windows compile warnings that are not currently being caught by local CI and
      only showing up in the publishing pipeline
- from version 0.9.13
  + Improve SNI validation, socket read error checking
    * On Windows, properly do SNI and server cert chain verification when the
      root CA has been overridden
    * On Posix systems, check socket read error before making any potential log
      calls which could overwrite the error info via internal sys calls
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 893115 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 6)
- Update to version 0.9.12
  + TLS Context Initialization fix
    * Fixes an issue where TLS context initialization could fail on
      Linux due to passing in buffers that weren't properly zero-
      terminated at their final length
- from version 0.9.11
  + Path URI Encoding Bugfix
    * Fix for some characters not being correctly URI-encoded in the path
      URI encode function.
- from version 0.9.10
  + Bugfix for shutdown race condition
    * Fix for shutdown crash when peer hangs up immediately
      following first non-TLS write (#379)
    * Fixed ownership semantics in SecureTransport read_message
- from version 0.9.9
  + Support non-ascii file path
    * Use aws_fopen to support non-ASCII file path for file stream
Dirk Mueller's avatar Dirk Mueller (dirkmueller) accepted request 888441 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 5)
- Update to version 0.9.8
  + Mac TLS API update
    * Small update to Mac TLS keychain API signature
- from version 0.9.7
  + Fixing bug with aws_input_stream_new_from_file
    * Changing fopen flags used by aws_input_stream_new_from_file to r+b
      instead of r, which fixes a Windows issue where the stream may terminate
      early due to an EOF character.
- from version 0.9.6
  + Windows ECC platform synchronization
    * (Windows only) Synchronizes ECC import logic with the compilation/cmake
      switch that links NCrypt in aws-c-cal
- from version 0.9.5
  + Mac Keychain and Windows ECC certs
    * Hardened Windows certificate import process
    * Added support for importing ECC certs/keys in Windows
    * Added support for overriding the keychain on Macintosh
- from version 0.9.4
  + PEM comments support
    * Support comments in PEM file.
- from version 0.9.3
  + Platform compiler fixes and TLS shutdown delay
    * Misc compiler fixes on Windows
    * Improve Mac foundation library integration
    * honor s2n's tls shutdown delay on linux when applicable
    * ASAN CI integration and resulting fixes
- from version 0.9.2
  + Support for bring your own crypto TLS implementation on Unix platforms
    * Added support for bring your own crypto via the cmake -DBYO_CRYPTO flag
- from version 0.9.1
Adam Majer's avatar Adam Majer (adamm) accepted request 861626 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 3)
- Update to version 0.8.0
  + NUMA-aware event-loops
  + Host resolver improvements
  + Best of two event-loop load balancing
  + Windows build fix for iocp event loop (#346)
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 856426 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 2)
- Update to version 0.7.1
  + Host resolver creation update
    * Modifies the default host resolver creation function to take an options struct
Adam Majer's avatar Adam Majer (adamm) accepted request 851119 from John Paul Adrian Glaubitz's avatar John Paul Adrian Glaubitz (glaubitz) (revision 1)
- Add new package aws-c-io as a transistive dependency for aws-c-eventstreams
Displaying revisions 41 - 57 of 57
openSUSE Build Service is sponsored by