All Versions
14
Latest Version
Avg Release Cycle
127 days
Latest Release
-

Changelog History
Page 1

  • v0.2.8 Changes

    ๐Ÿ›  Fixed

    • Fixed an off by one error in the schannel backend's handling of max_protocol_version.
  • v0.2.7 Changes

    โž• Added

    • โž• Added support for ALPN in client APIs flagged under the alpn Cargo feature.
  • v0.2.6 Changes

    November 10, 2020

    ๐Ÿ›  Fixed

    • ๐Ÿ›  Fixed compilation on iOS.
  • v0.2.5 Changes

    November 06, 2020

    โž• Added

    • Added TlsConnectorBuilder::disable_built_in_roots to only trust root certificates explicitly added to the builder.

    โšก๏ธ Updated

    • โšก๏ธ Updated security-framework to 2.0.
  • v0.2.4 Changes

    March 06, 2020

    โž• Added

    • โž• Added a Clone implementation for Identity.

    โšก๏ธ Updated

    • โšก๏ธ Updated security-framework to 0.4.
  • v0.2.3 Changes

    April 27, 2019

    ๐Ÿ›  Fixed

    • โž• Adding an already-trusted certificate to the root certificate set no longer triggers an error with OpenSSL.

    โšก๏ธ Updated

    • โšก๏ธ Updated security-framework to 0.3.
  • v0.2.2 Changes

    October 22, 2018

    ๐Ÿ›  Fixed

    • ๐Ÿ”Š Failure to load a root certificate on Android now logs a message rather than producing an error.
    • ๐Ÿ›  Fixed ordering of the certificate chain in the OpenSSL backend.
  • v0.2.1 Changes

    August 05, 2018

    โž• Added

    • The vendored Cargo feature will cause the crate to compile and statically link to a vendored copy of OpenSSL on platforms that use that backend.
  • v0.2.0 Changes

    June 26, 2018

    โž• Added

    • The openssl_probe crate is now used with the OpenSSL backend so that trusted root certificates will automatically be detected when statically linking to OpenSSL.
    • Root certificates are now automatically loaded from the Android trust root.
    • โž• Added Certificate::to_der to serialize an X509 certificate to DER.
    • Added TlsConnectorBuilder::danger_accept_invalid_certs to disable certificate verification.
    • โž• Added TlsAcceptor::new and TlsConnector::new to easily create an acceptor/connector with default settings.
    • โž• Added TlsStream::peer_certificate to obtain the peer's leaf certificate.
    • Added TlsStream::tls_server_end_point to retrieve RFC 5929 tls-server-end-point channel binding data.

    ๐Ÿ”„ Changed

    • ๐Ÿ”’ Upgraded to openssl 0.10 and security-framework 0.2.
    • Pkcs12 has been renamed to Identity, and Pkcs12::from_der has been renamed to Identity::from_pkcs12.
    • HandshakeError::Interrupted has been renamed to HandshakeError::WouldBlock.
    • ๐Ÿ’… TlsConnectorBuilder and TlsAcceptorBuilder are now "traditional"-style builders. Their methods are now infallible and return &mut Self to allow them to be chained together.
    • supported_protocols has been replaced by min_protocol_version and max_protocol_version on TlsConnectorBuilder and TlsAcceptorBuilder.
    • ๐Ÿ”ง SNI and hostname verification are now configured separately via TlsConnectorBuilder::use_sni and TlsConnectorBuilder::danger_accept_invalid_hostnames. They replace the TlsConnector::danger_connect_without_providing_domain_for_certificate_verification_and_server_name_indication method, which has been removed.

    โœ‚ Removed

    • ๐Ÿšš The backend-specific extension traits have been removed. We want to avoid exposing the specific version of the backend library in the public API to provide more flexibility.
  • v0.1.5 Changes

    January 11, 2018
    • ๐Ÿ”’ security-framework is now used on iOS instead of openssl
    • โž• Added the ability to load certificates from PEM (on everything except iOS)