summaryrefslogtreecommitdiffstats
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog52431
1 files changed, 52431 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
new file mode 100644
index 0000000..913e6bc
--- /dev/null
+++ b/ChangeLog
@@ -0,0 +1,52431 @@
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Feb 9 09:39:41 2023 +0100
+
+ Release 3.7.9
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Tue Jan 3 09:06:01 2023 +0100
+
+ Update year of copyright notices in doc/gnutls.texi
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Hubert Kario <hkario@redhat.com>
+Date: Wed Feb 8 14:43:45 2023 +0100
+
+ document the CVE fix
+
+ Signed-off-by: Hubert Kario <hkario@redhat.com>
+
+Author: Hubert Kario <hkario@redhat.com>
+Date: Wed Feb 8 14:32:09 2023 +0100
+
+ rsa: remove dead code
+
+ since the `ok` variable isn't used any more, we can remove all code
+ used to calculate it
+
+ Signed-off-by: Hubert Kario <hkario@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Aug 9 16:05:53 2022 +0200
+
+ auth/rsa: side-step potential side-channel
+
+ Remove branching that depends on secret data.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+ Signed-off-by: Hubert Kario <hkario@redhat.com>
+ Tested-by: Hubert Kario <hkario@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Sep 21 14:56:49 2022 +0200
+
+ Release 3.7.8
+
+ Not bumping LT_CURRENT / LT_AGE since abi-check reports no changes.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Sep 21 14:26:55 2022 +0200
+
+ NEWS: add an entry for allowlisting-relaxing functions restriction
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 19 07:40:01 2022 +0900
+
+ accelerated: avoid symbol export mismatch with _gnutls_x86_cpuid_s
+
+ If the LD doesn't have support for version scripts,
+ _gnutls_x86_cpuid_s is exported through libtool's
+ --export-symbols-regex and that causes link error with clang:
+
+ libtool: link: nmedit -s .libs/libgnutls-symbols.expsym .libs/libgnutls.30.dylib
+ /Library/Developer/CommandLineTools/usr/bin/nmedit: error: symbols names listed in: .libs/libgnutls-symbols.expsym not in: /opt/local/var/macports/build/_Users_marius_Development_MacPorts_ports_devel_gnutls/gnutls-devel/work/gnutls-3.7.5/lib/.libs/libgnutls.30.dylib
+ __gnutls_x86_cpuid_s
+ make[4]: *** [libgnutls.la] Error 1
+
+ This patch renames _gnutls_x86_cpuid_s to GNUTLS_x86_cpuid_s to avoid
+ the issue.
+
+ Problem investigated and fix suggested by Clemens Lang in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1370#note_967832583
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 18 17:38:46 2022 +0900
+
+ compress-cert: support compression of client certificates
+
+ Previously the compress_certificate extension was sent by the server
+ as part of ServerHello, which violates RFC 8879. This patch instead
+ send it as an extension of CertificateRequest.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri Sep 9 13:32:16 2022 +0200
+
+ Report system config file location via gnutls-cli
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Aug 20 11:06:07 2022 +0900
+
+ src: request tls-exporter only when unique master secrets are used
+
+ This is to comply with RFC9266 4.2.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 29 06:41:46 2022 +0900
+
+ gnutls_session_channel_binding: perform check on "tls-exporter"
+
+ According to RFC9622 4.2, the "tls-exporter" channel binding is only
+ usable when the handshake is bound to a unique master secret. This
+ adds a check whether either TLS 1.3 or extended master secret
+ extension is negotiated.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Aug 20 10:58:23 2022 +0900
+
+ doc: mention GNUTLS_CB_TLS_EXPORTER
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Doug Nazar <nazard@nazar.ca>
+Date: Tue Aug 16 01:47:49 2022 -0400
+
+ cipher: Ensure correct alignment
+
+ Unsigned math is required to calculate the current alignment.
+
+ Signed-off-by: Doug Nazar <nazard@nazar.ca>
+
+Author: Tobias Heider <tobias.heider@canonical.com>
+Date: Tue Aug 23 13:47:38 2022 +0200
+
+ Unload custom allocators in gnutls_crypto_deinit()
+
+ Closes #1398
+
+ Signed-off-by: Tobias Heider <tobias.heider@canonical.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 15 09:39:18 2022 +0900
+
+ accelerated: clear AVX bits if it cannot be queried through XSAVE
+
+ The algorithm to detect AVX is described in 14.3 of "Intel® 64 and IA-32
+ Architectures Software Developer’s Manual".
+
+ GnuTLS previously only followed that algorithm when registering the
+ crypto backend, while the CRYPTOGAMS derived SHA code assembly expects
+ that the extension bits are propagated to _gnutls_x86_cpuid_s.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 18 09:01:20 2022 +0900
+
+ srptool: resurrect default value for -i
+
+ The default option value for -i (--index) was dropped during the
+ cligen conversion. This adds it back for compatibility with the
+ existing command line usage.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 18 09:00:44 2022 +0900
+
+ cligen: update git submodule
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Aug 16 10:34:05 2022 +0200
+
+ tests: add fips-rsa-sizes
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Feb 16 14:36:48 2022 +0100
+
+ update documentation on allowlisting API
+
+ (in a separate commit so that it's easier to compare)
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Feb 16 14:28:18 2022 +0100
+
+ plumb allowlisting API through the config, restrict usage to early times
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Mon Aug 15 23:50:16 2022 +0300
+
+ windows: Avoid -Wint-conversion errors
+
+ Clang 15 made "incompatible pointer to integer conversion" an error
+ instead of a plain warning. This fixes errors like these:
+
+ system/keys-win.c:257:13: error: incompatible pointer to integer conversion initializing 'HCRYPTHASH' (aka 'unsigned long') with an expression of type 'void *' [-Wint-conversion]
+ HCRYPTHASH hHash = NULL;
+ ^ ~~~~
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Feb 15 16:26:52 2022 +0100
+
+ lib/priority: extract parts of cfg_apply into cfg_*_set_array*
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Feb 14 18:00:25 2022 +0100
+
+ lib/priority: move sigalgs filtering to set_ciphersuite_list
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 3 16:39:47 2022 +0900
+
+ nettle: mark RSA SigVer operation approved for known modulus sizes
+
+ SP800-131A rev2 suggests certain RSA modulus sizes under 2048
+ bits (1024, 1280, 1536, and 1792) may continue to be used for
+ signature verification but not for signature generation. This loosen
+ the current service indicator report to approve them.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 9 12:55:04 2022 +0900
+
+ nettle: check RSA modulus size in bits rather than bytes
+
+ Previously we checked RSA modulus size clamped to byte unit instead of
+ bits. This makes the check stricter by explicitly calculating the
+ modulus size in bits.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Aug 9 12:08:24 2022 +0200
+
+ fips: disable GNUTLS_CIPHER_3DES_CBC self-test
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 8 13:54:13 2022 +0900
+
+ .gitlab-ci.yml: mark all CI jobs interruptible
+
+ This allows previous pipelines to be cancelled if a new job is
+ submitted subsequently:
+ https://docs.gitlab.com/ee/ci/yaml/#interruptible
+
+ Suggested-by: Zoltán Fridrich <zfridric@redhat.com>
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Stanislav Zidek <szidek@redhat.com>
+Date: Mon Aug 8 23:07:21 2022 +0200
+
+ Moved TLS interoperability tests to submodule.
+
+ Signed-off-by: Stanislav Zidek <szidek@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Jul 31 10:28:15 2022 +0200
+
+ Avoid &> redirection bashism in testsuite
+
+ Broken by 7b700dbcd5907944a7dd2f74cd26ad8586cd4bac
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Stanislav Zidek <szidek@redhat.com>
+Date: Thu Feb 11 13:57:27 2021 +0100
+
+ interoperability testing with openssl
+
+ GitLab CI extended to run 2way interoperability tests with openssl on
+ Fedora. Also prepared for adding further interoperability tests once
+ they are in better shape.
+
+ Signed-off-by: Stanislav Zidek <szidek@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 4 16:37:51 2022 +0900
+
+ _gnutls_decrypt_pbes1_des_md5_data: use public crypto API
+
+ This is a follow-up of e7f9267342bc2231149a640163c82b63c86f1dfd. In
+ the decryption code path with PBES1, algorithm checks for FIPS was not
+ applied, because it used internal functions that bypass those checks.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Simon Josefsson <jas@josefsson.org>
+Date: Sat Jul 30 21:06:42 2022 +0200
+
+ Update doc for GNUTLS_CB_TLS_EXPORTER towards RFC9266.
+
+ Signed-off-by: Simon Josefsson <simon@josefsson.org>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri Jul 29 10:38:42 2022 +0200
+
+ KTLS: hotfix
+
+ session->internals.pull_func is set to system_read during gnutls_init()
+ so check for user set pull/push function added in commit mentioned
+ bellow will never pass.
+
+ source: 2d3cba6bb21acb40141180298f3924c73c7de8f8
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Jul 28 12:49:59 2022 +0200
+
+ Release 3.7.7
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jul 26 11:39:57 2022 +0900
+
+ socket: only set pull/push functions when --save-*-trace is used
+
+ This allows gnutls-cli to use KTLS for the transport, unless either
+ --save-client-trace or --save-server-trace is used.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jul 26 11:38:41 2022 +0900
+
+ handshake: do not enable KTLS if custom pull/push functions are set
+
+ If gnutls_transport_set_pull_function or
+ gnutls_transport_set_push_function is used, we can't assume the
+ underlying transport handle is an FD.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri Jul 22 12:00:11 2022 +0200
+
+ Fix double free during gnutls_pkcs7_verify
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jul 27 20:23:26 2022 +0900
+
+ guile: revert gnutls/build/tests.scm to use use-modules
+
+ This partially reverts e727eb7901a3f1754de970c8529925ae3d591b90. For
+ some reason, the usage of #:use-module causes some behavioral
+ difference that affects reauth.scm test.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Mon Jul 25 16:07:54 2022 +0200
+
+ Fix memory leak in gnutls_pkcs7_import
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jul 14 15:19:23 2022 +0900
+
+ crypto-api: add block cipher API with automatic padding
+
+ This adds a couple of functions gnutls_cipher_encrypt3 and
+ gnutls_cipher_decrypt3, which add or remove padding as necessary if
+ the length of the plaintext is not a multiple of the block size.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 22 11:54:29 2022 +0900
+
+ tests: temporarily disable checking against unresolvable hosts
+
+ *.dane.verisignlabs.com and fedoraproject.org are no longer
+ resolvable.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jul 20 15:00:10 2022 +0900
+
+ src: add __attribute__((malloc)) to safe_open_rw
+
+ This silences -Wsuggest-attribute=malloc warning with GCC 12. While
+ we could use ATTRIBUTE_DEALLOC(fclose, 1), it is currently not
+ possible to use it until Gnulib is updated.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jul 20 14:54:48 2022 +0900
+
+ src: add NULL check on return value of realloc used in tests
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 30 21:24:23 2022 +0900
+
+ tests: resume-with-previous-stek: initialize session data
+
+ Spotted by gcc-analyzer 12.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 30 21:23:31 2022 +0900
+
+ tests: add __attribute__((__noreturn__)) to _fail and fail_ignore
+
+ To suppress warnings with gcc-analyzer 12.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 30 21:13:53 2022 +0900
+
+ crypto-selftests: fix decryption check condition in test_cipher_aead
+
+ Spotted by gcc-analyzer 12.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 30 20:57:30 2022 +0900
+
+ x509, tpm2: use asn1_node instead of deprecated ASN1_TYPE
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sun Jul 10 23:41:26 2022 +0200
+
+ guile: Allow session record ports to have a 'close' procedure.
+
+ This addition makes it easy to close the backing file descriptor or port
+ of a session when its record port is closed.
+
+ * guile/src/core.c (SCM_GNUTLS_SESSION_RECORD_PORT_SESSION): Add SCM_CAR.
+ (SCM_GNUTLS_SESSION_RECORD_PORT_CLOSE_PROCEDURE)
+ (SCM_GNUTLS_SET_SESSION_RECORD_PORT_CLOSE)
+ (SCM_GNUTLS_SESSION_RECORD_PORT_P)
+ (SCM_VALIDATE_SESSION_RECORD_PORT): New macros.
+ (make_session_record_port): Change "stream" argument to a pair.
+ (close_session_record_port): New function.
+ (scm_gnutls_session_record_port): Add optional 'close' parameter and
+ honor it.
+ (scm_gnutls_set_session_record_port_close_x): New function.
+ (scm_init_gnutls_session_record_port_type): Add call to
+ 'scm_set_port_close' and 'scm_set_port_needs_close_on_gc'.
+ * guile/tests/session-record-port.scm: Test it.
+ * NEWS: Update.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sun Jul 10 17:03:03 2022 +0200
+
+ guile: Remove support for the 1.8.x series.
+
+ The last Guile 1.8.x release dates back to 2010.
+
+ * configure.ac: Remove 1.8 from 'GUILE_PKG'.
+ * doc/gnutls-guile.texi (Guile Preparations): Remove mention of Guile 1.8.
+ * guile/src/core.c (mark_session_record_port)
+ (free_session_record_port): Remove.
+ (scm_init_gnutls_session_record_port_type): Remove corresponding
+ 'scm_set_port_mark' and 'scm_set_port_free' calls.
+ * guile/modules/gnutls.in: Remove top-level 'cond-expand' forms for
+ Guile 1.8.
+ * guile/modules/gnutls/build/tests.scm: Likewise.
+ * NEWS: Update.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sun Jul 10 17:02:17 2022 +0200
+
+ maint: Update guile.m4.
+
+ * m4/guile.m4: Update from Guile 3.0.7.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Brad Smith <brad@comstyle.com>
+Date: Fri Jul 15 22:44:03 2022 -0400
+
+ accelerated: aarch64: add OpenBSD/aarch64 support
+
+ Signed-off-by: Brad Smith <brad@comstyle.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 27 11:14:50 2022 +0900
+
+ cipher: limit plaintext length supplied to AES-GCM
+
+ According to SP800-38D 5.2.1.1, input data length of AES-GCM
+ encryption function must be less than or equal to 2^39-256 bits.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sun Jul 10 18:54:54 2022 +0200
+
+ guile: Session record port treats premature termination as EOF.
+
+ * guile/src/core.c (do_fill_port) [USING_GUILE_BEFORE_2_2]: Treat
+ GNUTLS_E_PREMATURE_TERMINATION as EOF.
+ (read_from_session_record_port) [!USING_GUILE_BEFORE_2_2]: Likewise.
+ * guile/tests/premature-termination.scm: New file.
+ * guile/Makefile.am (TESTS): Add it.
+ * NEWS: Update.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Richard Costa <richard.costa@suse.com>
+Date: Sat Jul 9 00:50:21 2022 +0000
+
+ Add self-test code inside a FIPS context
+
+ Self-test code exercise lots of different FIPS-related code with
+ side-effects. So, in order to prevent it from losing information when
+ executing inside another context, we create an appropriated one.
+
+ If the self-test fails, then the library is placed in error state, so it
+ doesn't matter for other contexts.
+
+ Signed-off-by: Richard Maciel Costa <richard.costa@suse.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Tue May 10 15:20:45 2022 +0200
+
+ Increase the limit of TLS PSK usernames from 128 to 65535 characters
+
+ Co-authored-by: Hannes Reinecke <hare@suse.de>
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 1 08:04:57 2022 +0200
+
+ fips: make service indicator logging louder
+
+ Previously, the only way to monitor the FIPS context transtion was to
+ increase logging level to debug (2), which produces unrelated output.
+
+ This changes the minimum logging level to audit (1) for when the
+ transition happens.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 27 09:29:13 2022 +0900
+
+ nettle: restrict output size of HKDF-Expand to 255 * HashLen
+
+ RFC 5869 2.3 requires that requested output length of HKDF-Expand to
+ be equal to or less than 255 times hash output size.
+
+ Inspired by the report by Guido Vranken in:
+ https://lists.gnupg.org/pipermail/gcrypt-devel/2022-June/005328.html
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Jun 28 17:22:36 2022 +0200
+
+ tests/fips-test: minor extension
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 28 13:46:44 2022 +0900
+
+ .gitlab-ci.yml: add fedora-ktls pipeline
+
+ This is to ensure that the same testsuite succeeds even if we compile
+ the library with --enable-ktls and KTLS is enabled with a run-time
+ configuration.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 28 10:53:55 2022 +0900
+
+ ktls: _gnutls_ktls_enable: fix GNUTLS_KTLS_SEND calculation
+
+ Previously, if the first setsockopt for GNUTLS_KTLS_RECV fails and the
+ same socket is used for both sending and receiving, GNUTLS_KTLS_SEND
+ was unconditionally set. This fixes the conditions and also adds more
+ logging.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 28 10:23:33 2022 +0900
+
+ handshake: do not reset KTLS enablement in gnutls_handshake
+
+ As gnutls_handshake can be repeatedly called upon non-blocking setup,
+ we shouldn't try to call setsockopt for KTLS upon every call.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 28 09:37:22 2022 +0900
+
+ tests: enable KTLS config while running gnutls_ktls test
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Gregor Jasny <gjasny@googlemail.com>
+Date: Tue Jun 21 11:18:16 2022 +0200
+
+ README.md: explicitly install libtasn1-bin
+
+ Signed-off-by: Gregor Jasny <gjasny@googlemail.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Tue Jun 14 16:16:11 2022 +0200
+
+ KTLS: disable by default enable by config
+
+ KTLS will be disabled by default when build with `--enable-ktls` to
+ enable it, use config file option `ktls = true` in [global] section.
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 3 15:43:00 2022 +0900
+
+ fips: provide function to manually run FIPS self-tests
+
+ FIPS140-3 IG 10.3.E Periodic Self-Testing says:
+
+ At security levels 1 and 2, acceptable means for initiating the
+ periodic self-tests include a provided service, resetting, rebooting
+ or power cycling.
+
+ Neither resetting, rebooting, nor power-cycling is suitable because
+ those involve operations outside of the module. Therefore this patch
+ adds a new API to manually run the substance of FIPS140 self-tests.
+
+ Suggeested by Richard Costa and Stephan Mueller in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1364
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed May 18 15:38:21 2022 +0200
+
+ tests/suite/tls-fuzzer: remove most of the -n limiters...
+
+ ... since tlsfuzzer now sets reasonable (~<10s/script) limits
+ for most of the scripts by default
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed May 18 13:41:18 2022 +0200
+
+ tests/suite/tls-fuzzer: pin current error messages with -X
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun May 29 10:54:48 2022 +0900
+
+ build: Revert "Disable test scripts on windows"
+
+ This reverts commit d2b99e3b3429e9b9a6fbff46598fd4c6a0910f65.
+
+ It turned out that the test failures under mingw were caused by a
+ regression in wine 7.5, possibly:
+ https://bugs.winehq.org/show_bug.cgi?id=52743
+
+ Now that the latest wine package based on wine 7.9 has no issues with
+ running those test scripts, this enables them again in the build
+ process.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri May 27 09:17:55 2022 +0200
+
+ Release 3.7.6
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Asad Mehmood <asad78611@googlemail.com>
+Date: Mon May 23 14:35:46 2022 +0000
+
+ libdane: fix typo in Makefile.am
+
+ Signed-off-by: Asad Mehmood <asad78611@googlemail.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri May 13 14:37:05 2022 +0200
+
+ Add release steps for windows builds
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Wed May 18 11:43:26 2022 +0200
+
+ Fix out-of-bounds memcpy in gnutls_realloc_zero()
+
+ Co-authored-by: Tobias Heider <tobias.heider@canonical.com>
+ Co-authored-by: Daiki Ueno <ueno@gnu.org>
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu May 19 10:27:51 2022 +0200
+
+ Disable test scripts on windows
+
+ This is a temporary solution to avoid failures
+ of test scripts when ran on windows
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu May 12 10:38:23 2022 +0200
+
+ Release 3.7.5
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 10 09:52:26 2022 +0200
+
+ cligen: update git submodule
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri Apr 29 12:28:50 2022 +0200
+
+ Improve certificate sanity checks
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Mon Mar 28 17:49:22 2022 +0200
+
+ Fix psk_ke_modes_recv_params() wrongly setting HSK_PSK_KE_MODE_INVALID
+
+ If the preferred side (as per session->internals.priorities->server_precedence)
+ only supports one algorithm and if it is not the first in the other side's list
+ of algorithms, then psk_ke_modes_recv_params did wrongly set
+ session->internals.hsk_flags to HSK_PSK_KE_MODE_INVALID.
+
+ Fixes #1303
+
+ This issue was originally discovered while analyzing
+ https://forum.filezilla-project.org/viewtopic.php?t=54333
+
+ Signed-off-by: Tim Kosse <tim.kosse@filezilla-project.org>
+ Co-authored-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 7 10:07:01 2022 +0200
+
+ tests/cmocka-common.h: include <stdarg.h> before <cmocka.h>
+
+ As documented in <https://api.cmocka.org/group__cmocka.html#details>,
+ <stdarg.h> must be included before <cmocka.h>.
+
+ Suggested by Brad Smith in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1360
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 29 12:01:53 2022 +0200
+
+ configure.ac: check if compiler supports -Wa,-march=all
+
+ Clang from LLVM 13.0.0 caused a segumentation fault if an unknown
+ architecture is supplied through -march. While this has been fixed in
+ 13.0.1, until it is widely deployed this adds a configure check as a
+ safeguard:
+ https://github.com/llvm/llvm-project/commit/d31f8cc6884ba3cc3e088fd57c4c533868e8a8b2
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 15 11:27:20 2022 +0100
+
+ gnutls_aead_cipher_set_key: new function
+
+ This adds gnutls_aead_cipher_set_key, which enables to reuse the same
+ handle but reset the context and key, without releasing the memory.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 17 11:48:39 2022 +0100
+
+ crypto-api: support AES-SIV with scatter-gather API
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 17 11:17:46 2022 +0100
+
+ crypto-api: refactor iov_store_st operations
+
+ This replaces copy_from_iov to more generic append_from_iov.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 17 10:36:44 2022 +0100
+
+ crypto-api: split scatter-gather AEAD implementation to helper funcs
+
+ These _encryptv, _encryptv2, and _decryptv2 functions take orthogonal
+ code paths depending on whether the underlying AEAD implementation
+ supports message based API. This patch split the implementation to
+ dedicated helper functions.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 17 10:07:02 2022 +0100
+
+ crypto-api: add integer overflow checks around copying IOV
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu May 5 12:10:46 2022 +0200
+
+ Extend fipshmac to take a path to libgnutls.so
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 4 15:27:16 2022 +0200
+
+ .github/workflows/macos.yml: display tests/cert-tests/*.log
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 4 15:23:49 2022 +0200
+
+ lib/fips.c: suppress -Wdiscarded-qualifiers warning
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 4 15:22:16 2022 +0200
+
+ .gitignore: ignore tests/tls13/compress-cert*
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 4 15:19:17 2022 +0200
+
+ tests/cert-tests/pkcs12.sh: use portable sed invocations
+
+ The BSD sed doesn't recognize '\|' as the alternative operator, and
+ the last '}' must be preceded with a newline.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 21 08:07:25 2021 +0200
+
+ tls: add flag to disable session ticket in TLS 1.2
+
+ The existing GNUTLS_NO_TICKETS flag affects all versions of TLS, where
+ PFS is assured in TLS 1.3, while it is not in TLS 1.2. This adds a
+ new flag GNUTLS_NO_TICKETS_TLS12 to allow applications to disable
+ session tickets only in TLS 1.2.
+
+ As the only means of resumption in TLS 1.3 is using session tickets,
+ we could repurpose the GNUTLS_NO_TICKETS flag make it no-op in TLS
+ 1.3. However it would break backward compatibility, so we defer it to
+ the next major release.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 28 11:31:30 2021 +0100
+
+ session_ticket: avoid invalid free on error path
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 21 11:08:06 2021 +0200
+
+ _gnutls_version_max: return NULL if priorities are not populated
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 2 07:41:12 2022 +0200
+
+ m4: update from autoconf-archive
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 17 10:56:35 2022 +0200
+
+ .github/workflows/macos.yml: pull in gtk-doc
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Apr 28 12:17:16 2022 +0200
+
+ gnutls-cli, gnutls-serv: print supported channel binding
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Sep 4 07:16:18 2021 +0200
+
+ .gitlab-ci.yml: replace valgrind checks with ASan
+
+ Running the full test suite under valgrind wastes a lot of time and
+ may cause intermittent failures due to timeout. We have them mainly
+ for VALGRIND_MAKE_MEM_UNDEFINED client request, though the ASan tests
+ now cover the equivalent after
+ f23c3a6cba43706a6ebb3f9b0018cd658dcc0a72.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Apr 14 11:29:26 2022 +0200
+
+ Use packit to automate fedora upstream release
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
+Date: Sun Apr 24 17:03:18 2022 +0900
+
+ Preserve mbuffer type when linearized
+
+ Signed-off-by: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
+
+Author: Brian Wickman <bwickman97@outlook.com>
+Date: Thu Apr 21 05:52:36 2022 +0000
+
+ Fix for #1132
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 11 14:00:16 2022 +0200
+
+ .gitignore: ignore files generated by asn1Parser
+
+ These files are no longer maintained in the repository, after commit
+ 16061937.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 8 10:23:51 2022 +0200
+
+ cligen: update git submodule
+
+ This also reverts commit fd0e28a3 and changes how the cligen python
+ files are included in the distribution.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Tue Apr 12 16:34:52 2022 +0200
+
+ Small fips-test refactoring
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Mon Apr 11 16:04:38 2022 +0200
+
+ Add zeroization of some critical security parameters
+ to comply with FIPS-140-3 requirements
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Apr 10 13:22:22 2022 +0200
+
+ Document C++ soname bump in NEWS.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Mar 30 18:26:36 2022 +0200
+
+ Add missing gtk-doc for GNUTLS_COMP_BROTLI/ZSTD.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Mar 30 18:18:12 2022 +0200
+
+ Add missing copyright header
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Tue Apr 5 16:28:41 2022 +0200
+
+ Add missing FIPS service indicator transitions
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Wed Apr 6 15:33:32 2022 +0200
+
+ Remove 3DES from FIPS approved algorithms.
+ According to the section 2 of SP800-131A Rev.2, 3DES algorithm
+ will be disallowed for encryption after December 31, 2023:
+ https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Fri Apr 1 12:34:12 2022 +0200
+
+ Mark HKDF and AES-GCM as approved when used in TLS
+
+ Co-authored-by: Pedro Monreal <pmgdeb@gmail.com>
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Mar 31 15:50:51 2022 +0200
+
+ bootstrap.conf: use install-sh to copy cligen files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 19 10:01:09 2022 +0100
+
+ lib/{gnutls,pkix}_asn1_tab.c: remove autogenerated files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 19 10:00:08 2022 +0100
+
+ devel/README-ci.freebsd.md: stop mentioning autogen
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 19 09:59:58 2022 +0100
+
+ .github/workflows/macos.yml: stop installing autogen
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 19 09:53:54 2022 +0100
+
+ configure.ac: always assume GTK_DOC_CHECK macro
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Mar 31 14:28:32 2022 +0200
+
+ fips: simplify library integrity checking
+
+ This removes code duplication by grouping the path and hmac fields in
+ hmac_file structure.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Mar 31 10:13:06 2022 +0200
+
+ Increase length limit of PKCS#12 passwords
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri Mar 25 11:31:05 2022 +0100
+
+ ktls config documentation
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Benjamin Herrenschmidt <benh@kernel.crashing.org>
+Date: Thu Mar 31 08:57:07 2022 +1100
+
+ Fix off-by one exit condition in pkcs#11 priv keys lookup
+
+ In function find_privkeys(), the list-> array is allocated to be of size
+ lists->key_ids_size. "current" is the index where the next found key will
+ be written (starts at 0).
+
+ The current exit condition is thus incorrect:
+
+ if (current > list->key_ids_size)
+ break;
+
+ This will allow "current" to be equal to list->key_ids_size which will
+ potentially cause an overflow if more keys are returned by the loop than
+ was originally found when calculating that size.
+
+ This is very unlikely, but incorrect nonetheless.
+
+ Fix this by using the more classic construct of testing for the array bound
+ in the loop exit condition, as suggested by Daiki Ueno.
+
+ Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
+
+Author: Benjamin Herrenschmidt <benh@kernel.crashing.org>
+Date: Mon Mar 21 13:45:11 2022 +1100
+
+ Fix matching of last key of a pkcs#11 token
+
+ Retrieving the cert for the last key of a token fails due to an
+ off-by-one bug in find_privkeys():
+
+ In the loop that iterates the keys, "current" contains the index
+ of the "next" key slot, which is also the active "count" of populated
+ slots in the output struct find_pkey_list_st.
+
+ The current statement:
+
+ list->key_ids_size = current - 1;
+
+ Means we return a "key_ids_size" of the current count minus one, ie 0
+ for 1 key etc... However, this isn't what the callers expect, for example:
+
+ find_multi_objs_cb() does:
+
+ ret = find_privkeys(sinfo, tinfo, &plist);
+ if (ret < 0) {
+ gnutls_assert();
+ return ret;
+ }
+
+ if (plist.key_ids_size == 0) {
+ gnutls_assert();
+ return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE;
+ }
+
+ So a slot with a single key will fail when trying to find a certificate
+
+ Subsequent uses of "plist" in that function also show that it's expected
+ to contain the real slot count:
+
+ for (i = 0; i < plist.key_ids_size; i++) {
+
+ Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Wed Mar 23 16:55:51 2022 +0100
+
+ Consolidate FIPS .hmac files
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri Mar 18 11:37:10 2022 +0100
+
+ system config disable KTLS
+
+ Added option for system config `ktls = false` to disable ktls
+ system-wide
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Pedro Monreal <pmgdeb@gmail.com>
+Date: Tue Mar 22 13:01:53 2022 +0100
+
+ lib/crypto-selftests.c: Add a selftest for PBKDF2 that complies with FIPS 140-3.
+
+ Signed-off-by: Pedro Monreal <pmgdeb@gmail.com>
+
+Author: Tobias Heider <tobias.heider@canonical.com>
+Date: Mon Mar 14 16:17:28 2022 +0100
+
+ Use custom allocators for GMP to make sure temporary secrets
+ from cryptographic operations in nettle are deleted safely.
+
+ Signed-off-by: Tobias Heider <tobias.heider@canonical.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 18 08:10:12 2022 +0100
+
+ devel/release-steps.md: expand steps to generate tarball [ci-skip]
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 18 07:54:06 2022 +0100
+
+ NEWS: mention couple more changes in 3.7.4 release [ci-skip]
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Sam James <sam@gentoo.org>
+Date: Fri Mar 18 05:51:29 2022 +0000
+
+ configure.ac: fix zstd detection
+
+ Fixes typo in zstd detection.
+
+ None of the used autoconf macros will define `has_zstd_h` so
+ configure will (AFAICT) always fail to find zstd, even if it succeeded
+ via pkg-config moments before.
+
+ Drop it and rely solely on pkg-config as that's the only search
+ we're actually doing.
+
+ Fixes: https://gitlab.com/gnutls/gnutls/-/issues/1343
+ Signed-off-by: Sam James <sam@gentoo.org>
+
+Author: Sam James <sam@gentoo.org>
+Date: Fri Mar 18 05:40:28 2022 +0000
+
+ configure.ac: fix brotli/zstd configure argument name
+
+ The old `./configure` arguments for brotli and zstd respectively
+ were inconsistent with the `./configure --help` output.
+
+ Old: --without-libbrotli --without-libzstd (also --with-*)
+ New: --without-brotli --without-zstd (also --with-*)
+
+ Fixes: https://gitlab.com/gnutls/gnutls/-/issues/1342
+ Signed-off-by: Sam James <sam@gentoo.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 16 11:19:29 2022 +0100
+
+ cligen: update git submodule
+
+ To avoid emitting empty "list" substruct in header files, as well as
+ assuming the Python pwd module is always available.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Wed Mar 16 15:42:40 2022 +0100
+
+ Release 3.7.4
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Tue Mar 8 18:01:37 2022 +0100
+
+ Make gnutls compliant to RFC5280
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 14 16:03:07 2022 +0100
+
+ cli, serv: allow multiple --compress-cert options
+
+ This eliminates the need of parsing the comma separated list manually.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Tobias Heider <tobias.heider@canonical.com>
+Date: Sun Mar 13 23:58:42 2022 +0100
+
+ Handle all cases of calloc returning NULL.
+
+ Signed-off-by: Tobias Heider <tobias.heider@canonical.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri Mar 11 18:22:18 2022 +0100
+
+ Fix global-ini-handler
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 10 15:58:08 2022 +0100
+
+ Make option specification type-safe
+
+ This switches the CLI code and documentation generation to the
+ external cligen module, which provides more type-safe specification.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Tobias Heider <tobias.heider@canonical.com>
+Date: Wed Mar 9 01:18:20 2022 +0100
+
+ fips: use GNUTLS_FIPS140_STRICT instead of magic number.
+
+ Signed-off-by: Tobias Heider <tobias.heider@canonical.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 9 08:07:58 2022 +0100
+
+ locks: define lock functions as a macro
+
+ When threads are not supported, glthread_* functions are defined as
+ no-op and thus dereferencing lock variables in inline functions will
+ cause compilation error. This change fixes it by redefining our lock
+ functions as a macro so it will also be compiled out.
+
+ Reported by Fabrice Fontaine in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1330
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 9 07:25:01 2022 +0100
+
+ .gitlab-ci.yml: prolong timeout for slow CI jobs
+
+ Suggested by Marvin Scholz in:
+ https://gitlab.com/gnutls/gnutls/-/merge_requests/1543#note_859825412
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 23 19:48:52 2022 +0100
+
+ tpm2: dynamically load tss2 libraries as needed
+
+ libtss2-esys links to OpenSSL or mbed TLS for cryptography, which may
+ cause packaging issues. This instead dlopen's tss2 libraries as
+ needed so non-TPM applications continue working without loading
+ multiple crypto libraries.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Wed Jan 12 14:57:42 2022 +0100
+
+ Add compress_certificate extension (RFC8879)
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Craig Gallek <cgallek@gmail.com>
+Date: Sun Feb 27 10:39:07 2022 -0500
+
+ x509: fix return error code for failed decryption without key
+
+ Decrypting an encrypted private key previously returned
+ GNUTLS_E_DECRYPTION_FAILED when no password was supplied. This changed when
+ decryption via pin callbacks was added in d31b89de.
+
+ That change should have included a check for callback existence in order to
+ preserve the error path of the no-password case.
+
+ This adds the check and a test for the previous behavior.
+ Resolves bug #1321
+
+ Signed-off-by: Craig Gallek <cgallek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 24 09:55:01 2022 +0100
+
+ gnutls_record_send_file: make it work with non-blocking I/O
+
+ When either read() or gnutls_record_send() returns EAGAIN, just return
+ to the caller so it can call this function again, instead of retrying
+ internally.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Marvin Scholz <epirat07@gmail.com>
+Date: Wed Feb 23 19:03:51 2022 +0100
+
+ configure.ac: add missing Libs.private for macOS
+
+ On macOS the CoreFoundation and Security frameworks are used by
+ GnuTLS, however those were missing in the Libs.private in the .pc
+ resulting in link failures with static builds when relying on the
+ output of pkg-config --static.
+
+ Signed-off-by: Marvin Scholz <epirat07@gmail.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Wed Feb 16 11:25:11 2022 +0100
+
+ non-KTLS sendfile test
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Wed Feb 16 11:23:36 2022 +0100
+
+ non-KTLS sendfile
+
+ Added: sendfile API functionality for non KTLS enabled builds.
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 22 17:09:46 2022 +0100
+
+ algorithms: ensure _list() exclude non-existing algorithms
+
+ This aligns the behavior of _list() function for sign/pk to the one
+ for cipher/mac: the former previously returned all the algorithms
+ defined, while the latter returns only algorithms compiled in.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 22 17:25:26 2022 +0100
+
+ Revert "algorithms: compile out GOST algorithm IDs if they are disabled"
+
+ This reverts commit aa94bcbdaa55899f4f4ae13dc3e9a8c559354676.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Wed Feb 16 11:22:47 2022 +0100
+
+ auto-generated files update
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Tue Nov 16 12:05:53 2021 +0100
+
+ ktls: sendfile
+
+ added API function: gnutls_record_send_file().
+ added: _gnutls_ktls_send_file() function which increases the performance
+ by offloading the file encryption to kernel, thus the data never goes
+ to userspace.
+ updated tests/gnutls_ktls to cover new API
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 21 16:36:32 2022 +0100
+
+ algorithms: compile out GOST algorithm IDs if they are disabled
+
+ When compiled with --disable-gost, gnutls-cli --list still prints GOST
+ algorithms for public key systems and signatures. This change adds
+ compile time checks to suppress them.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Feb 21 18:19:25 2022 +0100
+
+ lib/algorithms: add UB warnings on late allowlisting API invocations
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Feb 14 13:48:37 2022 +0100
+
+ lib/priority: defer setting system-wide priority string
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Feb 14 12:44:57 2022 +0100
+
+ lib/priority: split up update_system_wide_priority_string
+
+ This is done in preparation for deferring priority string evaluation.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 21 16:28:49 2022 +0100
+
+ priority: compile out GOST algorithms IDs if they are disabled
+
+ When compiled with --disable-gost, gnutls-cli --priority NORMAL --list
+ still prints GOST algorithms for ciphers, MACs, and signatures. This
+ change adds compile time checks to suppress them.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Feb 18 11:05:15 2022 +0100
+
+ bump GNUTLS_MAX_ALGORITHM_NUM / MAX_ALGOS
+
+ Fedora 36 LEGACY crypto-policy uses allowlisting format
+ and is long enough to blow past the 64 priority string
+ elements mark, causing, effectively, priority string truncation.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Dimitris Apostolou <dimitris.apostolou@icloud.com>
+Date: Thu Feb 17 17:35:59 2022 +0200
+
+ Fix typos
+
+ Signed-off-by: Dimitris Apostolou <dimitris.apostolou@icloud.com>
+
+Author: Zoltan Fridrich <zfridric@redhat.com>
+Date: Thu Feb 17 11:46:29 2022 +0100
+
+ Disable some tests in fips mode
+
+ Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 10 17:35:13 2022 +0100
+
+ _gnutls_pkcs_raw_{decrypt,encrypt}_data: use public crypto API
+
+ These functions previously used the internal crypto
+ API (_gnutls_cipher_*) which does not have algorithm checks for FIPS.
+
+ This change switches the code to use the public crypto
+ API (gnutls_cipher_*) to trigger proper state transitions under FIPS
+ mode.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 10 16:43:08 2022 +0100
+
+ pkcs12: mark MAC generation and verification as FIPS non-approved
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 15 17:38:20 2022 +0100
+
+ gnutls_transport_is_ktls_enabled: fix return value of stub
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 12 10:37:53 2022 +0100
+
+ gnutls_ciphersuite_get: new function to get unique ciphersuite name
+
+ The existing method to obtain the name of the currently negotiated TLS
+ ciphersuite is as follows:
+
+ - call gnutls_cipher_get, gnutls_mac_get, gnutls_kx_get
+ - call gnutls_cipher_suite_get_name with the value from the above functions
+
+ This process is cumbersome and only works with TLS 1.2 or earlier;
+ moreover the returned names are GnuTLS specific.
+
+ This change adds a new function gnutls_ciphersuite_get to eliminate
+ those limitations. It returns the "canonical" name of the
+ ciphersuite, which is mostly identical to the ones registered in IANA,
+ with an exception for compatibility.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 20 09:28:10 2021 +0100
+
+ tls-fuzzer: prolong timeout for FFDHE tests
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 26 20:03:15 2021 +0100
+
+ .gitlab-ci.yml: prolong timeout for fedora-nettle-minigmp/test
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 26 09:37:58 2021 +0100
+
+ .gitlab-ci.yml: fix nettle installation path
+
+ .fedora-nettle/build clones the nettle into "nettle-git" and
+ temporarily change the working directory while buidling it. After
+ moving back to the original working directory, the installation path
+ should be prefixed with "${PWD}/nettle-git/".
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 1 15:19:52 2022 +0100
+
+ certtool --generate-privkey: update warnings on RSA key sizes
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 27 18:17:43 2022 +0100
+
+ rsa_generate_fips186_4_keypair: accept a few more modulus sizes
+
+ While _rsa_generate_fips186_4_keypair was modified to accept modulus
+ sizes other than 2048 and 3076, rsa_generate_fips186_4_keypair, which
+ calls that function, was not updated to accept such modulus sizes.
+
+ Spotted by Alexander Sosedkin.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 7 11:24:36 2022 +0100
+
+ .gitlab-ci.yml: update Fedora images to Fedora 35
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Seppo Yli-Olli <seppo.yliolli@gmail.com>
+Date: Mon Jan 31 18:32:28 2022 +0200
+
+ Bump libgnutlsxx soname due to ABI break
+
+ db_check_entry and db_check_entry now have const parameters
+
+ Signed-off-by: Seppo Yli-Olli <seppo.yliolli@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 28 07:49:42 2022 +0100
+
+ configure.ac: make --with-tpm and --with-tpm2 independent
+
+ These features are not mutually exclusive, so it doesn't make sense to
+ disable the TPM 1.2 support with TPM 2.0 support.
+
+ Reported by Jan Palus in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1313
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 28 12:50:56 2022 +0100
+
+ gen-getopt.py: avoid struct member name clash with C keywords
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 28 07:55:25 2022 +0100
+
+ tests: tcp_connect: avoid resource leak on error path
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 28 08:48:47 2022 +0100
+
+ README.md: fix versions in build status and add 3.6.x
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Jan Palus <jpalus@fastmail.com>
+Date: Fri Jan 28 11:07:02 2022 +0100
+
+ ktls: fix _gnutls_ktls_send_control_msg return value
+
+ always returned 0 on success while contract mandates to return number of
+ bytes sent
+
+ Fixes #1314
+
+ Signed-off-by: Jan Palus <jpalus@fastmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 28 06:35:45 2022 +0100
+
+ release-steps: fix markup
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Thu Jan 27 13:54:21 2022 +0100
+
+ KTLS: hotfix
+
+ fixed: keys will be set only when both sockets were enabled for ktls
+ fixed: session->internals.ktls_enabled left uninitialized for non
+ ktls-enabled build
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Jan 26 16:25:01 2022 +0100
+
+ lib/accelerated: use unlikely on buffer length checks more consistently
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Jan 26 16:15:36 2022 +0100
+
+ lib/accelerated: rearranged several size checks to avoid overflow
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Jan 25 12:32:59 2022 +0100
+
+ tests/scripts/common: fix skipping over x86-specific tests
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Jan 25 13:37:55 2022 +0100
+
+ tests/slow/test-hash-large: output GNUTLS_CPUID_OVERRIDE hints
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Jan 25 13:46:46 2022 +0100
+
+ tests/slow/cipher-api-test: add happy paths, specific error checks etc
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Tue Jan 25 13:36:19 2022 +0100
+
+ lib/accelerated: report GNUTLS_E_SHORT_MEMORY_BUFFER in many places
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Jan 24 17:37:24 2022 +0100
+
+ .gitlab-ci.yml: enable hardware acceleration in UB+ASAN jobs
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Jan 24 17:34:35 2022 +0100
+
+ tests/slow/cipher-api-test: actually test for short buffer...
+
+ ... avoiding the case when different failures mask the intended one
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Jan 24 17:33:48 2022 +0100
+
+ lib/accelerated/x86/aes-gcm-x86-pclmul-avx: add short buffer checks
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Jan 23 13:40:17 2022 +0100
+
+ testsuite: Fix endless loop on /bin/sh without $RANDOM
+
+ Closes #1315
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Jan 23 07:52:21 2022 +0100
+
+ testsuite: Fix missed instances of &> redirection
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Fri Jan 21 18:25:52 2022 +0100
+
+ Avoid &> redirection bashism in testsuite
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 17 16:48:10 2022 +0100
+
+ Release 3.7.3
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 18 06:43:07 2022 +0100
+
+ tests: privkey-keygen: fix memory leak
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 30 08:56:07 2021 +0200
+
+ x509: fix thread-safety in gnutls_x509_trust_list_verify_crt2
+
+ This function previously used gnutls_x509_trust_list_get_issuer
+ without GNUTLS_TL_GET_COPY flag, which is required when the function
+ is called from multi-threaded application and PKCS #11 trust store is
+ in use.
+
+ Reported and the change suggested by Remi Gacogne in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1277
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 16 07:57:02 2022 +0100
+
+ cli: add --list-config option
+
+ With this option gnutls-cli prints the build-time configuration of the
+ library, retrieved through gnutls_get_library_config.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 11 07:36:27 2022 +0100
+
+ fips: add build option to embed FIPS module info in library config
+
+ This adds a couple of configure options, --with-fips140-module-name
+ and --with-fips140-module-version, which packagers can use to embed
+ FIPS module information in the library.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 11 07:34:59 2022 +0100
+
+ global: add API to retrieve library configuration at run time
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 16 12:17:39 2022 +0100
+
+ configure.ac: emit feature summary as C macro
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 16 16:19:53 2022 +0100
+
+ tests: suppress GCC -fanalyzer warnings
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 16 16:00:10 2022 +0100
+
+ .gitignore: ignore more files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 16 15:59:01 2022 +0100
+
+ src: avoid overriding noinst_PROGRAMS
+
+ In src, we now have two helper programs: systemkey and dumpcfg.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 13 14:30:02 2022 +0100
+
+ build: hide maintainer tool invocation behind AM_V_GEN
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Jan 13 14:35:07 2022 +0100
+
+ tests: use more aliases in tests for better alias testing coverage
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 7 10:02:32 2022 +0100
+
+ .gitlab-ci.yml: run static analyzers on Python files
+
+ This runs a couple of code analysis on the Python scripts added to
+ remove AutoGen dependency.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 7 09:58:11 2022 +0100
+
+ .gitlab-ci.yml: bump cache key for python3 detection
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 5 08:09:36 2022 +0100
+
+ README.md: mention Python as requirement instead of AutoGen
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 5 07:39:10 2022 +0100
+
+ src: remove AutoGen .def files
+
+ As neither the tools nor documentation depends on AutoGen, we don't
+ need to include the AutoGen definition files.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 5 07:24:03 2022 +0100
+
+ doc: generate man-pages from JSON
+
+ This replaces man-pages generation previously provided by the autogen
+ -Tagman.tpl command with a Python script (gen-cmd-man.py).
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 4 09:06:21 2022 +0100
+
+ doc: generate texinfo files from JSON
+
+ This replaces texinfo generation previously provided by the autogen
+ -Tagtexi.tpl command with a Python script (gen-cmd-texi.py).
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 3 11:02:43 2022 +0100
+
+ src: remove included copy of libopts
+
+ As no tools link with libopts anymore, we don't need to include it in
+ the distribution.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 3 10:30:34 2022 +0100
+
+ src: replace autoopts/libopts with minimal config parser
+
+ This replaces configuration file parsing code previously provided by
+ <autoopts/options.h>, with a minimal compatible implementation.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Dec 31 18:13:58 2021 +0100
+
+ src: generate option handling code from JSON
+
+ This replaces AutoGen based command-line parser with a Python
+ script (gen-getopt.py), which takes JSON description as the input.
+ The included JSON files were converted one-off using the parse-autogen
+ program: https://gitlab.com/dueno/parse-autogen.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 4 15:18:26 2022 +0100
+
+ python: add library for handling JSON-based option description
+
+ This adds the jsonopts Python module used by the command-line parser
+ generator and documentation generators in the following commits. This
+ also bumps the required Python interpreter version to 3.6.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 13 09:36:52 2022 +0100
+
+ pkcs12: use the correct MAC algorithm for GOST key generation
+
+ According to the latest TC-26 requirements, the MAC algorithm used for
+ PBKDF2 should always be HMAC_GOSTR3411_2012_512.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 12 08:15:24 2022 +0100
+
+ tests: simple: check if the digest algorithm is compiled in
+
+ When the library is built with --disable-gost, gnutls_digest_get_id
+ returns GNUTLS_DIG_UNKNOWN for GOST algorithms.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 11 14:07:56 2022 +0100
+
+ x509: fix potential wrong usage of memcpy
+
+ Spotted by GCC analyzer:
+
+ common.c:552:17: warning: use of NULL 'out.data' where non-null expected [CWE-476] [-Wanalyzer-null-argument]
+ 552 | memcpy(output_data, out.data, (size_t) out.size);
+ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 9 08:34:52 2022 +0100
+
+ cert-auth: suppress false-positive warnings with GCC analyzer
+
+ When compiled with gcc -fanalyzer, it reports:
+
+ cert.c: In function '_gnutls_pcert_to_auth_info':
+ cert.c:85:17: error: dereference of NULL 'info' [CWE-476] [-Werror=analyzer-null-dereference]
+ 85 | if (info->raw_certificate_list != NULL) {
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 7 17:48:22 2022 +0100
+
+ gnutls_pkcs12_generate_mac: use SHA256 by default
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 20 16:16:23 2021 +0100
+
+ .gitlab-ci.yml: reduce PKCS#12 iteration count while testing
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 21 15:02:45 2021 +0100
+
+ tests: check algorithms for generating PKCS#12 file
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Dec 26 17:40:42 2021 +0100
+
+ cipher-api-test: mention why it is written using fork
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 23 15:23:34 2021 +0100
+
+ fips: plumb service indicator to symmetric key crypto operations
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Pedro Monreal <pmonrealgonzalez@suse.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 31 13:29:45 2021 +0200
+
+ fips: plumb service indicator to public key crypto operations
+
+ This installs service indicator state transitions in certain public
+ key operations in gnutls_crypto_pk_st, namely:
+
+ * fallible operations
+ - encrypt
+ - sign
+ - generate_keys
+ - derive
+
+ * infallible operations
+ - decrypt, decrypt2
+ - verify
+
+ other operations, such as generate_params, are not considered as
+ crypto operation. Note that fallible operations above mean that those
+ return value could indicate error, while infallible operations do not
+ have distinction between errors and failures: decrypt/verify failures
+ are treated as a successful completion of the operation.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Pedro Monreal <pmonrealgonzalez@suse.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 21 15:17:55 2021 +0100
+
+ _gnutls_pkcs_generate_key: use HMAC-SHA256 for PBKDF2
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 20 16:34:30 2021 +0100
+
+ pkcs12: determine iteration count for MAC at build time
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 20 16:13:06 2021 +0100
+
+ pkcs7: determine iteration count for PBKDF2 at build time
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 20 15:56:24 2021 +0100
+
+ certtool: --to-p12: use modern algorithms by default
+
+ Currently certtool uses PKCS12-3DES-SHA1 for encrypting keys in
+ PKCS#12, while it is suggested to migrate to more modern algorithms,
+ namely AES-128-CBC with PBKDF2 and SHA-256:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1759982
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 23 10:31:08 2021 +0200
+
+ fips: add functions to inspect thread-local FIPS operation state
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Thu Jan 6 07:17:01 2022 +0100
+
+ Drop unquoted angle brackets in gtk-doc comment.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Thu Jan 6 07:15:31 2022 +0100
+
+ Fix gtk-doc build, use http URI in sgml master.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sat Jan 1 21:12:51 2022 +0200
+
+ p11tool: add --mark-always-authenticate option
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jan 2 19:31:33 2022 +0200
+
+ doc: updated copyrights for 2022
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 18 19:02:03 2021 +0100
+
+ accelerated: fix CPU feature detection for Intel CPUs
+
+ This fixes read_cpuid_vals to correctly read the CPUID quadruple, as
+ well as to set the bit the ustream CRYPTOGAMS uses to identify Intel
+ CPUs.
+
+ Suggested by Rafael Gieschke in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1282
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Dec 22 17:00:03 2021 +0100
+
+ padlock: reset _gnutls_x86_cpuid_s only after padlock check succeeds
+
+ Otherwise it clears _gnutls_x86_cpuid_s which may already hold valid
+ CPUID detected for Intel and AMD CPUs.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Dec 22 09:12:25 2021 +0100
+
+ wrap_nettle_hash_fast: avoid calling _update with zero-length input
+
+ As Nettle's hash update functions internally call memcpy, providing
+ zero-length input may cause undefined behavior.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Dec 22 08:22:04 2021 +0100
+
+ gnutls_{hash,hmac}_copy: mention the functions do not always work
+
+ It is known that some built-in accelerated implementation, such as
+ AF_ALG, does not support copying hash/hmac contexts. This expands the
+ documentation to suggest checking the return value of those functions.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Dec 20 17:47:36 2021 +0100
+
+ tests: extend system-override-curves-allowlist with key generation
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Dec 20 16:50:59 2021 +0100
+
+ tests: tweak system-override-curves-allowlist insignificantly
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Dec 17 18:49:27 2021 +0100
+
+ README: document tpm2-tss-engine test dependency
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Dec 16 12:46:38 2021 +0100
+
+ use sha384_digest in lib/accelerated/aarch64/sha-aarch64.c sha384
+
+ Mirrors https://gitlab.com/gnutls/gnutls/-/merge_requests/1466
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Thu Dec 2 16:35:31 2021 +0100
+
+ ktls: flags
+
+ ktls enum flags API
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri Oct 15 15:00:17 2021 +0200
+
+ KTLS: API
+
+ ktls is enabled by default, we can check if inicialization was
+ succesfull with gnutls_transport_is_ktls_enabled
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 9 11:22:14 2021 +0100
+
+ .gitignore: ignore tests/x509cert-ct
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 9 11:03:50 2021 +0100
+
+ X509 CT: defer filling in the length field
+
+ This eliminates the need of precalculating the payload size, to make
+ it easier to adapt to new format.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Dec 10 13:47:21 2021 +0100
+
+ tests: fix out of tree builds with ASAN
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Nov 11 14:05:40 2021 +0100
+
+ tests: add protocol-set-allowlist
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Nov 11 14:04:54 2021 +0100
+
+ tests: add tcp_connect to utils
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 9 10:48:58 2021 +0100
+
+ X509 CT: use size_t for array index instead of unsigned
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Fri Nov 26 18:20:44 2021 +0100
+
+ Update symbols
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Wed Nov 17 19:28:50 2021 +0100
+
+ devel: Suppress new API functions
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Sat Nov 28 19:04:35 2020 +0100
+
+ x509 CT: Add tests
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Mon Nov 15 20:03:12 2021 +0100
+
+ x509 CT: implement new public API
+
+ This commit implements import and export functions for the X.509
+ Certificate Transparency Signed Certificate Timestamp (SCT) extension
+ (RFC 6962).
+
+ A new constant GNUTLS_X509EXT_OID_CT_SCT is introduced
+ with the value "1.3.6.1.4.1.11129.2.4.2".
+
+ The following new public API functions are introduced:
+
+ - gnutls_x509_ext_ct_scts_init
+ - gnutls_x509_ext_ct_scts_deinit
+ - gnutls_x509_ext_ct_import_scts
+ - gnutls_x509_ext_ct_export_scts
+ - gnutls_x509_ct_sct_get_version
+ - gnutls_x509_ct_sct_get
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 30 14:33:33 2021 +0100
+
+ devel/libgnutls.abignore: ignore drbg_aes_* functions
+
+ These functions are only defined when compiled with
+ --enable-fips140-mode.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 6 12:41:40 2021 +0200
+
+ priority: support allowlisting in configuration file
+
+ This adds a new mode of interpreting the [overrides] section. If
+ "override-mode" is set to "allowlisting" in the [global] section, all
+ the algorithms (hashes, signature algorithms, curves, and versions)
+ are initially marked as insecure/disabled. Then the user can enable
+ them by specifying allowlisting keywords such as "secure-hash" in the
+ [overrides] section.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 27 16:48:51 2021 +0100
+
+ CONTRIBUTING.md: clarify how to introduce new API
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 27 16:39:41 2021 +0100
+
+ release-steps: "make abi-dump-latest" at release time
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 27 16:36:17 2021 +0100
+
+ build: stop running abi-dump-latest at "make files-update"
+
+ The procedure of registering ABI updates has changed in
+ bd3c78b9d10937adb1855b85bca1864972a1c986.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 24 18:44:13 2021 +0100
+
+ build: update to use the latest valgrind-tests module from Gnulib
+
+ This adjust the existing valgrind invocations in the test suite with:
+ https://www.gnu.org/software/gnulib/manual/html_node/Valgrind-options.html
+
+ - make --suppressions option to per directory, using AM_VALGRINDFLAGS
+ - use LOG_VALGRIND for LOG_COMPILER
+ - quote '$(LOG_VALGRIND)' in TESTS_ENVIRONMENT
+ - move gl_VALGRIND_TESTS_DEFAULT_NO call before gl_INIT
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Evgeny Grin <k2k@narod.ru>
+Date: Fri Nov 26 14:08:22 2021 +0300
+
+ sockets: fixed compiler warning on Windows x32
+
+ Signed-off-by: Evgeny Grin <k2k@narod.ru>
+
+Author: Evgeny Grin <k2k@narod.ru>
+Date: Fri Nov 26 13:50:52 2021 +0300
+
+ sockets: fixed building for Windows with compilers without VLA support
+
+ Signed-off-by: Evgeny Grin <k2k@narod.ru>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 5 16:27:55 2021 +0200
+
+ priority: refactor config file parsing
+
+ This adds the following refactoring:
+
+ - avoid side-effects during parsing the config file, by separating
+ application phase; the parsed configuration can be applied globally
+ with cfg_apply, after validation
+ - make _gnutls_*_mark_{disabled,insecure} take an ID instead of the
+ name
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 16 18:46:41 2021 +0100
+
+ locks: deprecate gnutls_global_set_mutex
+
+ As the library now uses static mutexes, rwlocks, and onces, it doesn't
+ make much sense to only replace dynamic mutex usage.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 14 14:57:15 2021 +0100
+
+ locks: use once execution for on-demand initialization of globals
+
+ This makes sure that the global variables are initialized only once.
+ Most of those variables are initialized at ELF constructor, though a
+ couple of occasions they are initialized on-demand: the global keylog
+ file pointer and TPM2 TCTI context. To properly protect the
+ initialization this patch uses gl_once provided by Gnulib.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 14 16:39:29 2021 +0100
+
+ locks: rework rwlock primitives
+
+ Remove GNUTLS_STATIC_RWLOCK_*LOCK macros and respect return values of
+ rwlock primitives.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 16 18:20:24 2021 +0100
+
+ pkcs11: switch to using static mutex
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 16 18:00:12 2021 +0100
+
+ verify-tofu: switch to using static mutex for locking
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 14 14:04:59 2021 +0100
+
+ locks: replace custom mutex wrappers with "glthread/lock.h"
+
+ As Gnulib provides portability wrappers of mutex implementations, we
+ don't need to provide similar wrappers by ourselves.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 22 14:52:10 2019 +0100
+
+ Port openconnect TPM2 code
+
+ This introduces transparent loading of TPM2 keys which are in PEM
+ form by gnutls_privkey_import_x509_raw() and higher level functions
+ which wrap it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Co-authored-by: David Woodhouse <dwmw2@infradead.org>
+ Co-authored-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Nov 8 19:07:28 2021 +0100
+
+ tests: set $abs_top_builddir in more places
+
+ `$abs_top_builddir` has been used all across tests' subdirectories
+ (through tests/scripts/common.sh)
+ but has only been defined for tests/suite/ ones.
+ Defining it in other Makefiles where `top_builddir` is being passed.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 30 17:17:47 2021 +0200
+
+ priority: rework config reloading logic and locking
+
+ The previous reloading logic relied on the existence of [priority]
+ section (in the initial loading) as an indicator whether the file is
+ loaded. This didn't work well in the following cases:
+ - when the section didn't exist initially and then is added later
+ - when the section existed initially and then is removed later
+ To handle these cases, this change adds a new flag
+ system_priority_file_loaded which can be used together with the mtime
+ check.
+
+ This also adds an rwlock to protect global configuration.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 1 16:46:50 2021 +0100
+
+ Revert "priority: fix potential race in reloading system-wide config"
+
+ This reverts commit 890c6937a3cfb4a0704bc815324221ec4cb89840.
+ Considering the entire logic around reloading the config file, the fix
+ was suboptimal.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 28 18:55:26 2021 +0200
+
+ priority: fix potential race in reloading system-wide config
+
+ _gnutls_update_system_priorities is called from gnutls_priority_set*
+ functions every time when the SYSTEM keyword is used and updates a
+ global variable system_wide_priority_strings if the configuration
+ changes. Although the critical path is protected with mtime check, it
+ should also hold a lock to avoid occasional race condition in
+ multi-thread programs. This also clears
+ system_wide_priority_strings_init upon unloading and before reloading
+ the config file (thanks to Alexander Sosedkin).
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Oct 21 12:46:56 2021 +0200
+
+ .gitlab-ci.yml: add caching to cppcheck
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Oct 26 07:50:16 2021 +0200
+
+ devel: update release procedure taking into account of abi-dump
+
+ As the *.abi files have been moved into a separate repository, we need
+ an extra step to update the repository for new release.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Oct 20 17:49:56 2021 +0200
+
+ NEWS: add a notice of insecure-hash filtering ciphersuites on PRF
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Oct 20 14:37:07 2021 +0200
+
+ tests: add system-override-hash-influences-prf
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Oct 20 14:36:44 2021 +0200
+
+ priority: filter out ciphersuites with prf blocked by insecure-hash
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Wed Oct 20 14:34:58 2021 +0200
+
+ priority: refactor ciphersuite filtering
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Fri May 14 15:56:06 2021 +0200
+
+ ktls: basic implementation of SW mode
+
+ ktls enables us to offload encryption/decryption to the kernel
+
+ prerequisites:
+ - configured with `--enable-ktls`
+ - tls module `modprobe tls` check with 'lsmod | grep tls'
+ - per connection:
+ gnutls_transport_set_int{2} must be set
+
+ When prerequisities are met then ktls is used by default.
+
+ If GnuTLS encounters a error during KTLS initialization, it will
+ not use ktls and fallback to userspace.
+
+ Signed-off-by: Frantisek Krenzelok <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 18 16:27:46 2021 +0200
+
+ devel: make use of abidw --drop-private-types
+
+ This will produce more compact abixml output.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 18 11:49:46 2021 +0200
+
+ devel: move .abi files into a separate repository
+
+ Changes to the .abi files are a bit too noisy to track in the main
+ repository. This moves the files out of this repository and embed it
+ as a git submodule.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Thu Sep 23 09:03:50 2021 +0200
+
+ fix mingw64 detection
+
+ __MINGW64__ is only defined for 64 bits builds of mingw64 [1].
+ The intended test what to only use the CertEnumCRLsInStoreFunc via LoadLibrary
+ for some ancient mingw32 build and never for mingw64.
+
+ __MINGW64_VERSION_MAJOR is a proper define to identify mingw64 against mingw32.
+
+ [1] https://sourceforge.net/p/predef/wiki/Compilers/
+
+ Co-authored-by: Johannes Kauffmann <johanneskauffmann@hotmail.com>
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Sep 17 11:03:25 2021 +0200
+
+ wrap_nettle_hash_exists: add missing hash algorithms
+
+ This adds SHAKE-128, SHAKE-256, and RIPEMD-160 to the supported
+ algorithms by nettle. While SHAKEs are not a hash algorithm but an
+ XOF, it would be consistent to report they are implemented.
+
+ The simple test is expanded to exercise the code
+ path (gnutls_digest_get_id → wrap_nettle_hash_exists).
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Sep 18 07:18:59 2021 +0200
+
+ fuzz: explicitly supply LDFLAGS to clang++ command line
+
+ This prevented fuzzer programs being linked in Ubuntu 20.03, used in
+ oss-fuzz.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri Sep 17 16:37:24 2021 -0400
+
+ lib/x509: Avoid memcpy when string is empty
+
+ This fixes an ASAN warning in fuzz/gnutls_private_key_parser_fuzzer
+ when run against the malformed private key
+ fuzz/gnutls_private_key_parser_fuzzer.in/10a5c92fa30ddb6cbb4286d7699b2b7a7e032b17
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed Aug 11 17:31:40 2021 -0400
+
+ NEWS: added news about certtool handling x448 and x25519
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed Aug 11 15:59:21 2021 -0400
+
+ tests: add test for generating x25519 and x448 certificates
+
+ These certs should work just fine for the purposes of cryptographic
+ e-mail (S/MIME).
+
+ These usage flags are also used in the end-entity certificates found
+ in https://datatracker.ietf.org/doc/draft-ietf-lamps-samples/
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 14 17:14:41 2021 -0400
+
+ tests: update details about sample X25519 certificate
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 20:14:53 2021 -0400
+
+ certtool: add x448 and x25519 for --key-type
+
+ This is a simple extension of the certtool command-line interface.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 22:25:41 2021 -0400
+
+ certtool: when making X25519 or X448 certs, always use "key agreement"
+
+ This is related to #1227 -- but in this case, it's enforcing a
+ requirement of RFC 8410 §5.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 21:53:47 2021 -0400
+
+ x509: handle X25519 and X448 in read_pubkey
+
+ _gnutls_x509_read_ecdh_pubkey is basically a clone of
+ _gnutls_x509_read_eddsa_pubkey. Another form of implementation
+ would be to collapse these two static functions into a common
+ function for all "CFRG" curves.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 21:30:53 2021 -0400
+
+ nettle: handle X25519 and X448 in pk_fixup
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 20:23:41 2021 -0400
+
+ x509: enable importing secret keys for X448 and X25519.
+
+ _decode_pkcs8_modern_ecdh_key is virtually the same as
+ _decode_pkcs8_eddsa_key. Another implementation would be
+ to collapse these two functions into one, since their structure
+ is identical.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 19:53:28 2021 -0400
+
+ Enable X25519 and X448 everywhere that EdDSA is supported.
+
+ These are just trivial extension points where the codepath is the same
+ for the ECDH scheme as it is for the EdDSA scheme.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 20:14:07 2021 -0400
+
+ x509: handle X448 and X25519 in write_pubkey
+
+ This uses the same structure as _gnutls_x509_write_eddsa_pubkey.
+
+ Another way to write this would be to combine those two functions,
+ despite X448 and X25519 not being EdDSA at all.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 20:12:15 2021 -0400
+
+ pubkey: handle X25519 and X448 in gnutls_pubkey_import_pkcs11
+
+ I am not confident in the strings I chose to match on in
+ ASN1_ETYPE_PRINTABLE_STRING, in that I do not know what registry
+ I should look this up in.
+
+ The *parse_ecc_ecdh_params and *import_ecc_ecdh functions are tweaked
+ analogs to the eddsa versions of those functions.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 19:48:10 2021 -0400
+
+ nettle: extend pk_verify_priv_params to handle X25519 and X448
+
+ This is basically a copy of the EdDSA case in the switch statement.
+
+ Another way to implement it would be to augment the EdDSA case (and
+ the functions it uses) to have that case also handle ECDH use of the
+ CFRG curves.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 19:36:14 2021 -0400
+
+ lib/pk: treat modern ECDH octet streams the same way as eddsa streams.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 7 19:34:59 2021 -0400
+
+ lib/algorithms: add modern ecdh functions comparable to curve_is_eddsa
+
+ This is useful for the so-called CFRG curves used in ECDH, x25519 and x448.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Thu May 6 14:10:46 2021 -0400
+
+ algorithms: Explicitly name ECDH_X448_OID and ECDH_X25519_OID
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Sep 10 17:08:52 2021 +0200
+
+ .gitlab-ci.yml: new ASan job with -DAGGRESSIVE_REALLOC
+
+ This would exercise the same logic currently covered with
+ fedora-valgrind-aggressive in each MR.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 9 18:36:46 2021 +0200
+
+ fuzz: allow multiple definitions of gnutls_rnd in oss-fuzz
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 9 09:46:04 2021 +0200
+
+ build: remove tautological if conditions
+
+ Spotted by LGTM.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 9 09:38:21 2021 +0200
+
+ ext/{client,server}_cert_type: use proper types for integers
+
+ Spotted by LGTM.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 6 15:51:41 2021 +0200
+
+ tests: use PYTHONPATH instead of creating symlinks in srcdir
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 7 17:56:02 2021 +0200
+
+ tls-fuzzer: update submodules to the latest
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Miroslav Lichvar <mlichvar@redhat.com>
+Date: Wed Sep 1 15:48:27 2021 +0200
+
+ fix SSSE3 SHA384 to work more than once
+
+ The output function called sha512_digest() instead of sha384_digest(),
+ which caused the hash context to be reinitialized for SHA512 instead of
+ SHA384 and all following digests using the hash handle were wrong.
+
+ Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Sep 4 10:38:23 2021 +0200
+
+ testcompat-openssl-tls13-cli.sh: disable early data testing
+
+ This test is causing intermittent failure quite often in the CI.
+ Let's temporarily disable it until the cause is properly investigated.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 5 18:48:09 2021 +0200
+
+ testcompat-openssl-tls13-cli.sh: use different tmpdirs for sub-tests
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 5 17:28:43 2021 +0200
+
+ tests: rework port locking
+
+ This makes the locking logic per port, not per entire make process.
+ It also makes use of absolute paths for locking directory, so that
+ tlsfuzzer tests can use it.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Aug 30 19:26:49 2021 +0200
+
+ tests/tls13/post-handshake-with-cert: avoid a race condition
+
+ A server tries to close connection and kill the client after reauth.
+ Client, in turn, attempts to send data in some cases.
+ This patch makes the server wait for the client to terminate first.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Aug 30 19:38:03 2021 +0200
+
+ tests: remove unused `terminate` from 2 tests
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Aug 27 17:10:37 2021 +0200
+
+ tests: add a safeguard to terminate()
+
+ Add a safeguard to `terminate()` so that we don't kill whole pgroups.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Aug 27 17:02:51 2021 +0200
+
+ tests: don't kill whole pgroups
+
+ `terminate()` executed from the child process results in a `kill(0, SIGTERM)`,
+ bringing the whole pgroup down. `exit(1)` should be called instead.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Nick Child <nick.child@ibm.com>
+Date: Wed Aug 25 15:13:07 2021 -0400
+
+ INSTALL.md: Update documentation on building static library [skip ci]
+
+ As of commit a88eb79d88c53531c49d7cedfce2207f36ac8a9d, building a
+ static archive (libgnutls.a) is off by default. This commit updates the
+ documentation for building a static library in INSTALL.md .
+
+ Signed-off-by: Nick Child <nick.child@ibm.com>
+
+Author: Simon South <simon@simonsouth.net>
+Date: Sun Aug 22 08:41:36 2021 +0200
+
+ guile: Add 'GNUTLS_DIG_SHA256' enum value.
+
+ * guile/modules/gnutls/build/enums.scm (%digest-enum): Add 'sha256'.
+ * guile/modules/gnutls.in: Export 'digest/sha256'.
+ * guile/tests/x509-certificates.scm: Test 'digest/sha256' with
+ 'x509-certificate-fingerprint'.
+ (%sha256-fingerprint): New constant.
+
+ Signed-off-by: Simon South <simon@simonsouth.net>
+
+Author: Simon South <simon@simonsouth.net>
+Date: Sun Aug 22 08:40:14 2021 +0200
+
+ guile: Add binding for 'gnutls_x509_crt_get_fingerprint'.
+
+ * guile/src/core.c (MAX_HASH_SIZE): New constant.
+ (scm_gnutls_x509_certificate_fingerprint): New function.
+ * guile/modules/gnutls.in: Export 'x509-certificate-fingerprint'.
+ * guile/tests/x509-certificates.scm: Test 'x509-certificate-fingerprint'.
+ (%sha1-fingerprint): New constant.
+ (u8vector->hex-string): New procedure.
+
+ Signed-off-by: Simon South <simon@simonsouth.net>
+
+Author: Craig Gallek <cgallek@gmail.com>
+Date: Wed Aug 11 12:54:37 2021 -0400
+
+ x509: pin/password callback support for openssl encrypted private keys
+
+ This attempts to use the registered pin callback when the password for
+ an encrypted openssl private key is not supplied. This matches the
+ functionality for PKCS8 sealed keys above and is similar to what openssl
+ does in this situation.
+
+ Signed-off-by: Craig Gallek <cgallek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Aug 7 09:16:50 2021 +0200
+
+ mem: instrument with ASan memory poisoning as well as valgrind
+
+ This makes it possible to catch undefined memory access in the more
+ lightweight CI runs.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 2 18:32:28 2021 +0200
+
+ pk: add flags to force RSA-PSS salt length to match digest length
+
+ This adds a couple of flags to RSA-PSS signing and verification, to
+ enforce that the salt length matches the digest length. That is not
+ only recommended in RFC 4055, but also mandated in RFC 8446 in the TLS
+ 1.3 context.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jul 21 10:34:23 2021 +0200
+
+ fips: allow more RSA modulus sizes
+
+ Previously, we restricted RSA modulus size to be either 2048 or 3072
+ bits in FIPS mode, following FIPS 186-4. On the other hand, FIPS
+ 140-2 IG A.14 and FIPS 140-3 IG C.F updates it to allow arbitrary
+ modulus sizes equal to or larger than 2048 bits under certain
+ conditions.
+
+ This change reflects the guidance, though it only allows known sizes
+ due to the complexity of calculating the approximate security strength
+ using the formula in FIPS 140-2 IG 7.5.
+
+ Suggested-by: Stephan Mueller
+ Reviewed-by: Stephan Mueller
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 3 14:17:41 2021 +0200
+
+ tests: tls13/key_share: rewrite as single process
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 4 06:45:30 2021 +0200
+
+ .gitlab-ci.yml: cppcheck: disable style checks
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 3 11:44:52 2021 +0200
+
+ devel: suppress cppcheck 2.5 false-positives
+
+ This fixes errors and warnings as well as some style issues spotted by
+ cppcheck 2.5. Others are recorded in the suppressions file.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Tue Jul 13 23:53:12 2021 +0200
+
+ gnutls_ocsp_resp_verify: Check key purpose if signer not on trust list
+
+ According to [1] the id-kp-OCSPSigning key purpose is only needed for
+ delegated signers, not signers explicitly set as trusted. The previous
+ code would reject a signature directly from a CA on the trust list
+ (without delegation) because the CA certificate didn't contain the
+ id-kp-OCSPSigning key purpose.
+
+ The tests included in this commit check:
+
+ 1. Is a signature directly from a CA on the trust list accepted?
+
+ 2. Is a signature from a delegated signer issued by a CA on the trust
+ list accepted?
+
+ 3. Is a signature from a certificate without id-kp-OCSPSigning issued
+ by a CA on the trust list rejected?
+
+ Note that the CA in these tests is also the one that issued the
+ certificate the OCSP response is for, but the code (current and
+ previous) doesn't enforce this.
+
+ [1] https://datatracker.ietf.org/doc/html/rfc6960#section-4.2.2.2
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 28 07:04:55 2021 +0200
+
+ tests: set SH_LOG_COMPILER so sh tests run under $(SHELL)
+
+ This omits the need of setting executable bits on shell script tests.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 25 08:39:12 2021 +0200
+
+ key_share: treat X25519 and X448 as same PK type when advertising
+
+ Previously, if both X25519 and X448 groups were enabled in the
+ priority string, the client sent both algorithms in a key_share
+ extension, while it was only capable of handling one algorithm from
+ the same (Edwards curve) category. This adds an extra check so the
+ client should send either X25519 or X448.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Michael Catanzaro <mcatanzaro@redhat.com>
+Date: Tue Jun 22 14:12:09 2021 -0500
+
+ Fix gnutls_certificate_set_trust_list() return value documentation
+
+ This function is documented to return an error code, but in fact it has
+ no return value and never fails. Fix this.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@redhat.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Apr 24 22:02:14 2021 +0200
+
+ guile: Writes to record ports handle EAGAIN/EINTR transparently.
+
+ Reported at <https://issues.guix.gnu.org/47867>
+ by Florian Pelz <pelzflorian@pelzflorian.de>.
+
+ This is a followup to a229bb36c9592b151f6feb277238c41ab39f40a9.
+
+ * guile/src/core.c (write_to_session_record_port) [USING_GUILE_BEFORE_2_2]:
+ Keep looping upon GNUTLS_E_AGAIN and GNUTLS_E_INTERRUPTED.
+ (write_to_session_record_port) [!USING_GUILE_BEFORE_2_2]: Loop on
+ GNUTLS_E_INTERRUPTED and return -1 on GNUTLS_E_AGAIN if C_SESSION is
+ backed by a file descriptor.
+ * NEWS: Update.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 11 06:58:43 2021 +0200
+
+ priority: reflect system wide config when constructing sigalgs
+
+ Otherwise the client would advertise signature algorithms which it
+ cannot use and cause handshake to fail.
+
+ Reported by Philip Schaten in:
+ https://lists.gnupg.org/pipermail/gnutls-help/2021-June/004711.html
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 9 14:29:11 2021 +0200
+
+ p11tool: mention how CKA_IDs of certs are calculated upon --write
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 29 07:18:17 2021 +0200
+
+ Release 3.7.2
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 29 07:09:07 2021 +0200
+
+ release-steps: remove unnecessary steps
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 29 06:56:57 2021 +0200
+
+ AUTHORS: take into account of Co-authored-by:
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 29 06:52:42 2021 +0200
+
+ .mailmap: update
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Tue May 18 16:32:55 2021 -0400
+
+ certtool: order DN components by scale.
+
+ DN components are expected to be ordered by scale, with the wire format
+ representing larger-scale components (like country or organization) before
+ smaller-scale components (like state or organizationalUnit).
+
+ The bulk of the changes here of course are changes to the target
+ certificates in the test suite.
+
+ Note that a change was necessary in tests/cert-tests/crq.sh because it
+ tests the "interactive" mode of certtool. If any user is scripting
+ certtool in this way, this change will cause a backwards-incompatible
+ break. However, I think this is OK -- the supported scripted/batch
+ mode for certtool should use a template file, and I don't think it's
+ important to maintain a strict api on the interactive mode.
+
+ The main change here is to order the DN from least-specific-to-most,
+ in particular:
+
+ country, state, locality, org, orgunit, cn, uid
+
+ But I've also made an additional arbitrary choice, which is that DC
+ (domain component) comes *after* uid. This was already the case in
+ certificate generation, but in *request* generation, it was the other
+ way around. I've changed request generation to match this ordering
+ from certificate generation.
+
+ Closes: #1243
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 27 10:00:22 2021 +0200
+
+ build: fix interface version dependencies in libgnutls.map
+
+ Previously, the predecessor of GNUTLS_3_7_0 was mistakenly set to
+ GNUTLS_3_4 instead of GNUTLS_3_6_14. This fix shouldn't have any
+ impact on ABI, given the dynamic loader doesn't take into account of
+ ordering of versions. See also the first paragraph on:
+ https://www.akkadia.org/drepper/dsohowto.pdf#page=38
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 27 09:34:50 2021 +0200
+
+ build: require libkcapi 1.3.0 or later if --enable-afalg
+
+ The libkcapi 1.3.0 brings a couple of changes needed for GnuTLS:
+
+ * fix: remove prctl PR_SET_DUMPABLE to allow library to be debugged
+ * fix: ensure that sendmsg is always used as fallback when vmsplice cannot be used
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 28 17:05:56 2021 +0200
+
+ tlsfuzzer: update git submodules
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 28 08:51:27 2021 +0200
+
+ nettle: update git submodule to 3.7.2 release
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 28 08:50:19 2021 +0200
+
+ gnulib: update git submodule
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 27 08:10:30 2021 +0200
+
+ devel: update libtasn1 submodule
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Leonardo Bras <leobras.c@gmail.com>
+Date: Fri May 21 03:40:03 2021 -0300
+
+ guile: Fix implicit conversion warning
+
+ When building, the following warning may be printing:
+
+ CC guile_gnutls_v_2_la-utils.lo
+ core.c: In function 'scm_gnutls_set_server_session_certificate_request_x':
+ core.c:545:13: warning: implicit conversion from 'gnutls_certificate_request_t' to 'gnutls_certificate_status_t' [-Wenum-conversion]
+ 545 | c_request = scm_to_gnutls_certificate_request (request, 2, FUNC_NAME);
+ | ^
+ core.c:547:53: warning: implicit conversion from 'gnutls_certificate_status_t' to 'gnutls_certificate_request_t' [-Wenum-conversion]
+ 547 | gnutls_certificate_server_set_request (c_session, c_request);
+ |
+
+ Fix this warning by changing c_request type to gnutls_certificate_request_t.
+
+ Signed-off-by: Leonardo Bras <leobras.c@gmail.com>
+
+Author: Leonardo Bras <leobras.c@gmail.com>
+Date: Fri May 21 03:11:29 2021 -0300
+
+ ASN1 : Remove warnings related to old libtasn1 namings
+
+ While compiling gnutls, some warnings related to deprecated names can be
+ printed, such as:
+
+ ./../x509/x509_int.h:392:13: warning: 'ASN1_TYPE' macro is deprecated, use 'asn1_node' instead.
+ 392 | int _gnutls_x509_write_key_int_le(ASN1_TYPE node, const char *value,
+ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+ To avoid that, rename types as show in devel/libtasn1/NEWS (release 3.1):
+
+ ASN1_DATA_NODE -> asn1_data_node_st
+ ASN1_ARRAY_TYPE -> asn1_static_node (was asn1_static_node_t)
+ ASN1_TYPE -> asn1_node
+ ASN1_TYPE_EMPTY -> NULL
+ static_struct_asn -> asn1_static_node_st
+ node_asn_struct -> asn1_node_st
+ node_asn -> asn1_node_st
+
+ Signed-off-by: Leonardo Bras <leobras.c@gmail.com>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Mon May 17 13:33:28 2021 -0400
+
+ git: Do not ignore certtool templates.
+
+ This effectively reverts part of
+ dc85966364994006f9337e4749d1487e4b8e16a1 in order to ensure that
+ tests/cert-tests/templates/*.tmpl are not ignored by git.
+
+ Closes: #1242
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Mon May 17 13:20:26 2021 -0400
+
+ tests/cert-tests: test a policy without any policyQualifiers.
+
+ Ensure that a policy without policyQualifiers gets created with an
+ omitted sequence of qualifiers, rather than an empty sequence of
+ qualifiers.
+
+ We use NIST's test policy OID for this test.
+
+ This tests the fix for #1238.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Fri May 14 17:57:54 2021 -0400
+
+ x509: Omit empty sequences of policyQualifiers.
+
+ When a certificate has a policy attached but no policyQualifiers,
+ `certtool` should omit the policyQualifiers sequence entirely, rather
+ than emitting an empty sequence.
+
+ Closes: #1238
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 14 15:59:37 2021 +0200
+
+ cert auth: filter out unsupported cert types from TLS 1.2 CR
+
+ When the server is advertising signature algorithms in TLS 1.2
+ CertificateRequest, it shouldn't send certificate_types not backed by
+ any of those algorithms.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 17 07:58:43 2021 +0200
+
+ pre_shared_key: limit 0-RTT to resumption connections
+
+ While RFC 8446 allows 0-RTT data in a non-resumption connection
+ established with external PSK, it requires a mechanism to associate
+ encryption parameters with PSK. Until we provide a new API for that,
+ let's limit the 0-RTT use to resumption connections only.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed May 12 20:49:20 2021 -0400
+
+ x509: Write keyUsage extension with minimal BIT STRING
+
+ Avoid embedding trailing cleared bits in the BIT STRING for the
+ keyUsage extension.
+
+ The overwhelming majority of this changeset is correcting the
+ artifacts in the test suite, most of which had keyUsage with a
+ non-minimal encoding. The only functional code change is in
+ lib/x509/x509_ext.c.
+
+ Closes: #1236
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 14 08:48:24 2021 +0200
+
+ .gitlab-ci.yml: add bootstrap stage
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 14 08:26:37 2021 +0200
+
+ serv: stop setting AI_ADDRCONFIG on getaddrinfo
+
+ AI_ADDRCONFIG is only useful when the NODE argument is given in the
+ getaddrinfo call, as described in RFC 3493 6.1. Suggested by Andreas
+ Metzler in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1007#note_356637206
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 13 15:03:10 2021 +0200
+
+ configure.ac: specify -ladvapi32 in mingw builds
+
+ This library needs to be linked for CryptAcquireContextW, used in
+ lib/system/keys-win.c. Suggested by Tim Kosse in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1232
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 09:50:22 2021 +0200
+
+ tests: don't install crypt32.dll and ncrypt.dll replacement
+
+ Reported by Tim Kosse in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1232
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 18:44:28 2021 +0200
+
+ gnutls_early_{cipher,prf_hash}_get: new functions
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 11:50:00 2021 +0200
+
+ tests: rework tls13-early-data to check key scheduling
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 18:25:55 2021 +0200
+
+ tests: tls13-early-data: use TLS_CHACHA20_POLY1305_SHA256
+
+ When resuming in TLS 1.3, the negotiated PRF hash must match the one
+ used in the initial handshake.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 18:09:01 2021 +0200
+
+ tests: remove shell-script wrapper for tls13/prf-early
+
+ The wrapper (tls13/prf-early.sh) was merely for running
+ tls13/prf-early under datefudge. The same thing can now be done with
+ virt_time_init_at.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 17:56:37 2021 +0200
+
+ tests: virt-time: add virt_time_init_at
+
+ This allows the tests to set the current time to arbitrary point,
+ instead of the current time; useful for the tests checking the traces
+ such as tls13/prf-early.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 08:35:02 2021 +0200
+
+ gnutls_init: add flag to omit EndOfEarlyData messages
+
+ The message is prohibited in QUIC:
+ https://tools.ietf.org/html/draft-ietf-quic-tls-34#section-8.3
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 08:26:46 2021 +0200
+
+ gnutls_init: redefine GNUTLS_ENABLE_EARLY_DATA flag for client
+
+ The flag was only for the server, but it turned out to be useful for
+ client to explicitly indicate early data, when 0-RTT is handled
+ out-of-band as in QUIC.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 29 08:23:15 2021 +0200
+
+ state: call secret_func on early write key change as well
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 13 08:38:20 2021 +0200
+
+ .gitlab-ci.yml: doc-dist.Fedora: invoke "texconfig rehash"
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 13 08:01:27 2021 +0200
+
+ systemkey: remove unused --inder and --infile options
+
+ While those options have no effect, the command previously tried to
+ open a file for reading and leaked file descriptor.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 12 16:55:37 2021 +0200
+
+ keylog: suppress -Wanalyzer-file-leak warnings
+
+ This workarounds the following warnings with gcc analyzer:
+
+ kx.c:156:69: error: leak of FILE '<unknown>' [CWE-775] [-Werror=analyzer-file-leak]
+ 156 | _gnutls_bin2hex(session->security_parameters.
+ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~^
+ 157 | client_random, GNUTLS_RANDOM_SIZE,
+ | ~~~~~~~~~~~~~
+
+ This should be harmless because the keylog file pointer is closed in
+ the ELF destructor.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 12 14:46:56 2021 +0200
+
+ .gitlab-ci.yml: update build images to Fedora 34 and Alpine 3.13
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 12 14:44:37 2021 +0200
+
+ devel: regenerate abidw dump files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 15:29:03 2021 +0200
+
+ .gitlab-ci.yml: bump cache version
+
+ This should fix the nettle_streebog512_update detection.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 14:25:38 2021 +0200
+
+ srptool: add missing fclose on error path
+
+ Spotted by gcc analyzer:
+ srptool.c:113:32: warning: leak of FILE 'fp' [CWE-775] [-Wanalyzer-file-leak]
+ 113 | return -1;
+ | ^
+ also:
+ srptool.c:560:32: warning: leak of FILE 'fp' [CWE-775] [-Wanalyzer-file-leak]
+ 560 | return -1;
+ | ^
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 13 08:40:59 2021 +0200
+
+ tests: _check_wait_status: use only async-thread-safe function
+
+ As this function shall be called in a signal handler, it shouldn't use
+ 'exit' as it's not async-thread-safe.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 14:23:45 2021 +0200
+
+ gnutls-serv: use only async-signal-safe functions in signal handler
+
+ Spotted by gcc analyzer:
+ serv.c:1138:9: warning: call to 'exit' from within signal handler [CWE-479] [-Wanalyzer-unsafe-call-within-signal-handler]
+ 1138 | exit(1);
+ | ^~~~~~~
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 14:13:45 2021 +0200
+
+ certtool: tighten allocation check
+
+ Spotted by gcc analyzer:
+ certtool-cfg.c:856:24: warning: use of possibly-NULL 'copy' where non-null expected [CWE-690] [-Wanalyzer-possible-null-argument]
+ 856 | while (strcmp(pass, copy) != 0
+ | ^~~~~~~~~~~~~~~~~~
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 14:08:33 2021 +0200
+
+ psktool: tighten allocation check
+
+ Spotted by gcc analyzer:
+ psk.c:275:21: warning: use of possibly-NULL '_username.data' where non-null expected [CWE-690] [-Wanalyzer-possible-null-argument]
+ 275 | if (strncmp(p, (const char *) _username.data,
+ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 13:16:51 2021 +0200
+
+ .gitignore: ignore more files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 11:08:59 2021 +0200
+
+ _tls13_{derive,expand}_secret2: fix array parameter mismatch
+
+ This suppresses the warning with -Warray-parameter
+ secrets.c:85:40: warning: argument 6 of type 'const uint8_t[64]' {aka 'const unsigned char[64]'} with mismatched bound [-Warray-parameter=]
+ 85 | const uint8_t secret[MAX_HASH_SIZE],
+ | ~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~
+ In file included from secrets.c:28:
+ secrets.h:43:41: note: previously declared as 'const uint8_t[32]' {aka 'const unsigned char[32]'}
+ 43 | const uint8_t secret[MAX_CIPHER_KEY_SIZE],
+ | ~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 11 11:04:54 2021 +0200
+
+ _gnutls_retrieve_pin: remove array declarator in function argument
+
+ This was originally to eliminate the warnings with -Warray-parameter:
+
+ pin.c:70:27: warning: argument 5 of type 'char[256]' with mismatched bound [-Warray-parameter=]
+ 70 | char pin[GNUTLS_PKCS11_MAX_PIN_LEN], unsigned pin_size)
+ | ~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ In file included from pin.c:23:
+ ./pin.h:9:48: note: previously declared as 'char *'
+ 9 | unsigned pin_flags, char *pin, unsigned pin_size);
+ | ~~~~~~^~~
+
+ though it turned out to be unnecessary because the function merely
+ delegate the call to the user-supplied callbacks.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed May 5 18:05:29 2021 -0400
+
+ spelling: The possessive pronoun "its" has no apostrophe.
+
+ "it's" is for contractions like "it is" or "it has". "its" is a
+ possessive pronoun, like "his" or "hers" or "theirs", none of which
+ have an apostrophe in them either.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Tue May 4 15:08:08 2021 -0400
+
+ certtool: Align warning about --provable with actual code
+
+ If I try to generate an ed25519 key, it is *not* an ECDSA key. But I
+ see this warning:
+
+ 0 dkg@host:~$ certtool --generate-privkey --provable --key-type ed25519
+ Generating a 256 bit EdDSA (Ed25519) private key ...
+ The --provable parameter cannot be used with ECDSA keys.
+ 1 dkg@host:~$
+
+ Looking at the code and documentation, it's clear that --provable only
+ works for RSA and DSA. This fix aligns the warning message with the
+ underlying mechanism.
+
+ Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 3 16:35:43 2021 +0200
+
+ x509/verify: treat SHA-1 signed CA in the trusted set differently
+
+ Suppose there is a certificate chain ending with an intermediate CA:
+ EE → ICA1 → ICA2. If the system trust store contains a root CA
+ generated with the same key as ICA2 but signed with a prohibited
+ algorithm, such as SHA-1, the library previously reported a
+ verification failure, though the situation is not uncommon during a
+ transition period of root CA.
+
+ This changes the library behavior such that the check on signature
+ algorithm will be skipped when examining the trusted root CA.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 3 17:27:56 2021 +0200
+
+ global: rename GNUTLS_NO_EXPLICIT_INIT to GNUTLS_NO_IMPLICIT_INIT
+
+ The old envvar still has effect but has been marked as deprecated.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 3 14:19:22 2021 +0200
+
+ certtool: fix parsing of --verify-profile option
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ruslan N. Marchenko <me@ruff.mobi>
+Date: Sun May 2 23:29:39 2021 +0200
+
+ Add tests for call gnutls_session_channel_binding
+
+ Add test unit which executes positive and negative test scenarios
+ using standard gnutls testing framework.
+
+ Signed-off-by: Ruslan N. Marchenko <me@ruff.mobi>
+
+Author: Ruslan N. Marchenko <me@ruff.mobi>
+Date: Sat May 1 23:05:54 2021 +0200
+
+ Add tls-server-end-point tls channel binding implementation.
+
+ Add server-end-point tls channel binding into gnutls_session_channel_binding
+ method. The implementation extracts session's certificate, its signature
+ algorithm, and calculates digest of the extracted certificate using
+ the function based on extracted algorithm, as per RFC5929.
+
+ Signed-off-by: Ruslan N. Marchenko <me@ruff.mobi>
+
+Author: Ruslan N. Marchenko <me@ruff.mobi>
+Date: Sat May 1 10:16:37 2021 +0200
+
+ Restructure gnutls_session_channel_binding and add tls-exporter
+
+ The restructure removes explicit pre-check for supported binding
+ type(s) and instead relies now on catch-all return which returns
+ UNIMPLEMENTED_FEATURE if no type was handled. In addition to that
+ it returns UNIMPLEMENTED_FEATURE for tls-unique request on TLSv1.3
+ session, since that is not supposed to work hence requires explicit
+ error. Finally new binding type tls-exporter implementation is
+ added.
+
+ Signed-off-by: Ruslan N. Marchenko <me@ruff.mobi>
+
+Author: Ruslan N. Marchenko <me@ruff.mobi>
+Date: Sat May 1 10:22:14 2021 +0200
+
+ Introduce new tls channel binding types into gnutls_channel_binding_t
+
+ This commit adds two new tls channel binding types into enum
+ gnutls_channel_binding_t:
+ * tls-server-end-point
+ * tls-exporter
+
+ Signed-off-by: Ruslan N. Marchenko <me@ruff.mobi>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Apr 28 11:04:20 2021 +0200
+
+ certtool: don't copy CRL distribution point from CA cert
+
+ Suggested by Thomas Karlsson in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1126
+
+ While this changes the default behavior, CDP can always be set through
+ the template or interactive input.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 25 17:04:46 2021 +0200
+
+ gnutls_x509_crt_get_dn: clarify null-termination of the output
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 25 10:48:09 2021 +0200
+
+ build: do not install .hmac files
+
+ It turned out that distro package building process might perform
+ post-processing (e.g., strip) of the shared libraries after install,
+ and that may cause inconsistency with the installed .hmac files.
+
+ Let's not try too hard on this but defer the final hmac calculation to
+ distributions. It is still useful to keep our own fipshmac as it
+ makes it easier to run FIPS tests.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 25 06:51:20 2021 +0200
+
+ tests: fix test script file name in distribution
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 25 06:50:03 2021 +0200
+
+ .gitignore: ignore ctags, etags, and GNU global files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 15:36:37 2021 +0200
+
+ handshake: fix timing of sending early data
+
+ Previously, the client was sending early data after receiving a Server
+ Hello message, which not only negates the benefit of 0-RTT, but also
+ was a logic error as it can only be decrypted by the server when the
+ initial handshake and the resuming handshake agree on the same
+ ciphersuites. This fixes that behavior in the following ways:
+
+ - extend the session data format to include the selected ciphersuites,
+ even in TLS 1.3
+ - setup the epoch for early data, right before the client sending
+ early data (also right after the server deciding to accept early
+ data).
+ - extend the test case to use different ciphersuites in the initial
+ and resuming handshakes
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Apr 23 09:44:20 2021 +0200
+
+ guile: Tests show their PID upon uncaught exceptions.
+
+ * guile/modules/gnutls/build/tests.scm (run-test): Display the PID when
+ throwing an exception.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Feb 5 12:28:35 2021 +0100
+
+ guile: Avoid the deprecated 'scm_t_uint8' type.
+
+ * guile/src/core.c: Use 'uint8_t' instead of 'scm_t_uint8', which is
+ deprecated in Guile 3.0.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Tue Dec 22 10:30:43 2020 +0100
+
+ guile: Avoid potentially missed reference.
+
+ There's one case where 'register_weak_reference' is called several times
+ on the same object, in 'set-certificate-credentials-x509-keys!', where
+ PRIVKEY could have been GC'd before CRED.
+
+ * guile/src/core.c (register_weak_reference): Add TO to the weak
+ references of FROM instead of overriding them.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 10:28:03 2021 +0200
+
+ afalg: use pkg-config to detect libkcapi
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 10:03:47 2021 +0200
+
+ afalg: support AES-XTS algorithms
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 09:56:40 2021 +0200
+
+ afalg: cleanup header inclusion
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Mon Dec 21 18:22:14 2020 +0100
+
+ guile: Remove leftover comment about allocation routines.
+
+ This is a followup to 872409857351f28b1e3c21526bfa6606c918b176.
+
+ * guile/src/core.c (scm_init_gnutls): Remove leftover comment.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 09:50:16 2021 +0200
+
+ afalg: remove unnecessary initialization
+
+ That would make it easier to spot any uninitialized memory access with
+ valgrind.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 09:45:51 2021 +0200
+
+ afalg: assert IV size returned from the kernel is in the range
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 23 09:42:03 2021 +0200
+
+ NEWS: mention AF_ALG support
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Apr 14 17:27:43 2021 +0200
+
+ crypto-selftests: tolerate errors of gnutls_{hash,hmac}_copy
+
+ Some hardware accelerated implementations, such as afalg, cannot
+ support the copy operation. This patch turns it a soft-error, as the
+ code below is already checking if the copy is non-NULL, before
+ performing any operation on it.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 22 16:42:01 2021 +0200
+
+ handshake: don't regenerate legacy_session_id in second CH after HRR
+
+ According to RFC 8446 4.1.2, the client must send the same Client
+ Hello after Hello Retry Request, except for the certain extensions,
+ and thus legacy_session_id must be preserved.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Apr 14 16:50:28 2021 +0200
+
+ _gnutls_cipher_init: fallback if setiv is not implemented for AEAD
+
+ The _gnutls_cipher_init function currently assumes that all the cipher
+ implementations have .setiv method. This is not the case for
+ AEAD-only implementations such as afalg.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Stephan Mueller <smueller@chronox.de>
+Date: Sat Oct 14 20:46:09 2017 +0200
+
+ Add AF_ALG acceleration
+
+ The patch set adds the backend implementation to use the Linux kernel
+ crypto API via the AF_ALG interface. The GnuTLS AF_ALG extension uses
+ libkcapi [1] as the backend library which implements the actual kernel
+ communication.
+
+ [1] http://www.chronox.de/libkcapi.html
+
+ The symmetric cipher support, the hashing and the MAC support are
+ validated to work correctly using NIST CAVS test vectors.
+
+ The AEAD cipher support was tested by connecting to a remote host using
+ gnutls-cli (the following log strips out unrelated information):
+
+ Processed 143 CA certificate(s).
+ ...
+ - Certificate type: X.509
+ - Got a certificate list of 1 certificates.
+ - Certificate[0] info:
+ ...
+ - Description: (TLS1.2)-(ECDHE-SECP384R1)-(RSA-SHA512)-(AES-256-GCM)
+ - Session ID: 9E:5E:FC:09:2A:4E:2A:3D:22:44:68:42:C3:F6:2D:AB:F9:67:08:CE:6D:EE:E4:A2:EF:80:43:FE:3B:D9:1E:FE
+ - Ephemeral EC Diffie-Hellman parameters
+ - Using curve: SECP384R1
+ - Curve size: 384 bits
+ - Version: TLS1.2
+ - Key Exchange: ECDHE-RSA
+ - Server Signature: RSA-SHA512
+ - Cipher: AES-256-GCM
+ - MAC: AEAD
+ - Options: extended master secret, safe renegotiation,
+ - Handshake was completed
+
+ - Simple Client Mode:
+
+ Signed-off-by: Stephan Mueller <smueller@chronox.de>
+
+ Co-authored-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Hedgehog5040 <krenzelok.frantisek@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 16 13:56:40 2021 +0200
+
+ priority: add option to disable TLS 1.3 middlebox compatibility mode
+
+ This adds a new option %DISABLE_TLS13_COMPAT_MODE to disable TLS 1.3
+ compatibility mode at run-time.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 30 13:39:46 2021 +0200
+
+ _gnutls_calloc: remove unused function
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 29 14:09:51 2021 +0200
+
+ keys-win: free certificate context in gnutls_system_key_iter_deinit
+
+ Suggested by Bjørn Christensen in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1197
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 29 11:06:37 2021 +0200
+
+ build: avoid integer overflow in additions
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 21 08:43:26 2021 +0100
+
+ build: avoid potential integer overflow in array allocation
+
+ This relies on _gnutls_reallocarray for all occasions of array
+ allocations, so that they can benefit from the built-in overflow
+ checks.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 29 13:08:23 2021 +0200
+
+ pkcs11x: find_ext_cb: fix error propagation
+
+ Use explicit error value, as rv is not set in this code path.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 21 08:42:23 2021 +0100
+
+ mem: add _gnutls_reallocarray and _gnutls_reallocarray_fast
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 21 08:34:13 2021 +0100
+
+ bootstrap: pull in 'xalloc-oversized' module from Gnulib
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Mar 20 13:52:25 2021 +0100
+
+ build: doc: install missing image file gnutls-crypto-layers.png
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 11:03:44 2021 +0100
+
+ examples: avoid memory leak in ex-verify
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 11:03:22 2021 +0100
+
+ examples: avoid memory leak in tlsproxy
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 10:56:46 2021 +0100
+
+ src: avoid file descriptor leak in socket_open2
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 10:48:49 2021 +0100
+
+ gnutls-cli-debug: avoid resource leak in saving DHE params
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 10:47:50 2021 +0100
+
+ srptool: avoid FILE pointer leak on error
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 15 09:55:20 2021 +0100
+
+ gnulib: update git submodule
+
+ This brings in the fix for parse-datetime test failures on NetBSD:
+ https://lists.gnu.org/archive/html/bug-gnulib/2021-03/msg00069.html
+ https://git.savannah.gnu.org/gitweb/?p=gnulib.git;a=commit;h=35f8ff2e1162bf3ee60d99b6812f2ae10f3f2898
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 10 16:12:23 2021 +0100
+
+ str: suppress -Wunused-function if AGGRESSIVE_REALLOC is defined
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 10 16:11:29 2021 +0100
+
+ _gnutls_buffer_resize: account for unused area if AGGRESSIVE_REALLOC
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 10 05:06:13 2021 +0100
+
+ Release 3.7.1
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 29 14:06:50 2021 +0100
+
+ pre_shared_key: avoid use-after-free around realloc
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 29 14:06:32 2021 +0100
+
+ key_share: avoid use-after-free around realloc
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 9 13:41:59 2021 +0100
+
+ _gnutls_buffer_resize: add option to use allocation simpler logic
+
+ This helps detect common mistakes[1] in realloc usage with valgrind,
+ where the caller assumes that the original ptr is always returned.
+
+ 1. https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 9 20:29:37 2021 +0100
+
+ x86: flip polarity of check_fast_pclmul
+
+ Otherwise GCC produces the following warnings as the stub
+ __get_cpuid() is defined as '#define __get_cpuid(...) 0':
+
+ x86-common.c: In function 'register_x86_crypto':
+ x86-common.c:314:15: warning: 'a' may be used uninitialized in this function [-Wmaybe-uninitialized]
+ 314 | family = ((a >> 8) & 0x0F);
+ | ~~~^~~~~
+ x86-common.c:308:15: note: 'a' was declared here
+ 308 | unsigned int a,b,c,d;
+ | ^
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 9 13:07:26 2021 +0100
+
+ gnutls_buffer_append_data: remove duplicated code
+
+ The function shared the same logic as in _gnutls_buffer_resize.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Mar 8 14:56:32 2021 +0100
+
+ lib/nettle: get rid of _rnd_system_entropy_check
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Mon Mar 8 11:54:16 2021 +0100
+
+ lib/global: don't call now-noop _gnutls_rnd_check
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Thu Mar 4 10:54:44 2021 +0100
+
+ sysrng-linux: re-open /dev/urandom every time
+
+ Prompted by the following comment of Daiki Ueno:
+ > I also wonder why we keep the fd open for such a long time in the first
+ > place. Both OpenSSL and NSS have a similar fallback to /dev/urandom
+ > if getrandom is not available, but opens the device in one-shot,
+ > when reseeding is needed (and that's pretty rare).
+ https://gitlab.com/gnutls/gnutls/-/merge_requests/1383#note_521749519
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
+Date: Fri Mar 5 12:31:45 2021 +0100
+
+ Add unit test for id-on-xmppAddr decoding error
+
+ Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 5 12:08:25 2021 +0100
+
+ gnutls_x509_trust_list_verify_crt2: skip duped certs for PKCS11 too
+
+ The commit 09b40be6e0e0a59ba4bd764067eb353241043a70 (part of
+ gnutls/gnutls!1370) didn't cover the case where the trust store is
+ backed by PKCS #11, because it used _gnutls_trust_list_get_issuer,
+ which only works with file based trust store.
+
+ This patch replaces the call with more generic
+ gnutls_x509_trust_list_get_issuer so it also works with other trust
+ store implementations.
+
+ Reported by Michal Ruprich.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
+Date: Thu Mar 4 16:44:21 2021 +0100
+
+ output UTF-8 decoded id-on-xmppAddr SAN's
+
+ tls_x509_crt_get_subject_alt_name()` makes a promise [1] "If an
+ otherName OID is known, the data will be decoded. ... RFC 3920
+ id-on-xmppAddr SAN is recognized." which it didn't hold.
+
+ Before this patch the output was still in DER format, e.g. for a
+ id-on-xmppAddr which is always UTF-8 (0x0c): `0x0c <len> <xmppAddr>`
+
+ This patch fixes the issue and now it returns the decoded string.
+
+ [1]
+ https://www.gnutls.org/manual/gnutls.html#gnutls_005fx509_005fcrt_005fget_005fsubject_005falt_005fname
+
+ Signed-off-by: Steffen Jaeckel <jaeckel-floss@eyet-services.de>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sun Feb 28 13:56:21 2021 +0100
+
+ Changed _gnutls_session_cert_type_supported prototype and name to follow guidelines for boolean functions.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Feb 25 12:06:55 2021 +0100
+
+ Changed certificate retrieval callback prototype parameter name to be in line with the other parameters.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sat Jan 23 19:24:46 2021 +0100
+
+ Added documentation for rawpk use in certificate retrieval callback.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Feb 25 15:20:05 2021 +0100
+
+ Added extra logging and done some variable refactoring for server cert type extension.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Jan 28 20:05:51 2021 +0100
+
+ Added extra logging and done some variable refactoring for client cert type extension.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: JonasZhou <JonasZhou@zhaoxin.com>
+Date: Thu Feb 25 15:48:36 2021 +0800
+
+ padlock:add support for AES-192-CBC
+
+ Padlock code misses support for AES-192. Extend it to support AES-192.
+ Due to poor performance of padlock-aes-xxx-gcm, only padlock-aes-192-cbc
+ is added.
+
+ Signed-off-by: JonasZhou <JonasZhou@zhaoxin.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Feb 19 15:36:48 2021 +0100
+
+ .gitlab-ci.yml: run fedora-valgrind jobs only on upstream branches
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 18:35:14 2021 +0100
+
+ tests: remove *hello_random_value tests
+
+ Those tests are meaningless and merely introduces extra flakiness, now
+ that the uninitialized random bytes are detected by valgrind.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 13:34:40 2021 +0100
+
+ .gitlab-ci.yml: use longer handshake timeout for valgrind jobs
+
+ Also limit the parallelism to $(nproc) to be less resource intensive.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 18:22:18 2021 +0100
+
+ tests: make any ad-hoc timeout setting controllable through envvar
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 10:49:07 2021 +0100
+
+ tests: suffix .sh for all shell-script tests
+
+ Otherwise valgrind will run against /bin/sh.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 09:23:02 2021 +0100
+
+ tests: don't conditionalize valgrind with --disable-full-test-suite
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 29 15:36:44 2021 +0100
+
+ tests: don't run shell-script tests under valgrind
+
+ https://www.gnu.org/software/gnulib/manual/html_node/Valgrind-and-shell-scripts.html
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 30 09:25:06 2021 +0100
+
+ nettle: check lib state early to cope with synthesized error
+
+ tests/x509sign-verify-error.c calls _gnutls_lib_simulate_error before
+ the actual private key operations. That previously resulted in
+ infloop / conditional jump depending on uninitialized data, because
+ the random function (gnutls_rnd) was not able to feed sufficient
+ randomness in that case.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 29 14:09:17 2021 +0100
+
+ tests: fix memory leak in tests/tls13/no-auto-send-ticket
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 24 07:49:34 2021 +0100
+
+ tests: remove init_fds test
+
+ This test does nothing to expose the original problem linked in the comment:
+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760476
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 23 14:36:57 2021 +0100
+
+ safe-memfuncs: rely on explicit_bzero implementation from gnulib
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 17 11:31:23 2021 +0100
+
+ .gitlab-ci.yml: remove scriptlet to generate HMAC files for FIPS
+
+ This is now generated automatically during the build.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Ondrej Moris <omoris@redhat.com>
+Date: Fri Oct 30 20:43:56 2020 +0100
+
+ fips: replace fipshmac usage with internal program
+
+ This introduces a non-installed program "fipshmac" and uses it for
+ generating HMAC files required in FIPS 140-2. The generated files are
+ installed along with the main library.
+
+ Resolves issues #1101.
+
+ Signed-off-by: Ondrej Moris <omoris@redhat.com>
+ Co-authored-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 17 07:24:27 2021 +0100
+
+ build: don't remove distributed stamp files on "make clean"
+
+ Those files are created by the maintainers and should remain after
+ "make clean" when the distribution tarball is used.
+
+ Reported by christian wagner in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1088
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 16 08:45:23 2021 +0100
+
+ fastopen: remove call to abort()
+
+ Ideally, this function should have a way to return an error, but
+ simply not enabling TFO wouldn't hurt.
+
+ Reported by Tim Rühsen in:
+ https://gitlab.com/gnutls/gnutls/-/issues/603
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 16 08:39:17 2021 +0100
+
+ hex: use a table to avoid meaningless assertion
+
+ Reported by Tim Rühsen in:
+ https://gitlab.com/gnutls/gnutls/-/issues/604
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 17 06:38:41 2021 +0100
+
+ gnutlsxx: add const and explicit specifiers where possible
+
+ Flagged by cppcheck.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Dmitriy Tsvettsikh <dmitrycvet@gmail.com>
+Date: Wed Feb 17 04:28:47 2021 +0500
+
+ configure.ac: fix "nettle_rsa_sec_decrypt" check error
+
+ When libhogweed built with external gmplib, then it required explicit
+ path to gmplib to pass check.
+
+ Signed-off-by: Dmitriy Tsvettsikh <dmitrycvet@gmail.com>
+
+Author: Evgeny Grin <k2k@narod.ru>
+Date: Sun Jan 10 21:36:18 2021 +0300
+
+ Sockets: implement sendmsg()-like functions on Win32
+
+ Use WSASend() to send several buffer per one sys-call.
+ Unified send()/recv() support for POSIX/Win32.
+
+ Signed-off-by: Evgeny Grin <k2k@narod.ru>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 16 07:51:10 2021 +0100
+
+ gnutlsxx: dh_params, rsa_params: actually assign values in operator=
+
+ The previous implementation assigned the value to a temporary variable
+ and then return it without assigning it to 'this'. That is not only
+ contradictory to user's expectation but also cppcheck treats it as a
+ logic error.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 15 15:51:25 2021 +0100
+
+ README.md: don't suggest installing lockfile-progs
+
+ The dependency has been removed in
+ 5eff2002b0f7ac54b14326f207b5a9e509269555.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 15 14:54:14 2021 +0100
+
+ .gitlab-ci.yml: fix typo in cppcheck -I argument
+
+ Reported by Tim Rühsen in:
+ https://gitlab.com/gnutls/gnutls/-/issues/705
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 15 14:53:39 2021 +0100
+
+ README.md: fix typo in libev URL
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Feb 13 15:56:22 2021 +0100
+
+ .gitlab-ci.yml: bump cache version
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 8 12:24:31 2021 +0100
+
+ bootstrap.conf: initialize openssl submodule
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 8 08:46:13 2021 +0100
+
+ configure.ac: fix misleading --help output on guile bindings
+
+ Reported by Tim Rühsen in:
+ https://gitlab.com/gnutls/gnutls/-/issues/577
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 7 18:54:45 2021 +0100
+
+ bootstrap: update from Gnulib
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 7 17:38:31 2021 +0100
+
+ bootstrap.conf: refactor detection of gtk-doc and gnulib sockets
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Feb 13 15:57:36 2021 +0100
+
+ .gitignore: ignore more files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Tue Feb 9 14:16:54 2021 +0100
+
+ Fix test error with nettle in non-default location
+
+ Move #include <nettle/memxor.h> from gnutls_int.h to lib/cipher.c, drop
+ now superfluous NETTLE_CFLAGS from CPPFLAGS of multiple tests #including
+ gnutls_int.h.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 11 06:45:47 2021 +0100
+
+ .gitlab-ci.yml: remove FreeBSD run
+
+ This used to run on a dedicated FreeBSD runner, which is no longer
+ maintained.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 9 15:26:07 2021 +0100
+
+ tests/gnutls-cli-debug.sh: don't unset system priority settings
+
+ When the test is exercised, GNUTLS_SYSTEM_PRIORITY_FILE is set in many
+ places, such as TESTS_ENVIRONMENT tests/Makefile.am or a packaging
+ system that runs the test in a restricted environment. Unsetting it
+ after a temporary use forces the remaining part of the test to use the
+ default system priority, which might not be the intention of the user.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 28 12:14:13 2020 +0100
+
+ gnutls_x509_trust_list_verify_crt2: ignore duplicate certificates
+
+ The commit ebb19db9165fed30d73c83bab1b1b8740c132dfd caused a
+ regression, where duplicate certificates in a certificate chain are no
+ longer ignored but treated as a non-contiguous segment and that
+ results in calling the issuer callback, or a verification failure.
+
+ This adds a mechanism to record certificates already seen in the
+ chain, and skip them while still allow the caller to inject missing
+ certificates.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+ Co-authored-by: Andreas Metzler <ametzler@debian.org>
+
+Author: Dosenpfand <m@sad.bz>
+Date: Sun Feb 7 23:17:28 2021 +0100
+
+ doc: Add some missing algorithm keywords to priority string table
+
+ Signed-off-by: Markus Gasser <m@sad.bz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 3 16:05:22 2021 +0100
+
+ tests: close unused fd opened by socketpair
+
+ Otherwise the tests block forever, even if the child exits.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 3 15:56:42 2021 +0100
+
+ .gitlab-ci.yml: remove redundant "make check" in build stage
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 24 07:34:24 2021 +0100
+
+ handshake: TLS 1.3: don't generate session ID in resumption mode
+
+ The commit e0bb98e1f71f94691f600839ff748d3a9f469d3e revealed that the
+ previous code always generated session ID in the TLS 1.3 middlebox
+ compatibility mode even when the handshake is being resumed.
+
+ This could cause a difference in PSK binder calculation if the server
+ sends an HRR in the resumption handshake.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 3 15:50:08 2021 +0100
+
+ gnutls_session_is_resumed: don't check session ID in TLS 1.3
+
+ In middlebox compatibiltiy mode, TLS 1.3 client simulates the TLS 1.2
+ resumption handshake, so checking session ID for resumption is
+ pointless. This worked previously because the client always generated
+ new random value even in a true resumption handshake, but didn't
+ update the session parameters properly.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 4 08:39:04 2021 +0100
+
+ _gnutls_openpgp_send_fingerprint: remove unused declaration
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 4 08:38:16 2021 +0100
+
+ _gnutls_session_is_resumable: remove unused internal function
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 4 08:56:33 2021 +0100
+
+ handshake: replace TRUE and FALSE with <stdbool.h>
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 4 08:30:30 2021 +0100
+
+ handshake: replace RESUME_TRUE and RESUME_FALSE with <stdbool.h>
+
+ Having those constants could cause wrong impression that there is a
+ third possible value.
+
+ To reproduce the changes other than lib/gnutls_int.h:
+
+ for i in `git ls-files lib`; do
+ sed -i
+ -e 's/\(session->internals.\(resumed\|resumable\)\) *\(== *RESUME_FALSE\|!= *RESUME_TRUE\)/!\1/' \
+ -e 's/\(session->internals.\(resumed\|resumable\)\) *\(== *RESUME_TRUE\|!= *RESUME_FALSE\)/\1/' \
+ -e 's/RESUME_TRUE/true/' \
+ -e 's/RESUME_FALSE/false/' \
+ $i
+ done
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 29 09:59:06 2020 +0100
+
+ testcompat-openssl: run TLS 1.3 client/server tests in parallel
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 29 07:26:16 2020 +0100
+
+ testcompat-openssl: remove hand-written parallelism
+
+ Previously, the test used to launch multiple tests in background and
+ then join them using shell primitives. That approach makes the test
+ slower as it cannot benefit from the automake's parallel test harness,
+ as well as it makes diagnostic harder because the lines in the log
+ file mix up.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 29 10:06:50 2020 +0100
+
+ testcompat-polarssl: remove hand-written parallelism
+
+ Previously, the test used to launch multiple tests in background and
+ then join them using shell primitives. That approach makes the test
+ slower as it cannot benefit from the automake's parallel test harness,
+ as well as it makes diagnostic harder because the lines in the log
+ file mix up.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 22 14:37:47 2021 +0100
+
+ fips: avoid memleak in (EC)DH internal APIs
+
+ There were some confusions of gnutls_pk_params_clear and
+ gnutls_pk_params_release, as well as the number of parameters to scan
+ in the gnutls_pk_params_st structure.
+
+ Flagged by address sanitizer:
+ ==354688==ERROR: LeakSanitizer: detected memory leaks
+
+ Direct leak of 192 byte(s) in 12 object(s) allocated from:
+ #0 0x7f13506163cf in __interceptor_malloc (/lib64/libasan.so.6+0xab3cf)
+ #1 0x7f13503b94de in wrap_nettle_mpi_init /home/ueno/devel/gnutls/lib/nettle/mpi.c:79
+ #2 0x7ffcb8495f07 ([stack]+0x1ef07)
+
+ Direct leak of 160 byte(s) in 10 object(s) allocated from:
+ #0 0x7f13506163cf in __interceptor_malloc (/lib64/libasan.so.6+0xab3cf)
+ #1 0x7f13503b94de in wrap_nettle_mpi_init /home/ueno/devel/gnutls/lib/nettle/mpi.c:79
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Tom Carroll <incentivedesign@gmail.com>
+Date: Sun Jan 10 15:28:50 2021 -0800
+
+ Deinitialize pcerts array elements during cleanup.
+
+ In gnutls_certificate_set_x509_key() cleanup, the pcert elements should
+ be deinitialized, freeing pcert's pubkey and cert fields.
+
+ Signed-off-by: Tom Carroll <incentivedesign@gmail.com>
+
+Author: Tom Carroll <incentivedesign@gmail.com>
+Date: Sun Jan 10 21:40:52 2021 -0800
+
+ Ensure ca_list != NULL and ca_list_size > 0.
+
+ As ca_list_size is used in malloc, ensure that ca_list_size > 0.
+ If ca_list_size > 0, then ca_list cannot be NULL. Make these
+ assumptions explicit with argument condition check.
+
+ Signed-off-by: Tom Carroll <incentivedesign@gmail.com>
+
+Author: Tom Carroll <incentivedesign@gmail.com>
+Date: Sun Jan 10 21:31:19 2021 -0800
+
+ Verify that cert_list != NULL and cert_list_size > 0.
+
+ gnutls_certificate_set_x509_key() assumes that cert_list != NULL and
+ cert_list_size > 0. These assumptions are evident as cert_list_size is
+ used for malloc and cert_list[0] is accessed. Make those assumptions
+ explicit with argument condition check.
+
+ Signed-off-by: Tom Carroll <incentivedesign@gmail.com>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Thu Jan 7 13:41:12 2021 +0200
+
+ configure: Remove -no_weak_links from LDFLAGS after detecting function availability
+
+ This reverts commit 945a48993dcdd9ead17216e55c59db209923ea5e
+ and fixes the original issue (#966) differently.
+
+ This makes sure that when targeting a version of macOS less than
+ 10.12, we won't pick up and unconditionally use functions that
+ only appeared later, when building with Xcode 11.4 or newer.
+ (With Xcode 11.4 or newer, the fix from 945a48993dcdd9 caused
+ -no_weak_links not be added, affecting the function availability
+ tests.)
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Thu Jan 7 20:29:54 2021 +0100
+
+ Update year of copyright notices in doc/gnutls.texi
+
+ Static analysis in CI checks if this is up to date, and fails if
+ not. This fixes the failure.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sat Jan 2 18:24:18 2021 +0100
+
+ Update CI documentation for use of Github Actions
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sat Jan 2 18:22:55 2021 +0100
+
+ Remove Travis CI configuration
+
+ Replaced by Github Actions workflow added in
+ 9fc73ec96fa5adfc8e9a4bd2ee9e6543ffcfe120.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Tue Dec 29 22:03:53 2020 +0100
+
+ Github Actions job for MacOS CI
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 29 19:24:28 2020 +0100
+
+ gnulib: update git submodule
+
+ This brings in the fix for building with autoconf 2.70:
+ https://lists.gnu.org/archive/html/bug-gnulib/2020-12/msg00091.html
+
+ Suggested by Jan Palus in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1138
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Sadie Powell <sadie@witchery.services>
+Date: Fri Dec 11 05:39:56 2020 +0000
+
+ Fix a common typo of gnutls_priority_t.
+
+ Signed-off-by: Sadie Powell <sadie@witchery.services>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Tue Dec 8 11:36:57 2020 +0100
+
+ libgnutls-openssl: Clean up list of exported symbols
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Dec 29 09:46:36 2020 +0100
+
+ testcompat-openssl: specify -sigalgs on s_client command line
+
+ This is a left-over of commit
+ 23958322865a8a77c2f924f569484e5fd150a24b. Otherwise the OpenSSL system
+ configuration may affect algorithm selection.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Dec 28 16:16:53 2020 +0100
+
+ testpkcs11: use datefudge to trick certificate expiry
+
+ The certificates stored in tests/testpkcs11-certs expired on
+ 2020-12-13. To avoid verification failure due to that, use datefudge
+ to set custom date when calling gnutls-cli, gnutls-serv, and certtool.
+
+ Based on the patch by Andreas Metzler:
+ https://gitlab.com/gnutls/gnutls/-/issues/1135#note_469682121
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Mon Dec 21 09:36:47 2020 -0500
+
+ tests: Fix tpmtool_test due to changes in trousers
+
+ Recent changes to trousers now require an ownership of root:tss for
+ the tcsd config file, older ones requires tss:tss. So, start tcsd
+ using trial and error with either one of these ownership configurations
+ until one works.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Norbert Pocs <npocs@redhat.com>
+Date: Fri Oct 30 17:18:30 2020 +0100
+
+ Fix non-empty session id (TLS13_APPENDIX_D4)
+
+ When TLS1.3 is used with middlebox compatible mode, the session id should be filled with random session id,
+ but remained empty.
+
+ Signed-off-by: Norbert Pocs <npocs@redhat.com>
+
+ Closes #1074
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Dec 2 10:30:08 2020 +0100
+
+ Release 3.7.0
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Dec 2 09:33:21 2020 +0100
+
+ NEWS: update for 3.7.0 release
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: ihsinme <ihsinme@gmail.com>
+Date: Mon Nov 30 14:56:15 2020 +0000
+
+ fix invalid unsigned arithmetic.
+
+ Signed-off-by: ihsinme <ihsinme@gmail.com>
+
+Author: Stanislav Zidek <szidek@redhat.com>
+Date: Fri Nov 27 13:24:24 2020 +0100
+
+ CI pipeline rework - using stages and inheritance
+
+ Signed-off-by: Stanislav Zidek <szidek@redhat.com>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Mon Nov 30 13:08:01 2020 -0600
+
+ x509: Improve documentation of new set_getissuer_function
+
+ Since gnutls!1354, some of this information is now obsolete. The caller
+ is no longer responsible for verifying the certificate or adding it to
+ the trust list. GnuTLS will now handle that. Instead, the callback
+ should always import the missing certificate and return success if the
+ certificate was imported, or failure otherwise.
+
+ Also, let's point to gnutls_x509_crt_get_authority_info_access(), since
+ it is useful in combination with this function.
+
+ Finally, since this callback is emitted once for each missing
+ intermediate certificate, it's probably less confusing if we talk about
+ only a single missing intermediate here. Yes, there could be multiple
+ missing certificates, but a single invocation of this callback can only
+ deal with one.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 29 18:17:54 2020 +0100
+
+ fuzz: limit the retry count in handshake fuzzer
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 29 17:44:24 2020 +0100
+
+ gnutls_handshake_write: don't enqueue empty Handshake message
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 29 16:51:45 2020 +0100
+
+ fuzz: fix undefined behavior on left shift
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Tue Nov 24 11:13:07 2020 +0100
+
+ accelerated: Re-generate assembly sources
+
+ Re-generate assembly sources from the updated openssl submodule.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 24 10:54:06 2020 +0100
+
+ verify-tofu: return errors from store functions if callback fails
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Tue Nov 24 10:46:12 2020 +0100
+
+ devel: Update openssl submodule
+
+ Update openssl submodule to current OpenSSL_1_1_1-stable branch
+ (8e813c085a).
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 23 07:49:04 2020 +0100
+
+ configure.ac: include <libguile.h> when checking scm_* functions
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 12 06:49:12 2020 +0100
+
+ crypto-backend: remove ability of overriding ciphers
+
+ Those functions has been deprecated in 3.6.9 as they do not have
+ active use cases.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 9 10:11:04 2020 +0100
+
+ NEWS: add entry for QUIC related API functions
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 9 09:05:05 2020 +0100
+
+ fuzz: fuzz gnutls_handshake_write
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 24 17:51:56 2020 +0100
+
+ alert: add callback to intercept alert messages
+
+ This adds gnutls_alert_set_read_function(), to allow QUIC
+ implementations to be notified when an alert message is sent.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Feb 21 17:48:37 2020 +0100
+
+ handshake: add callback to get notified with traffic secret change
+
+ For the use with QUIC, the change of traffic secrets must be notified
+ _after_ a new epoch is set up for reading or writing, and we can't
+ simply reuse the keylog mechanism.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 19 14:35:04 2020 +0100
+
+ handshake: add functions to read/write handshake messages directly
+
+ This adds a couple of functions, gnutls_handshake_set_read_function()
+ and gnutls_handshake_write(), to allow QUIC implementations to
+ directly interact with the TLS state machine.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 11 19:15:13 2020 +0100
+
+ x509: rework issuer callback
+
+ The previous issuer callback API had a drawback: the callback is
+ supposed to add CA to the trust list by itself. This was error-prone,
+ because the callback must check the new CA is trusted by the already
+ added CA. This instead moves the responsibility to the library.
+
+ This also rewrites the chain amendment logic in a side-effect free
+ manner. The application can assume that the trust information stored
+ on gnutls_x509_trust_list_t shouldn't change after the verification.
+
+ The missingissuer test has been extended to cover all the possible
+ patterns exhaustively.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 12 10:57:21 2020 +0100
+
+ _gnutls_cert_log: assume that 'cert' is nonnull
+
+ This makes static analyzers happy.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 15 09:57:37 2020 +0100
+
+ _gnutls_sort_clist: simplify the calling convention
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Tomas Mraz <tmraz@fedoraproject.org>
+Date: Mon Oct 26 15:23:24 2020 +0100
+
+ Use proper record version in client hello after hello retry request
+
+ Signed-off-by: Tomas Mraz <tmraz@fedoraproject.org>
+
+ Fixes: #1053
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 12 07:46:19 2020 +0100
+
+ pkcs11: increase the maximum PIN length from 31 to 255
+
+ The maximum is chosen from the default configuration of SoftHSMv2:
+ https://github.com/opendnssec/SoftHSMv2/blob/develop/CMakeLists.txt#L61
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 08:45:03 2020 +0100
+
+ _gnutls_x509_read_value: don't count terminating null byte for OIDs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Co-authored-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 12 09:19:30 2020 +0100
+
+ x509: clarify how to release memory allocated for DN
+
+ The application can assume that DNs returned from
+ _gnutls_x509_get_dn() are allocated with gnutls_malloc() and thus
+ shall be freed with gnutls_free().
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Mon Oct 12 16:33:54 2020 -0500
+
+ pkcs11: fix session leak in error path
+
+ gnutls_pkcs11_obj_set_info() fails to call pkcs11_close_session() after
+ a successful pkcs11_open_session() if called with an invalid itype
+ parameter. That would be programmer error, of course, but better not
+ forget to close the session regardless.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Mon Sep 28 10:21:40 2020 +0200
+
+ Adds a new API gnutls_session_set_verify_output_function() that allows TLS applications
+ to have a way to pass the gnutls_verify_output_function() as a callback so that the full
+ path of the certificate chain to the trusted root can be avaiable as output.
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 5 05:57:01 2020 +0100
+
+ .gitlab-ci.yml: temporarily allow failures on Debian.cross.aarch64
+
+ qemu is currently causing segmentation fault:
+ cipher: aes-128-gcm
+ cipher: aes-192-gcm
+ cipher: aes-256-gcm
+ cipher: chacha20-poly1305
+ qemu: uncaught target signal 11 (Segmentation fault) - core dumped
+ Segmentation fault (core dumped)
+ default cipher tests failed
+ FAIL test-ciphers-openssl.sh (exit status: 139)
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 5 05:56:31 2020 +0100
+
+ .gitlab-ci.yml: use nettle git master for FreeBSD.x86_64
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 6 09:54:54 2020 +0100
+
+ tls-sig: defer allowed sigalg check to gnutls_pubkey_verify_data2
+
+ This reverts 485f2551e68d1b4ee70be2960f0a241b4a2b9fb9. After the new
+ configuration file has been introduced, the allowed algorithms are
+ checked after this part.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Remi Olivier <remi_8@hotmail.com>
+Date: Wed Oct 28 20:43:25 2020 -0700
+
+ Fix memory leak with client certificate auth
+ Fix memory leak with client certificate auth when rehandshake with ocsp
+
+ More info in bug: gnutls/gnutls#1107
+
+ Signed-off-by: Remi Olivier <remi_8@hotmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 5 05:51:56 2020 +0100
+
+ Revert ".lgtm.yml: no longer bring nettle from master"
+
+ This reverts commit bbe93dc315009fe1f9a30426cbe20f4661b8435c.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 4 19:05:58 2020 +0100
+
+ gostdsa: fix memleak in _gnutls_gostdsa_unmask_key
+
+ Spotted by valgrind:
+ ==5721== 40 bytes in 1 blocks are definitely lost in loss record 1 of 3
+ ==5721== at 0x4839809: malloc (vg_replace_malloc.c:307)
+ ==5721== by 0x4DC3E59: __gmp_default_allocate (in /usr/lib64/libgmp.so.10.4.0)
+ ==5721== by 0x4DD26A3: __gmpz_realloc (in /usr/lib64/libgmp.so.10.4.0)
+ ==5721== by 0x4DD8B9D: __gmpz_set_str (in /usr/lib64/libgmp.so.10.4.0)
+ ==5721== by 0x499339D: _gnutls_gostdsa_unmask_key (gostdsa-mask.c:68)
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 4 18:58:25 2020 +0100
+
+ testcompat-openssl: use RC4-SHA instead of RC4-MD5 for testing
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 4 11:43:35 2020 +0100
+
+ .gitlab-ci.yml: use Fedora 33 with LEGACY policy for SSL 3.0 testing
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 4 09:46:10 2020 +0100
+
+ .gitlab-ci.yml: supply -fstack-protector required by latest MinGW
+
+ https://sourceforge.net/p/mingw-w64/bugs/818/
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 4 08:56:04 2020 +0100
+
+ tls-fuzzer: update submodules
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 12 17:42:15 2020 +0200
+
+ .gitlab-ci.yml: avoid using fipshmac
+
+ The new fipshmac command provided by libkcapi requires NETLINK_CRYPTO,
+ which is not enabled on gitlab CI.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 4 14:08:37 2020 +0200
+
+ src: remove use of siginterrupt
+
+ GCC 10 warns this:
+ tests.c:702:2: error: 'siginterrupt' is deprecated: Use sigaction with SA_RESTART instead [-Werror=deprecated-declarations]
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 3 16:15:25 2020 +0200
+
+ .gitlab-ci.yml: update build-images for nettle 3.6
+
+ Also remove Debian.cross.mips-linux-gnu, as it is no longer supported.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 6 08:56:07 2020 +0200
+
+ build: hard require nettle 3.6
+
+ This allows us to remove several backports, including XTS, CFB8,
+ raw-ChaCha, CMAC64, Curve448, and the GOST curves and hashes.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Hans Leidekker <hans@codeweavers.com>
+Date: Tue Nov 3 12:31:38 2020 +0100
+
+ Make y parameter optional in gnutls_privkey_import_dsa_raw().
+
+ Signed-off-by: Hans Leidekker <hans@codeweavers.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 30 16:53:47 2020 +0100
+
+ psktool: Fix hex-encoding logic of username
+
+ The previous code didn't modify the pointer to the realloc'ed region
+ nor check overflow before calling realloc.
+
+ Spotted by Anderson Sasaki in:
+ <https://gitlab.com/gnutls/gnutls/-/merge_requests/1345#note_439063374>.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Thu Oct 29 10:18:56 2020 +0100
+
+ PKCS#12: switch default encryption to AES-256-CBC
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 26 16:32:59 2020 +0100
+
+ srptool: fix FILE pointer leak
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 25 08:36:57 2020 +0100
+
+ mini-record-timing: use only async-signal-safe functions in handler
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 24 10:23:03 2020 +0200
+
+ psktool: encode username if it contains special character
+
+ This also moves the hex encoding of key to write_key for readability
+ and makes file stream closing robuster.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 26 15:42:22 2020 +0100
+
+ bootstrap.conf: exercise more tests from Gnulib
+
+ This fixes the build failure with -Werror:
+
+ configure:53786: gcc -o conftest -O0 -Wall -Werror -g3 conftest.c -lev >&5
+ conftest.c:412: error: "GNULIB_STRERROR" redefined [-Werror]
+ 412 | #define GNULIB_STRERROR 1
+ |
+ conftest.c:305: note: this is the location of the previous definition
+ 305 | #define GNULIB_STRERROR IN_GNUTLS_GNULIB_TESTS
+ |
+ cc1: all warnings being treated as errors
+
+ as well as improves code coverage.
+
+ Suggested by Bruno Haible in:
+ <https://lists.gnu.org/archive/html/bug-gnulib/2020-10/msg00148.html>.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 24 09:48:07 2020 +0200
+
+ gnutls_psk_set_server_credentials_file: document the file format
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 18 17:58:49 2020 +0200
+
+ serv: use only async-signal-safe functions in signal handlers
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 18 09:50:46 2020 +0200
+
+ _gnutls_asn2err: define as static inline
+
+ This pacifies -fanalyzer false-positive:
+ common.c:552:3: warning: use of NULL '<unknown>' where non-null expected [CWE-690] [-Wanalyzer-null-argument]
+
+ Ideally, the function should be defined as 'extern inline' to avoid
+ code bloat by being copied across multiple translation units.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 18 07:19:29 2020 +0200
+
+ doc/examples/ex-ocsp-client.c: check malloc return value
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 18 07:25:42 2020 +0200
+
+ serv: peer_print_info: add overflow check on realloc
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 18 07:17:38 2020 +0200
+
+ serv: replace our own list implementation with Gnulib's gl_list
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 5 17:59:46 2020 +0200
+
+ fips: run CMAC self-tests
+
+ FIPS140-2 IG D.8 mandates self-tests on CMAC.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 5 17:44:30 2020 +0200
+
+ fips: add self-tests for TLS-PRF
+
+ FIPS140-2 IG D.8 mandates self-tests on approved KDF algorithms. As
+ the guidance only requires to run a single instance of each KDF
+ mechanism, this only exercises TLS1.2 PRF with HMAC-SHA-256 as the
+ underlying MAC algorithm.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Oct 6 11:54:21 2020 +0200
+
+ fips: use larger prime for DH self-tests
+
+ According to FIPS140-2 IG 7.5, the minimum key size of FFC through
+ 2030 is defined as 2048 bits. This updates the relevant self-test
+ using ffdhe3072 defined in RFC 7919.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 5 16:59:50 2020 +0200
+
+ fips: add self-tests for PBKDF2
+
+ FIPS140-2 IG D.8 mandates self-tests on approved KDF algorithms. As
+ the guidance only requires running a single instance of each KDF
+ mechanism, this only exercises PBKDF2 with HMAC-SHA-256 as the
+ underlying MAC algorithm.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 5 16:12:46 2020 +0200
+
+ fips: add self-tests for HKDF
+
+ FIPS140-2 IG D.8 mandates self-test on approved KDF algorithms. As
+ the guidance only requires running a single instance of each KDF
+ mechanism, this only exercises HKDF-Extract and HKDF-Expand operations
+ with HMAC-SHA-256 as the underlying MAC.
+
+ Although HKDF is non-approved, it would be sensible to do that as it
+ will be approved in FIPS140-3.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Oct 3 14:50:26 2020 +0200
+
+ tests: add missing ${EXEEXT}
+
+ Pointed by Andreas Metzler.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 2 17:23:27 2020 +0200
+
+ tests: prolong timeout in wait_for_port
+
+ gnutls-serv invocations in cert-tests/dsa can take long time to launch
+ if valgrind tests are enabled.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 28 19:05:52 2020 +0200
+
+ tests: remove unused lock facility using lockfile-create
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Sep 26 11:58:17 2020 +0200
+
+ tests: create lock for tests using GETPORT
+
+ This fixes a race condition in the timings between when a free port is
+ detected and when the port is actually used.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 24 11:48:24 2020 +0200
+
+ tests: simplify program detection
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 24 10:47:30 2020 +0200
+
+ tests: rewrite launch_server using launch_bare_server
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 27 16:11:32 2020 +0200
+
+ x509: correct argument of gnutls_verify_output_function
+
+ This is a leftover of 52e78f1e. We need to call
+ gnutls_verify_output_function with the replaced CA cert instead of the
+ original cert.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Sep 23 09:34:09 2020 +0200
+
+ tests: remove launch_pkcs11_server
+
+ This function is only used by testpkcs11.sh.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Sep 23 09:12:32 2020 +0200
+
+ tests: remove unused first argument from launch_server
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Sep 23 09:09:45 2020 +0200
+
+ tests: use ": ${FOO=BAR}" syntax for default handling in shell scripts
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: JonasZhou <JonasZhou@zhaoxin.com>
+Date: Wed Sep 23 19:22:50 2020 +0800
+
+ x86:Modify variable name
+
+ Modify the variables _gnutls_sha_padlock and _gnutls_sha_padlock_nano.
+ Add a comment for detecting CPU. Modify the indentation. Delete
+ initialization etc.
+
+ Signed-off-by: JonasZhou <JonasZhou@zhaoxin.com>
+
+Author: JonasZhou <JonasZhou@zhaoxin.com>
+Date: Tue Sep 15 16:36:57 2020 +0800
+
+ x86:add detection of instruction set on Zhaoxin CPU
+
+ Add detection of extended instruction set on Zhaoxin cpu,e.g:ssse3,sha,
+ etc. Set the priority of the algorithm according to the benchmark
+ test result on Zhaoxin cpu.
+
+ Signed-off-by: JonasZhou <JonasZhou@zhaoxin.com>
+
+Author: JonasZhou <JonasZhou@zhaoxin.com>
+Date: Wed Sep 16 14:08:21 2020 +0800
+
+ x86: fix avx detection
+
+ In the case of setting environment variables, AVX cannot be detected
+ correctly. Because only MOVBE is added to variable _gnutls_x86_cpuid_s,
+ there is no OSXSAVE. And according to the intel manual, using AVX
+ does not need to detect FMA.
+
+ Signed-off-by: JonasZhou <JonasZhou@zhaoxin.com>
+
+Author: JonasZhou <JonasZhou@zhaoxin.com>
+Date: Wed Sep 23 14:19:39 2020 +0800
+
+ padlock:fix exception in wrap_padlock_hmac_fast
+
+ In function wrap_padlock_hmac_fast, use free to release local variables
+ ctx. Remove a call to wrap_padlock_hmac_deinit() to fix a crash.
+
+ Signed-off-by: JonasZhou <JonasZhou@zhaoxin.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 14 17:59:00 2020 +0200
+
+ testcompat-openssl: specify -sigalgs
+
+ The default selection of signature schemes is also affected by the
+ crypto-policies, and needs to be explicitly enabled with -sigalgs.
+
+ Suggested by Tomas Mraz.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 14 08:31:17 2020 +0200
+
+ inih: remove unused code
+
+ This avoids -fanalyzer false-positive in GCC 10:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1878600
+ as well as the cppcheck warning:
+ "variableScope:lib/inih/ini.c:99,style,The scope of the variable 'start' can be reduced."
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 20 17:49:17 2020 +0200
+
+ priority: add Ed448 to SECURE192 signing algorithms
+
+ Reported Vladimír Čunát in:
+ https://gitlab.com/gnutls/gnutls/-/merge_requests/984#note_349374656
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Sep 19 10:57:04 2020 +0200
+
+ testsuite: Fix $SERV / $GNUTLS_SERV inconsistency
+
+ Some tests did not support overriding the PATH to gnutls-serv by setting
+ the environment variable SERV but used GNUTLS_SERV instead.
+
+ Closes #1090
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Fri Sep 18 13:55:06 2020 +0200
+
+ In testsuite scripts use "$@" instead of $*.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 13 17:19:32 2020 +0200
+
+ build: remove dead assignments
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 8 19:55:14 2020 +0200
+
+ spki: work around GCC 10 -Warray-bounds false-positive
+
+ Suggested by Martin Sebor in:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1876801#c1
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 8 19:51:07 2020 +0200
+
+ tls13/session_ticket: remove _gnutls13_session_ticket_unset
+
+ The function was not really useful because _gnutls_free_datum()
+ has a NULL check as in free(). This also makes GCC 10 happy if
+ -Warray-bounds=2 is specified:
+ https://gcc.gnu.org/bugzilla/show_bug.cgi?id=96984
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 7 09:52:52 2020 +0200
+
+ tests: allow clock_nanosleep in seccomp tests
+
+ The nanosleep wrapper in glibc has changed the implementation using
+ the clock_nanosleep syscall:
+ https://sourceware.org/git/?p=glibc.git;a=commit;h=3537ecb49cf7177274607004c562d6f9ecc99474
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Sep 7 09:52:09 2020 +0200
+
+ .gitlab-ci.yml: bump build environment to Fedora 32
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Sep 16 07:18:51 2020 +0200
+
+ testsuite: Run GOST part of tests/gnutls-cli-debug.sh
+
+ Closes #1097
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Sep 16 07:13:06 2020 +0200
+
+ testsuite: Fix GOST gnutls-cli-debug test
+
+ GOST algorithms are not enabled by default, explicitely request them in
+ priority string.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Mon Sep 14 13:09:00 2020 +0200
+
+ Modifies P_hash() to hash the seed and label separately
+ Thereby not restricting the implementation of prf to MAX_SEED_SIZE
+ MAX_SEED_SIZE is not used anymore
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 17 12:03:20 2020 +0200
+
+ build: ignore pointless -Wformat-nonliteral warning
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 17 11:15:43 2020 +0200
+
+ configure.ac: don't enable warning only available in decent gcc
+
+ -Warith-conversion is new in GCC 10.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Sep 12 20:29:54 2020 +0200
+
+ .gitlab-ci.yml: bump cache version
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 13 20:27:05 2020 +0200
+
+ build: ignore pointless -Wformat-y2k warning
+
+ Printing UTCTime really needs last 2 digits of the year.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Sep 13 17:52:44 2020 +0200
+
+ gnulib: update git submodule
+
+ This brings in the build fixes of parse-datetime module:
+ https://lists.gnu.org/archive/html/bug-gnulib/2020-07/msg00178.html
+ https://lists.gnu.org/archive/html/bug-gnulib/2020-08/msg00001.html
+ https://lists.gnu.org/archive/html/bug-gnulib/2020-09/msg00046.html
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Sun Sep 6 23:42:33 2020 +0300
+
+ Make private exponent optional in gnutls_privkey_import_rsa_raw().
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Sun Sep 6 21:18:57 2020 +0300
+
+ Use symbols defined for RSA key parameter indices in some more places.
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Aug 22 17:19:39 2020 +0200
+
+ handshake: reject no_renegotiation alert if handshake is incomplete
+
+ If the initial handshake is incomplete and the server sends a
+ no_renegotiation alert, the client should treat it as a fatal error
+ even if its level is warning. Otherwise the same handshake
+ state (e.g., DHE parameters) are reused in the next gnutls_handshake
+ call, if it is called in the loop idiom:
+
+ do {
+ ret = gnutls_handshake(session);
+ } while (ret < 0 && gnutls_error_is_fatal(ret) == 0);
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Wed Sep 2 23:49:14 2020 +0300
+
+ Consolidate optional arguments tests for RSA key import, cleanup after each import.
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Wed Sep 2 23:14:14 2020 +0300
+
+ Move RSA key parameter counter fixup closer to exponent update helper.
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Tue Sep 1 23:16:53 2020 +0200
+
+ src/cli: adds new option '--ca-auto-retrieve' that can be used with gnutls-cli to
+ automatically download missing intermediate CAs in a certificate chain
+ lib/cred-cert.c : adds set and get APIs to get user data in the
+ gnutls_x509_trust_list_set_getissuer_function() callback.
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Tue Sep 1 21:00:18 2020 +0300
+
+ Add some tests for optional arguments in gnutls_privkey_import_rsa_raw().
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Tue Sep 1 19:29:20 2020 +0300
+
+ Fix optional parameters counter when importing RSA private keys.
+
+ Currently gnutls_privkey_import_rsa_raw() allows 3 last arguments to be omitted,
+ key fixup logic however checks for 3 missing arguments when updating coefficient 'u'
+ but then asserts when updating exponents 'e1' and 'e2' assuming only 2 parameters
+ are missing at that point.
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Nikolay Sivov <nsivov@codeweavers.com>
+Date: Tue Sep 1 19:15:02 2020 +0300
+
+ Use symbols defined for RSA key parameter indices in more places.
+
+ Signed-off-by: Nikolay Sivov <nsivov@codeweavers.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Aug 30 14:40:13 2020 +0200
+
+ tests: fix sizeof usage in mini-record-timing
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Aug 30 14:35:47 2020 +0200
+
+ padlock: fix partial PHE detection
+
+ The xsha1 instruction takes complete SHA-1 blocks (64 bytes) instead
+ of arbitrary length data when EAX is set to -1.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Albrecht Dreß <albrecht.dress@arcor.de>
+Date: Sat Aug 29 14:33:05 2020 +0200
+
+ improve gnutls-serv EOL processing
+
+ add option `--crlf` to gnutls-serv to disable replacing a received CRLF
+ by LF in echo mode (fixes #1073).
+
+ Signed-off-by: Albrecht Dreß <albrecht.dress@arcor.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 13 18:17:08 2020 +0200
+
+ gnutls_aead_cipher_decrypt: check output buffer size before writing
+
+ While the documentation of gnutls_aead_cipher_decrypt indicates that
+ the inout argument ptext_len initially holds the size that
+ sufficiently fits the expected output size, there was no runtime check
+ on that. This makes the interface robuster against misuses.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Aug 16 11:43:35 2020 +0200
+
+ handshake: check TLS version against modified server priorities
+
+ The server needs to take into account of multiple factors when
+ determining the TLS protocol version actually being used:
+ - the legacy version
+ - "supported_versions" extension
+ - user_hello_func that may modify the server's priorities
+
+ Only after that it can check whether the TLS version is enabled in the
+ server's priorities.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Aug 16 18:23:24 2020 +0200
+
+ gnutls_x509_crt_export2: return 0 instead of the length
+
+ This aligns the behavior to the documentation.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sun Aug 16 14:05:44 2020 +0200
+
+ Fix parser output in tests/cert-tests/data/gost-cert-nogost.pem
+
+ When building without GOST support parsing a GOST certificate must
+ return an "error importing public key" message instead of key
+ details. This change makes tests/cert-tests/pem-decoding pass for
+ builds with --disable-gost.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Aug 14 07:27:40 2020 +0200
+
+ cert-session: check OCSP error responses
+
+ If the OCSP responder returns an error code, such as tryLater, we
+ can't proceed to examine the response bytes. In that case, just skip
+ the check unless the stapling is mandatory on this certificate.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Wed Jul 15 09:34:19 2020 +0200
+
+ mangle gnutls-built ecc_scalar_random
+
+ GNUTLS builds ecc-random.c but ecc_scalar_random() is a public API. So we
+ mangle the internal version we build.
+
+ ecc_mod_random is unaffected as it's an internal API that is mangled by GNUTLS.
+
+ Fixes #1016
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 13 15:56:20 2020 +0200
+
+ minitasn1: move WARN_CFLAGS setting to configure.ac
+
+ Some compilers don't support -Wno-type-limits, while they support
+ -Wtype-limits.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 4 16:42:07 2020 +0200
+
+ _gnutls_fips_mode_enabled: treat selftest failure as FIPS disabled
+
+ Previously gnutls_fips140_mode_enabled() returned true, even after
+ selftests have failed and the library state has switched to error.
+ While later calls to crypto operations fails, it would be more
+ convenient to have a function to detect that state.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 12 08:10:51 2020 +0200
+
+ doc: assorted typo fixes
+
+ Spotted by codespell.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 12 07:29:30 2020 +0200
+
+ serv, cli: ensure that invalid flag is always set
+
+ According to the documentation, the GNUTLS_CERT_INVALID flag must
+ always be set in case of verification failure, together with the flag
+ indicating the actual error cause.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 12 07:27:17 2020 +0200
+
+ cert-session: fail hard if mandatory stapling is not honored
+
+ According to the documentation, the GNUTLS_CERT_INVALID flag must
+ always be set in case of verification failure, together with the flag
+ indicating the actual error cause.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Fri Aug 7 13:55:23 2020 -0500
+
+ Fix invalid free in missing issuer test case error path
+
+ This variable is not initialized in this error path: it's only
+ initialized if gnutls_x509_crt_get_authority_info_access() succeeds.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Fri Aug 7 13:00:22 2020 -0500
+
+ Fix typo in API docs
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Petr Pavlu <petr.pavlu@suse.com>
+Date: Wed Jul 8 10:12:30 2020 +0200
+
+ pubkey: avoid spurious audit messages from _gnutls_pubkey_compatible_with_sig()
+
+ When checking in _gnutls_pubkey_compatible_with_sig() whether a public
+ key is compatible with a signature algorithm, run first
+ pubkey_supports_sig() before performing weaker checks that can accept
+ the given algorithm but with an audit-log warning. This avoids an issue
+ when a weaker check would log an audit message for some signature
+ algorithm that would then be determined as incompatible by the
+ pubkey_supports_sig() check anyway.
+
+ For instance, a GnuTLS server might have a certificate with a SECP384R1
+ public key and a client can report that it supports
+ ECDSA-SECP256R1-SHA256 and ECDSA-SECP384R1-SHA384. In such a case, the
+ GnuTLS server will eventually find that it must use
+ ECDSA-SECP384R1-SHA384 with this public key. However, the code would
+ first run _gnutls_pubkey_compatible_with_sig() to check if SECP384R1 is
+ compatible with ECDSA-SECP256R1-SHA256. The function would report the
+ audit warning "The hash size used in signature (32) is less than the
+ expected (48)" but then reject the signature algorithm in
+ pubkey_supports_sig() as incompatible because it has a different curve.
+ Since the algorithm gets rejected it is not necessary to inform about
+ its hash size difference in the audit log.
+
+ Signed-off-by: Petr Pavlu <petr.pavlu@suse.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jul 18 08:26:48 2020 +0200
+
+ ecdh: perform SP800-56A rev3 full pubkey validation on keygen
+
+ This implements full public key validation required in
+ SP800-56A rev3, section 5.6.2.3.3.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 17 17:47:06 2020 +0200
+
+ dh: perform SP800-56A rev3 full pubkey validation on keygen
+
+ This implements full public key validation required in SP800-56A rev3,
+ section 5.6.2.3.1.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 17 17:45:17 2020 +0200
+
+ dh-primes: make the FIPS approved check return Q value
+
+ This is necessary for full public key validation in
+ SP800-56A (revision 3), section 5.6.2.3.1.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 10 09:42:30 2020 +0200
+
+ ecdh: check validity of P before export
+
+ SP800-56A rev3 section 5.7.1.2 step 2 mandates that the validity of
+ the calculated shared secret is verified before the data is returned
+ to the caller. This patch adds the validation check.
+
+ Suggested by Stephan Mueller.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 10 09:35:49 2020 +0200
+
+ dh: check validity of Z before export
+
+ SP800-56A rev3 section 5.7.1.1 step 2 mandates that the validity of the
+ calculated shared secret is verified before the data is returned to the
+ caller. This patch adds the validation check.
+
+ Suggested by Stephan Mueller.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Alexander Sosedkin <asosedkin@redhat.com>
+Date: Fri Jul 3 14:54:17 2020 +0200
+
+ tests: split up system-override-sig-hash.sh
+
+ Split up system-override-sig-hash.sh
+ so that the errors won't get swallowed or conflated.
+ Also correct unused `srcdir` to `builddir`,
+ which I believe was meant to be set there.
+
+ Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Mon Jun 22 09:09:05 2020 +0200
+
+ fix connectx not available on older macOS SDK
+
+ Fixes this compilation error:
+ system/fastopen.c:134:9: error: 'connectx' is only available on macOS 10.11 or newer [-Werror,-Wunguarded-availability]
+ ret = connectx(fd, &endpoints, SAE_ASSOCID_ANY, CONNECT_RESUME_ON_READ_WRITE | CONNECT_DATA_IDEMPOTENT, NULL, 0, NULL, NULL);
+ ^~~~~~~~
+ /Applications/Xcode9.2.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.13.sdk/usr/include/sys/socket.h:713:5: note: 'connectx' has been marked as being introduced in macOS 10.11 here, but the deployment target is macOS 10.7.0
+
+ The detection is the same as found in curl [1].
+
+ If HAVE_BUILTIN_AVAILABLE is not available we fallback to the code without
+ TCP_FASTOPEN_OSX.
+
+ The OS values match exactly the values found in
+ https://opensource.apple.com/source/xnu/xnu-4570.41.2/bsd/sys/socket.h
+
+ [1] https://github.com/curl/curl/commit/870d849d48a26b8eeb0d4bb1f4655367a4a191ca
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: James Bottomley <James.Bottomley@HansenPartnership.com>
+Date: Sun Jun 28 21:33:09 2020 +0200
+
+ build: use $(LIBPTHREAD) rather than non-existent $(LTLIBPTHREAD)
+
+ On a very recent openSUSE build, libgnutls is getting built without
+ libpthread. This caused a thread related error when trying to load a
+ pkcs11 module that uses threading. The reason is rather convoluted:
+ glibc actually controls all the pthread_ function calls, but it
+ returns success without doing anything unless -lpthread is in the link
+ list. What's happening is that gnutls_system_mutex_init() is being
+ called on _gnutls_pkcs11_mutex before library pthreading is
+ initialized, so the pthread_mutex_init ends up being a nop. Then, when
+ the pkcs11 module is loaded, pthreads get initialized and the call to
+ pthread_mutex_lock is real, but errors out on the uninitialized mutex.
+
+ The problem seems to be that nothing in the gnulib macros gnutls
+ relies on for threading support detection actually sets LTLIBPTHREAD,
+ they only set LIBPTHREAD. The fix is to use LIBPTHREAD in
+ lib/Makefile.in
+
+ Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 21 16:03:54 2020 +0200
+
+ safe_memcmp: remove in favor of gnutls_memcmp
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 26 10:21:26 2020 +0200
+
+ dhe: check if DH params in SKE match the FIPS approved algorithms
+
+ SP800-56A rev. 3 restricts the FIPS compliant clients to use only
+ approved DH parameters, defined in RFC 7919 and RFC 3526. This adds a
+ check in the handling of ServerKeyExchange if DHE is negotiated.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 26 09:43:02 2020 +0200
+
+ dh-primes: add MODP primes from RFC 3526
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Tue Jun 16 21:23:14 2020 +0200
+
+ Update tlsfuzzer to get Python interpreter detection
+
+ Tlsfuzzer also assumed the Python interpreter would be called
+ "python", this update is necessary to get a fixed version (see
+ https://github.com/tomato42/tlsfuzzer/pull/671).
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Tue Jun 16 20:48:44 2020 +0200
+
+ Detect Python interpreter instead of assuming "python"
+
+ This makes the extended test suite work one Debian(-ish) systems
+ without Python 2, where the Python 3 interpreter is called "python3".
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 12 16:50:14 2020 +0200
+
+ .gitlab-ci.yml: bump configure cache version
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 12 11:34:38 2020 +0200
+
+ .gitignore: ignore more files
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 12 11:32:58 2020 +0200
+
+ build: avoid -Wenum-conversion warnings with GCC 10
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jun 14 23:31:27 2020 +0300
+
+ .gitlab-ci: disable config.cache for nettle-master builds
+
+ Disable usage of config.cache for nettle-master builds. Such
+ config.cache files can easily become stale, thus resulting in build
+ failures.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sun Jun 14 12:52:46 2020 +0200
+
+ Wipe session ticket keys before releasing the session structure
+
+ This includes both a copy of the master key and one or two derived
+ keys, all of which could be used to decrypt session tickets if
+ stolen. The derived keys could only be used for tickets issued within
+ a certain time frame (by default several hours).
+
+ The documentation for gnutls_session_ticket_enable_server() already
+ states that the master key should be wiped before releasing it, and
+ the same should apply to internal copies.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 9 10:44:57 2020 +0200
+
+ tests/cert-test/invalid-sig: use datefudge to test expired certs
+
+ Suggested by Andreas Metzler in:
+ https://gitlab.com/gnutls/gnutls/-/issues/1021
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 9 10:41:18 2020 +0200
+
+ tests: check_for_datefudge: don't exit the test programs
+
+ This makes check_for_datefudge not to immediately exit the program,
+ but to return non-zero to allow the tests by themselves to control the
+ behavior when "datefudge" is not found.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Vitezslav Cizek <vcizek@suse.com>
+Date: Tue Jun 9 13:54:04 2020 +0200
+
+ configure: improve nettle, gmp, and hogweed soname detection
+
+ Some linkers might optimize away the libraries passed on the
+ command line if they aren't actually needed, such as gnu ld with
+ --as-needed.
+ The ldd output then won't list the shared libraries and the
+ detection will fail.
+ Make sure nettle and others are really used.
+
+ Signed-off-by: Vitezslav Cizek <vcizek@suse.com>
+
+Author: Lei Maohui <leimaohui@cn.fujitsu.com>
+Date: Mon Jun 8 16:15:07 2020 +0900
+
+ Modied the license to GPLv2.1+ to keep with LICENSE file.
+
+ Signed-off-by: Lei Maohui <leimaohui@cn.fujitsu.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 8 06:45:24 2020 +0200
+
+ configure.ac: prefer the latest version of build infrastructure
+
+ AM_GNU_GETTEXT_REQUIRE_VERSION tells autopoint to copy the latest
+ possible build infrastructure installed on the system, rather than the
+ fixed version from the archive.dir.tar.xz. This makes the
+ bootstrapping slightly faster and allows us not to stick with the
+ ancient gettext version.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Sun Jun 7 17:41:21 2020 +0000
+
+ CI: fix typo in the Vista target
+
+ This resulted in the MinGW64.Vista+ target doing the same thing as the MinGW64
+ target.
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 7 15:46:51 2020 +0200
+
+ RELEASES.md: move the release steps to devel/ [ci skip]
+
+ As the information is only useful to developers, having it under
+ devel/ rather than in the tarball is more releavant.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 7 15:45:13 2020 +0200
+
+ RELEASES.md: mention 3.7.x releases
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 7 15:41:59 2020 +0200
+
+ RELEASES.md: fix typo in scp command line
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 7 15:39:39 2020 +0200
+
+ NEWS: add missing API modifications to 3.6.14 entry
+
+ Reported by Andreas Metzler in:
+ https://lists.gnupg.org/pipermail/gnutls-help/2020-June/004650.html
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jan 9 01:42:22 2020 +0300
+
+ crypto-selftest: add test vectors for MAGMA/KUZNYECHIK-CTR-ACPKM
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jan 9 01:11:50 2020 +0300
+
+ crypto-api: add _gnutls_cipher_set_key wrapper()
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 17 16:38:40 2019 +0300
+
+ cipher/mac: enhance handlers with setkey callback
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jan 9 00:58:50 2020 +0300
+
+ selftests: add test vectors for MAGMA/KUZNYECHIK-OMAC
+
+ Add test vectors for newly added MAC algorithms.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:11:51 2018 +0300
+
+ lib: add Magma/Kuznyechik OMAC support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:11:14 2018 +0300
+
+ lib: add Magma/Kuznyechik ciphers support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:10:30 2018 +0300
+
+ nettle/gost: add ACPKM rekeying code
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:10:03 2018 +0300
+
+ nettle/gost: add CMAC-64/Magma/Kuznyechik code
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:09:36 2018 +0300
+
+ nettle/gost: add Kuznyechik code
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:09:11 2018 +0300
+
+ nettle/gost: add Magma code
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 21 22:08:44 2018 +0300
+
+ nettle/gost: export gost28147_decrypt_simple for magma cipher
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Sat Jun 6 14:05:16 2020 +0200
+
+ Merge the extra libraries to link dynamically in GNUTLS_LIBS_PRIVATE
+
+ This should fix #1020 where bcrypt is missing from thirdparty_libadd.
+
+ Ultimately it would be good to add libraries that always need to be linked in
+ one variable that is shared between the Makefile and the pkg-config file.
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 5 16:26:33 2020 +0200
+
+ crypto-api: always allocate memory when serializing iovec_t
+
+ The AEAD iov interface falls back to serializing the input buffers if
+ the low-level cipher doesn't support scatter/gather encryption.
+ However, there was a bug in the functions used for the serialization,
+ which causes memory leaks under a certain condition (i.e. the number
+ of input buffers is 1).
+
+ This patch makes the logic of the functions simpler, by removing a
+ micro-optimization that tries to minimize the number of calls to
+ malloc/free.
+
+ The original problem was reported by Marius Steffen in:
+ https://bugzilla.samba.org/show_bug.cgi?id=14399
+ and the cause was investigated by Alexander Haase in:
+ https://gitlab.com/gnutls/gnutls/-/merge_requests/1277
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: František Krenželok <krenzelok.frantisek@gmail.com>
+Date: Thu Jun 4 16:59:33 2020 +0200
+
+ tests: updated tlsfuzzer tests to latest version
+ excluded some tests from test-certificate-malformed.py
+
+ Signed-off-by: KrenzelokFrantisek <krenzelok.frantisek@gmail.com>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Wed May 27 12:42:24 2020 +0200
+
+ devel/libgnutls-latest-x86_64.abi, doc, NEWS, and manpage updates
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Fri May 22 15:11:32 2020 +0200
+
+ tests: Adds new tests missingissuer and missingissuer_aia
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Sahana Prasad <sahana@redhat.com>
+Date: Fri May 22 09:42:47 2020 +0200
+
+ Implements a callback function gnutls_x509_trust_list_set_getissuer_function()
+
+ Signed-off-by: Sahana Prasad <sahana@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 1 14:18:03 2020 +0200
+
+ Release 3.6.14 [ci skip]
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 2 21:45:17 2020 +0200
+
+ valgrind: check if session ticket key is used without initialization
+
+ This adds a valgrind client request for
+ session->key.session_ticket_key to make sure that it is not used
+ without initialization.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 2 20:53:11 2020 +0200
+
+ stek: differentiate initial state from valid time window of TOTP
+
+ There was a confusion in the TOTP implementation in stek.c. When the
+ mechanism is initialized at the first time, it records the timestamp
+ but doesn't initialize the key. This removes the timestamp recording
+ at the initialization phase, so the key is properly set later.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 2 05:38:28 2020 +0200
+
+ gnutls_cipher_init: fix potential memleak
+
+ Upon failure this function returns without freeing memory allocated
+ internally. This makes sure that it is released and do not touch the
+ output handle argument.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 2 05:34:29 2020 +0200
+
+ gnutls_aead_cipher_init: fix potential memleak
+
+ When _gnutls_aead_cipher_init() fails, the function returns without
+ freeing the allocted handle. This was once fixed in commit
+ 502be130493e8ce802cdf60fffdbb5f1885352a5 but regressed after a code
+ reorganization in commit 2eef509ce5f2d250f8dcaeffa46444dd2b694e91.
+
+ Reported by Miroslav Lichvar.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 1 17:23:59 2020 +0200
+
+ serv: omit upper bound of --maxearlydata option definition
+
+ It turned out that AutoGen treats numbers that exceed INT_MAX in a
+ platform dependent way. In this case, 4294967295 (UINT_MAX) is
+ treated as is on 64-bit platforms, while it is interpreted as "-1" on
+ 32-bit platforms. This causes a problem when the program
+ documentation is compiled under multilib environment.
+
+ Reported by Ivan Molodetskikh in:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1841844
+ and the cause was identified by Anderson Toshiyuki Sasaki.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun May 31 14:28:48 2020 +0200
+
+ tests: add test case for certificate chain superseding
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun May 31 13:59:53 2020 +0200
+
+ x509: trigger fallback verification path when cert is expired
+
+ gnutls_x509_trust_list_verify_crt2 use the macro SIGNER_OLD_OR_UNKNOWN
+ to trigger the fallback verification path if the signer of the last
+ certificate is not in the trust store. Previously, it doesn't take
+ into account of the condition where the certificate is expired.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun May 31 12:39:14 2020 +0200
+
+ _gnutls_pkcs11_verify_crt_status: check validity against system cert
+
+ To verify a certificate chain, this function replaces known
+ certificates with the ones in the system trust store if possible.
+
+ However, if it is found, the function checks the validity of the
+ original certificate rather than the certificate found in the trust
+ store. That reveals a problem in a scenario that (1) a certificate is
+ signed by multiple issuers and (2) one of the issuers' certificate has
+ expired and included in the input chain.
+
+ This patch makes it a little robuster by actually retrieving the
+ certificate from the trust store and perform check against it.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 16 17:16:08 2020 +0100
+
+ devel: provide external git diff driver for *.abi files [ci skip]
+
+ This adds an external diff driver for *.abi files, that shows only
+ interesting changes in those files. This would be useful when adding
+ a new API.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat May 30 11:06:57 2020 +0200
+
+ build: write "FILE *fp" instead of "FILE *fd"
+
+ This makes it clear that "fd" is not a file descriptor but a FILE
+ pointer. Suggested by Tim Rühsen.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 25 15:33:49 2020 +0200
+
+ gnutls_load_file: document limitation regarding partial failure
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 25 11:21:38 2020 +0200
+
+ cert-cred: clear private key data loaded from file
+
+ This makes use of the RF_SENSITIVE flag newly added to read_file
+ function when reading potentially senstive information from a file.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 25 10:09:28 2020 +0200
+
+ lib: avoid file descriptor leak when application forks
+
+ This makes use of the "e" flag of fopen, provided by the Gnulib's
+ fopen-gnu module.
+
+ Reported by Remi Denis-Courmont in:
+ https://gitlab.com/gnutls/gnutls/-/issues/985
+ and fix suggested by Tim Rühsen.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 25 18:37:51 2020 +0200
+
+ gnulib: update git submodule
+
+ This brings in the new fopen-gnu module and the RF_SENSITIVE flag for
+ fread_file and read_file. This also adds the following changes to be
+ consistent with the latest changes in Gnulib:
+ - the callers of fread_file and read_file to be adjusted for the FLAGS
+ argument
+ - "attribute.h" needs to be used extensively
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 28 00:05:35 2020 +0300
+
+ p12: do not encrypt encrypt certificate bag with empty password
+
+ Do not encrypt certificate bag if the user has specified empty password
+ (--password ''). Encryption can be turned on by specifying
+ --empty-password.
+
+ Fixes #888
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Wed Apr 29 10:32:08 2020 +0200
+
+ win32: use bcrypt instead of CryptoAPI on Vista+ for random numbers
+
+ CryptoAPI is a deprecated API [1] that is forbidden in UWP builds.
+
+ Rewrite the CryptoAPI calls in bcrypt.
+
+ bcrypt is used instead of CryptoAPI when targeting Windows Vista and above.
+
+ https://docs.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-cryptdecrypt
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed May 27 23:42:01 2020 +0300
+
+ certtool: do not ask for private key password if it was provided
+
+ Make pin_callback() use cinfo->password if it is set (via command line
+ or from template).
+
+ Fixes #933
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 28 03:15:55 2020 +0300
+
+ .travis.yml: use several different OSX versions
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Wed May 27 21:14:50 2020 +0000
+
+ win32: move the NCRYPT key import into a function
+
+ No functional change. The has been simply moved.
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Wed May 27 21:13:43 2020 +0000
+
+ configure.ac: determine if the Vista APIs can be linked statically
+
+ If _WIN32_WINNT is higher or equal to 0x0600, Vista API's are allowed during
+ the build. We can assume that the minimum platform the code will run on is
+ Vista [1]
+
+ In that case there's no need to call API's (ncrypt) dynamically when it can be
+ done statically.
+
+ [1] https://docs.microsoft.com/en-us/cpp/porting/modifying-winver-and-win32-winnt
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed May 27 00:34:02 2020 +0300
+
+ lib: add support for AES-192-GCM
+
+ Add support for AES-192 in GCM mode.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 26 16:19:59 2020 +0300
+
+ configure: check that -no_weak_links works with FD_SET
+
+ Several Xcode/SDK versions provide FD_SET implementation that does not
+ work with -no_weak_links. Check that this option does not break FD_SET
+ usage.
+
+ Fixes #966
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 26 13:12:24 2020 +0300
+
+ tests: build datefudge-check during make all
+
+ Most of the tests depend on datefudge-check. Let's make it during 'make
+ all' stage to allow running individual tests w/o requiring to build it
+ separately.
+
+ Fixes #920
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 26 13:06:03 2020 +0300
+
+ configure.ac: add -fno-builtin-strcmp if valgrind is enabled
+
+ Recent GCC provides strcmp which makes Valgrind assume that it accesses
+ uninitialized data. Disable this optimization if Valgrind tests are
+ enabled.
+
+ Fixes #944
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: rrivers2 <5981058-rrivers2@users.noreply.gitlab.com>
+Date: Sun May 24 23:11:01 2020 +0000
+
+ Update session_ticket.c to add support for zero length session tickets returned from the server
+
+ check that ticket_len > 0 prior to calling gnutls_realloc_fast
+
+ Signed-off-by: Rod Rivers <5981058-rrivers2@users.noreply.gitlab.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 05:54:58 2020 +0300
+
+ build: vendor in libtasn1 code
+
+ Instead of keeping the minitasn1 source in Git, vendor in it during
+ bootstrap as we do with Nettle code. This also upgrades included
+ minitasn1 to latest version (4.16.0).
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Tue May 19 16:23:40 2020 +0200
+
+ win32: link with crypt32
+
+ Since 5d03564cccd2c10c41252ea468d4a098bd08e9c1 we use CertOpenStore().
+ To properly link it needs to be linked with the crypt32.dll.
+ https://docs.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-certopenstore
+
+ This library was missing from the pkg-config library. It exists in
+ thirdparty_libadd to link gnutls as a DLL.
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 19 16:18:39 2020 +0200
+
+ fips: remove FIPS_STARTUP_ONLY_TEST_CASE macro
+
+ The macro was intended to avoid non-recoverable errors during library
+ initialization, but the code path has been removed in commit
+ 3963518d067a64412bbe0aa9ce5fc33ae729c15f.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon May 18 12:25:42 2020 +0200
+
+ fips: make FIPS140-2 mode enablement logic simpler
+
+ Previously, to enable the FIPS140-2 mode, both /etc/system-fips and
+ the fips=1 kernel command line need to be set. While this was
+ designed to be consistent, the convention is not well followed by the
+ other crypto libraries and the former tends to be ignored. This
+ aligns the behavior to the latter, i.e. if fips=1 is set, the library
+ enables the FIPS140-2 mode regardless of the existence of
+ /etc/system-fips.
+
+ Suggested by Alexander Sosedkin.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon May 18 00:13:34 2020 +0300
+
+ x509: support commonName extension
+
+ Add support for Common Name certificate extension.
+
+ Fixes #989
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daniel Lenski <dlenski@gmail.com>
+Date: Sun May 17 14:50:47 2020 -0700
+
+ refine tests for ancient servers which support both SSL 3.0 and TLS 1.0, but both only with %NO_EXTENSIONS
+
+ This is a follow-up to !1221.
+
+ See #958 and https://gitlab.com/openconnect/openconnect/-/issues/145 for a
+ real-world example of ancient Cisco servers with these deficiencies.
+
+ With !1221 only, gnutls-cli-debug reports that these ancient servers only support
+ SSL 3.0 (but without extensions). Information after this point is
+ largely erroneous:
+
+ $ gnutls-cli-debug ***vpn.***.com
+ GnuTLS debug client 3.6.12
+ Checking ***vpn.***.com:443
+ whether the server accepts default record size (512 bytes)... no
+ whether %ALLOW_SMALL_RECORDS is required... no
+ for SSL 3.0 (RFC6101) support... yes
+ for SSL 3.0 with extensions... no
+
+ With this additional change, gnutls-cli-debug correctly reports that such a
+ server also supports TLS 1.0 (but again with extensions disabled). Below
+ I've marked some of the significant fields that have changed:
+
+ $ gnutls-cli-debug ***vpn.***.com
+ GnuTLS debug client 3.6.12
+ Checking ***vpn.***.com:443
+ whether the server accepts default record size (512 bytes)... no
+ whether %ALLOW_SMALL_RECORDS is required... no
+ for SSL 3.0 (RFC6101) support... yes
+ for SSL 3.0 with extensions... no
+ whether we need to disable TLS 1.2... yes
+ whether we need to disable TLS 1.1... yes
+ # This is now correct:
+ whether we need to disable TLS 1.0... no
+ # This is now correct:
+ whether %NO_EXTENSIONS is required... yes
+ # This is now correct:
+ for TLS 1.0 (RFC2246) support... yes
+ for TLS 1.1 (RFC4346) support... no
+ fallback from TLS 1.1 to... failed
+ for TLS 1.2 (RFC5246) support... no
+ # This is now correct:
+ for known TLS or SSL protocols support... yes
+ TLS1.2 neg fallback from TLS 1.6 to... failed (server requires fallback dance)
+ for inappropriate fallback (RFC7507) support... no
+ for HTTPS server name... ******
+ for certificate chain order... sorted
+ for Safe renegotiation support (SCSV)... no
+ for version rollback bug in RSA PMS... no
+ for version rollback bug in Client Hello... no
+ whether the server ignores the RSA PMS version... no
+ whether small records (512 bytes) are tolerated on handshake... yes
+ whether cipher suites not in SSL 3.0 spec are accepted... yes
+ whether a bogus TLS record version in the client hello is accepted... yes
+ whether the server understands TLS closure alerts... partially
+ whether the server supports session resumption... yes
+ for anonymous authentication support... no
+ for ephemeral Diffie-Hellman support... no
+ for RFC7919 Diffie-Hellman support... no
+ for AES-GCM cipher (RFC5288) support... no
+ for AES-CCM cipher (RFC6655) support... no
+ for AES-CCM-8 cipher (RFC6655) support... no
+ for AES-CBC cipher (RFC3268) support... no
+ for CAMELLIA-GCM cipher (RFC6367) support... no
+ for CAMELLIA-CBC cipher (RFC5932) support... no
+ # This is now correct:
+ for 3DES-CBC cipher (RFC2246) support... yes
+ # This is now correct:
+ for ARCFOUR 128 cipher (RFC2246) support... yes
+ for CHACHA20-POLY1305 cipher (RFC7905) support... no
+ for GOST28147-CNT cipher (draft-smyshlyaev-tls12-gost-suites) support... no
+ for MD5 MAC support... yes
+ for SHA1 MAC support... yes
+ for SHA256 MAC support... no
+ for GOST28147-IMIT MAC (draft-smyshlyaev-tls12-gost-suites) support... no
+
+ Signed-off-by: Daniel Lenski <dlenski@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun May 17 22:01:22 2020 +0300
+
+ x509: aki: always print authorityCert info
+
+ Always print authorityCertIssuer/SerialNumber. Currently it is output
+ only if keyIdentifier is not present.
+
+ Fixes #991
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon May 11 23:50:40 2020 +0300
+
+ output: add Russian security class policies
+
+ Add Russian Security Class certificate policies (per
+ draft-deremin-rfc4491-bis).
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon May 11 23:11:56 2020 +0300
+
+ x509: print certificate policiy names
+
+ Add ability to print names for several pre-defined Certificate policies.
+ Currently the list is populated with anyPolicy from X.509 and CA/B
+ policies.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 02:22:05 2020 +0300
+
+ certtool: use gnutls_pkcs7_print_signature_info
+
+ Use new function to remove code duplication.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 02:20:57 2020 +0300
+
+ pkcs7: add function to display signature information
+
+ Basically export print_pkcs7_info() in a way usable by external
+ applications.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 02:22:20 2020 +0300
+
+ pkcs7: decode attribute OIDs when printing
+
+ Try printing symbolic names for well-known OIDs when printing PKCS7
+ signature info.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 05:28:20 2020 +0300
+
+ devel: add libtasn1 submodule
+
+ GnuTLS maintains a part of libtasn1 sources in form of minitasn1 import.
+ Add libtasn1 submodule to ease synchronization with libtasn1.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 14 02:15:23 2020 +0300
+
+ x509: generify oid to str conversions
+
+ Make oid to name conversion functions generic enough by allowing caller
+ to specify a pointer to OID table.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Mon May 4 18:23:45 2020 +0200
+
+ accelerated: use AES-NI for AES-XTS when available
+
+ This introduces a wrapper for the CRYPTOGAMS AES-XTS implementation
+ already present in the generated assembly code.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Fri Mar 20 16:37:33 2020 +0100
+
+ gnutls-cli: Add option to wait for resumption data
+
+ This introduces the --waitresumption command line option which makes the
+ client to wait for the resumption data until a ticket is received under
+ TLS1.3. The client will block if no ticket is received. The new option
+ has no effect if the option --resume is not provided.
+
+ This is useful to force the client to wait for the resumption data when
+ the server takes long to send the ticket, allowing the session
+ resumption to be tested. This is a common scenario in CI systems where
+ the testing machines have limited resources.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Tue May 5 19:27:59 2020 +0200
+
+ benchmark: enable AES-XTS cipher
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Aug 16 17:01:05 2019 +0200
+
+ nettle: disable RSA blinding in FIPS selftests
+
+ Nettle's RSA signing, encryption and decryption functions still
+ require randomness for blinding, so fallback to use a fixed buffer in
+ selftests where entropy might not be available.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 26 19:27:11 2020 +0200
+
+ nettle: expose SIV-CMAC through the AEAD interface
+
+ This adds a couple of new cipher algorithms GNUTLS_CIPHER_AES_128_SIV
+ and GNUTLS_CIPHER_AES_256_SIV, exposing nettle_siv_cmac_aes{128,256}*
+ functions. Note that they can only used with the AEAD interface and
+ authentication tags are prepended (not appended) to the ciphertext.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 26 19:27:05 2020 +0200
+
+ nettle: vendor in SIV-CMAC implementation
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 26 19:26:57 2020 +0200
+
+ nettle: avoid manual backports of CFB8, CMAC, and XTS
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 26 19:26:48 2020 +0200
+
+ nettle: rename import-chacha-from-nettle.sh to import-from-nettle.sh
+
+ This script will handle other backports except ECC as well.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 26 19:26:36 2020 +0200
+
+ configure.ac: fix broken nettle_cfb8_decrypt detection
+
+ Given the fixed version of the function will be part of Nettle 3.6,
+ use pkg-config --atleast-version instead of a manually comparison of
+ the Nettle version.
+
+ Fixes #974.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Apr 29 12:41:52 2020 +0200
+
+ New make target 'update-copyright-year'
+
+ We don't want to automatically update the copyright year as this
+ prevents reproducible builds.
+
+ Instead, 'make update-copyright-year' has to be executed at the
+ start of each new year and the changes have to be pushed.
+
+ Closes #980
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Apr 29 20:43:23 2020 +0300
+
+ tests/prime-check: don't include gmp.h
+
+ Do not include gmp.h header, <nettle/bignum.h> conflicts with it in
+ mini-gmp configuration and includes this header on it's own in
+ non-mini-gmp config.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 28 17:45:40 2020 +0300
+
+ tests/srp: increase timeouts
+
+ SRP test times out if running on the GitLab CI with mini-gmp version of
+ Nettle. Increase timeouts to let the test pass.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 28 15:48:29 2020 +0300
+
+ CI: add nettle-mini-gmp test
+
+ Wget/Wget2 OSS-Fuzz builders use mini-gmp version of nettle. Check that
+ we do not break them occasionally.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 30 07:05:19 2020 +0200
+
+ doc: expand GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE description on RSA-PSS [ci skip]
+
+ For RSA-PSS, this flag alone doens't fully enable reproducible
+ signatures and the user needs to indicate the fact that a zero-length
+ salt is used through SPKI upon verification.
+
+ Signed-off-by: Daiki Ueno <ueno@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 28 03:06:26 2020 +0300
+
+ gost: use gostdsa-vko from nettle 3.6rc3
+
+ Now as we have upgraded Nettle to 3.6rc3 (which includes gostdsa_vko),
+ use this function from imported nettle sources.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 28 13:59:15 2020 +0300
+
+ nettle: update imported source to nettle 3.6rc3
+
+ Update imported nettle version to 3.6rc3. This will bring in updated
+ gmp-glue code and a possiblity to use gostdsa-vko imported from nettle
+ sources.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 6 14:37:53 2020 +0200
+
+ fips: check library soname during configure
+
+ Previously, we hard-coded the sonames of linked libraries for FIPS
+ integrity checking. That required downstream packagers to manually
+ adjust the relevant code in lib/fips.c, when a new interface version
+ of the dependent libraries (nettle, gmp) becomes available and linked
+ to libgnutls.
+
+ This patch automates that process with the configure script.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 27 09:53:38 2020 +0100
+
+ gnutls_session_ext_register: keep track of extension name
+
+ Previously it discarded the name argument, and that was making the
+ debug output awkward, e.g., running tests/tls-session-ext-register -v:
+
+ client|<4>| EXT[0x9cdc20]: Preparing extension ((null)/242) for 'client hello'
+ client|<4>| EXT[0x9cdc20]: Preparing extension ((null)/241) for 'client hello'
+ client|<4>| EXT[0x9cdc20]: Sending extension (null)/241 (2 bytes)
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Feb 16 00:28:43 2020 +0300
+
+ gost: update gostdsa_vko to follow Nettle
+
+ Update gostdsa_vko() following changes going to be accepted into Nettle.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Apr 21 16:29:41 2020 +0200
+
+ gnutls_ext_get_name2: new function
+
+ This adds a generalized version of gnutls_ext_get_name, which can
+ retrieve the name of the extension, even if it is registered per
+ session.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Apr 16 18:49:22 2020 +0300
+
+ build: attempt to fix build issues on FreeBSD
+
+ BSD sed does not like \n and \0 in string substitution. Workaround this
+ by using sed magic.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Apr 15 18:49:26 2020 +0300
+
+ gitlab CI: when calling cppcheck ignore lib/nettle/ecc rather than lib/nettle/curve448
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 14 14:17:07 2020 +0300
+
+ gitlab-ci: add test for usage of nettle/hogweed internal symbols
+
+ Check that GnuTLS does not depend on Nettle/Hogweed internal symbols.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Apr 14 13:47:43 2020 +0300
+
+ nettle: vendor in poly1305 code
+
+ Nettle's poly1305 code ended up with internal symbol _poly1305_block in
+ public header. This causes issues on Nettle version changes. Since those
+ symbols are going to become nettle-internal, vendor in relevant source
+ file.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 17:54:28 2020 +0300
+
+ gost: import _nettle_write_le32 to stop using Nettle's internal symbol
+
+ Remove another dependency on nettle internal symbol by vendoring in
+ _nettle_write_le32 code
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 17:06:06 2020 +0300
+
+ nettle: use new imported source files for GOST DSA
+
+ Provide GOST support using source files copied by script rather than
+ manually crafted by me.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 16:11:02 2020 +0300
+
+ build: import-curve448 -> import-ecc
+
+ As the script now imports not just Curve448, but also gost code, rename
+ the script, target directory and symbols to follow that.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Apr 11 15:28:29 2020 +0200
+
+ xts: check key blocks according to FIPS-140-2 IG A.9
+
+ The implementation guidance suggests that a check of key1 != key2
+ should be done at any place before the keys are used:
+ https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 16:08:29 2020 +0300
+
+ devel: modify curve448 script to import gost sources
+
+ Curve448 script already imports several ecc sources into GnuTLS tree.
+ Modify it to also vendor in GOST-related ecc files.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 12:43:42 2020 +0300
+
+ import-chacha: fix several additional symbol clashes
+
+ Fix sed script used to rename symbols to remove few additional symbols
+ sitting in _nettle_FOO namespace.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 12:59:12 2020 +0300
+
+ curve448: import write-le64.c which defines internal symbol
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Apr 13 12:43:42 2020 +0300
+
+ import-curve448: fix several additional symbol clashes
+
+ Fix sed script used to rename symbols to remove few additional symbols
+ sitting in _nettle_FOO namespace.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 30 11:27:40 2020 +0200
+
+ handshake-tls13: add session flag to disable sending session tickets
+
+ While GnuTLS by default implicitly sends NewSessionTicket during
+ handshake, application protocols like QUIC set a clear boundary
+ between "in handshake" and "post handshake", and NST must be sent in
+ the post handshake state.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Bernhard M. Wiedemann <bwiedemann@suse.de>
+Date: Sun Apr 5 15:09:57 2020 +0200
+
+ tests: Fix status-request-revoked after 2020-10-24
+
+ included certs expire 2020-10-24 so this test fails after that date.
+
+ Fixes #967
+
+ This patch was done while working on reproducible builds for openSUSE.
+
+ Signed-off-by: Bernhard M. Wiedemann <bwiedemann@suse.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Mar 31 06:58:48 2020 +0200
+
+ build: use valgrind client request to detect undefined memory use
+
+ This tightens the check introduced in
+ ac2f71b892d13a7ab4cc39086eef179042c7e23c, by using the valgrind client
+ request to explicitly mark the "uninitialized but initialization is
+ needed before use" regions. With this patch and the
+ fix (c01011c2d8533dbbbe754e49e256c109cb848d0d) reverted, you will see
+ the following error when running dtls_hello_random_value under
+ valgrind:
+
+ $ valgrind ./dtls_hello_random_value
+ testing: default
+ ==520145== Conditional jump or move depends on uninitialised value(s)
+ ==520145== at 0x4025F5: hello_callback (dtls_hello_random_value.c:90)
+ ==520145== by 0x488BF97: _gnutls_call_hook_func (handshake.c:1215)
+ ==520145== by 0x488C1AA: _gnutls_send_handshake2 (handshake.c:1332)
+ ==520145== by 0x488FC7E: send_client_hello (handshake.c:2290)
+ ==520145== by 0x48902A1: handshake_client (handshake.c:2908)
+ ==520145== by 0x48902A1: gnutls_handshake (handshake.c:2740)
+ ==520145== by 0x402CB3: client (dtls_hello_random_value.c:153)
+ ==520145== by 0x402CB3: start (dtls_hello_random_value.c:317)
+ ==520145== by 0x402EFE: doit (dtls_hello_random_value.c:331)
+ ==520145== by 0x4023D4: main (utils.c:254)
+ ==520145==
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Pierre Ossman <ossman@cendio.se>
+Date: Tue Mar 24 15:32:13 2020 +0100
+
+ Compare DNs by comparing their string representations
+
+ A binary comparison will not work in case the contents is the same but
+ the ASN.1 type differ (e.g. PrintableString vs UTF8String). Such
+ variations are permitted so we need to handle them.
+
+ Signed-off-by: Pierre Ossman <ossman@cendio.se>
+
+Author: Pierre Ossman <ossman@cendio.se>
+Date: Tue Mar 24 15:29:34 2020 +0100
+
+ Properly compare DNs when checking sorting
+
+ We might want to do other things than a simple memcmp() so make sure
+ we're using the right helper when comparing DNs.
+
+ Signed-off-by: Pierre Ossman <ossman@cendio.se>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 16:58:07 2020 +0200
+
+ IDNA: require libidn2 2.0.0
+
+ We require private symbols which dissapear at some point in
+ IDN2 releases in order to support old versions of libidn2. Simplify
+ the code by requiring only recent versions and avoid issues such
+ as #832.
+
+ Resolves: #832
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 07:40:21 2020 +0200
+
+ NEWS: updated for release
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 20:52:36 2020 +0200
+
+ NEWS: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 20:52:27 2020 +0200
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 21:30:37 2020 +0200
+
+ NEWS: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 21:30:37 2020 +0200
+
+ tests: added check for random value of client and server hello in TLS
+
+ This creates a tests that checks whether the TLS client and server
+ hello have sufficient non-zero bytes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 19:05:30 2020 +0200
+
+ tests: added reproducer for client hello random value behavior in DTLS
+
+ This adds an equivalent test of tls13/hello_random_value.c for DTLS
+ and extends the tests for server hello as well.
+
+ Relates: #960
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 08:23:03 2020 +0200
+
+ psk: added checks to satisfy static analyzers
+
+ Added null checks in legacy callbacks to avoid warnings from
+ static analyzers. The issues do not appear to be reproducible
+ in real-world use.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Mar 28 02:31:10 2020 +0300
+
+ padlock: fix exception in wrap_padlock_hash_fast
+
+ wrap_padlock_hash_fast() allocates a context on a stack (via local
+ variable) then tries to free it by calling wrap_padlock_hash_deinit()
+ causing a crash. Remove a call to deinit() to fix a crash.
+
+ Fixes #930
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Mar 28 02:29:31 2020 +0300
+
+ padlock: fix exception in sha code
+
+ padlock sha code will segfault (at least on Nano) if it is passed a NULL
+ data pointer (even if size is 0). Pass digest output buffer as a dummy
+ data pointer in such case.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Mar 28 02:27:31 2020 +0300
+
+ padlock: make cbc code return error properly
+
+ If underlying padlock_cbc_en/decrypt return an error, pass this error to
+ calling code.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Stefan Bühler <stbuehler@web.de>
+Date: Fri Mar 27 17:17:57 2020 +0100
+
+ dtls client hello: fix zeroed random (fixes #960)
+
+ This broke with bcf4de03 "handshake: treat reply to HRR as a reply to
+ hello verify request", which failed to "De Morgan" properly.
+
+ Signed-off-by: Stefan Bühler <stbuehler@web.de>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Tue Mar 24 09:55:08 2020 +0100
+
+ gnutls-serv: Do not exit when a message to be echoed is received
+
+ Previously, when gnutls-serv was executed with the --echo option, it
+ would exit when a message to be echoed was received. Moreover, the
+ server would output "Memory error" although no error occurred.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 11:23:47 2020 +0100
+
+ _gnutls_check_id_for_change: ensure that we check the username length
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 10:01:53 2020 +0000
+
+ Ensure that an incorrectly formatted password file doesn't cause invalid memory access
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Sun Mar 15 23:31:49 2020 +0100
+
+ Update NEWS file
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Tue Mar 3 11:49:32 2020 +0000
+
+ Update files
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Mon Mar 2 16:37:10 2020 +0100
+
+ psk: Allow non-NULL PSK usernames
+
+ This commit closes #586.
+
+ Two new functions are introduced: gnutls_psk_server_get_username2()
+ and gnutls_psk_set_client_username2(), which are identical in behavior
+ to those named similarly (without the final '2'), but allow arbitrary
+ gnutls datums (not strings) to be used as usernames.
+
+ Two new callback functions are also introduced, with their respective
+ setters: gnutls_psk_set_server_credentials_function2() and
+ gnutls_psk_set_client_credentials_function2().
+
+ In addition, the password file format is extended so that non-string
+ usernames can be specified. A leading '#' character tells GnuTLS that the
+ username should be interpreted as a raw byte string (encoded in HEX).
+
+ Example:
+
+ #deadbeef:9e32cf7786321a828ef7668f09fb35db
+
+ Signed-off-by: Ander Juaristi's avatarAnder Juaristi <a@juaristi.eus>
+
+Author: Daniel Lenski <dlenski@gmail.com>
+Date: Sun Mar 22 19:12:44 2020 -0700
+
+ add NEWS entry
+
+ Signed-off-by: Daniel Lenski <dlenski@gmail.com>
+
+Author: Daniel Lenski <dlenski@gmail.com>
+Date: Sun Mar 22 19:01:55 2020 -0700
+
+ add additional tests of SSL 3.0 (with extensions, and with cipher suites not in SSL 3.0)
+
+ See #958
+
+ Signed-off-by: Daniel Lenski <dlenski@gmail.com>
+
+Author: Daniel Lenski <dlenski@gmail.com>
+Date: Sun Mar 22 19:00:32 2020 -0700
+
+ test_ssl3: minimize cipher suites to those actually included in SSL 3.0
+
+ See #958
+
+ Signed-off-by: Daniel Lenski <dlenski@gmail.com>
+
+Author: Daniel Lenski <dlenski@gmail.com>
+Date: Sun Mar 22 18:58:26 2020 -0700
+
+ SSL 3.0 (RFC6101) doesn't actually appear to require extensions, and some servers don't accept them
+
+ See #958
+
+ Signed-off-by: Daniel Lenski <dlenski@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Mar 22 10:44:51 2020 +0100
+
+ gnutls_session_get_keylog_function: new function
+
+ This adds a way to retrieve the keylog function set by
+ gnutls_session_set_keylog_function() to allow application protocols to
+ implement custom logging facility.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Mar 22 16:07:12 2020 +0300
+
+ oss-fuzz: return build error if fuzzers have failed to build
+
+ Instead of silently ignoring build errors and running fewer fuzzers,
+ exit on the first build error.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Mar 22 16:05:40 2020 +0300
+
+ oss-fuzz: use CC rather than CXX to compile fuzzers
+
+ clang++ will choke on several fuzzer sources because C++ is stricter
+ than C wrt. type conversion:
+
+ gnutls_base64_decoder_fuzzer.c:26:63: error: non-constant-expression
+ cannot be narrowed from type 'size_t' (aka 'unsigned long') to 'unsigned
+ int' in initializer list [-Wc++11-narrowing]
+ gnutls_datum_t raw = {.data = (unsigned char *)data, .size = size};
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Mar 19 17:49:11 2020 +0100
+
+ fuzz: Update README.md for clang-9 [skip ci]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Mar 15 11:18:30 2020 +0100
+
+ state: add function to get the current hash algorithm
+
+ This is particularly useful when the application applies key
+ derivation function by itself with the same underlying hash algorithm
+ as the session.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 14 09:53:31 2020 +0100
+
+ abi: add enum values for GNUTLS_CIPHER_CHACHA20_*
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 14 06:09:56 2020 +0100
+
+ cipher: allow setting ChaCha20 initial block counter
+
+ This also introduces GNUTLS_CIPHER_CHACHA20_32, which is a 96-bit
+ nonce variant of GNUTLS_CIPHER_CHACHA20_64.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 13 17:24:26 2020 +0100
+
+ nettle: vendor in ChaCha20 implementation from nettle
+
+ This enables to use bundled ChaCha20 implementation if the system
+ nettle doesn't have nettle_chacha_set_counter.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Mar 14 06:01:49 2020 +0100
+
+ cipher: expose raw ChaCha20 cipher
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Wed Mar 18 16:17:39 2020 +0100
+
+ global: Load configuration after FIPS POST
+
+ Previously, if the loaded configuration file disabled an algorithm
+ tested during FIPS-140 power-on self-tests, the test would fail. By
+ loading the configuration file after the test is finished, such failure
+ is avoided as any algorithm is allowed during the tests.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Wed Mar 11 18:31:49 2020 +0100
+
+ Validate EC_PARAMS for EdDSA keys
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Fri Mar 6 13:41:25 2020 +0100
+
+ pubkey: Validate input parameters in pubkey_import_ecc_raw
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Fri Feb 28 18:50:53 2020 +0100
+
+ tests: Verify writing and reading of ECDSA public keys from PKCS#11
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Fri Feb 28 18:45:14 2020 +0100
+
+ tests: Verify writing and reading of EdDSA public keys
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Fri Feb 28 18:40:42 2020 +0100
+
+ pkcs11_write: Copy data to avoid double-free crashes and properly encode EC_POINT attribute
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 14 23:15:45 2020 +0100
+
+ .lgtm.yml: work around issues in LGTM system
+
+ This disables dependency tracking and removes the gnulib
+ tests to work-around a failure build gl/.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 12 20:46:58 2020 +0100
+
+ bootstrap.conf: do not bring tests in gnulib clones (src/unistring)
+
+ These tests are not being run, and they can cause issues as
+ in !1208.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 14 22:39:05 2020 +0100
+
+ .lgtm.yml: no longer bring nettle from master
+
+ The system used has already a sufficiently recent version.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Thu Apr 4 15:45:02 2019 +0200
+
+ crypto-selftests-pk.c: Use deterministic signatures in test_known_sig()
+
+ Use deterministic signatures for ECDSA and DSA in test_known_sig(). Do
+ not call test_known_sig() for non-deterministic algorithms. Do not run
+ PK_TEST() for algorithms tested with PK_KNOWN_TEST().
+
+ The deterministic algorithms are used if in FIPS-140 POST or if FIPS-140
+ mode is disabled. When called explicitly with FIPS-140 mode enabled,
+ the pairwise-consistency test (PK_TEST()) is used instead.
+
+ test_known_sig() was modified to support only deterministic algorithms.
+ The "deterministic" parameter was replaced with the "flags" parameter
+ through which the flags to be used in gnutls_privkey_sign_data() are
+ passed.
+
+ The hard-coded values for the ECDSA and DSA signatures were replaced
+ with the values corresponding to the deterministic signatures to be used
+ in known answer tests. The unused values for GOST signatures were
+ removed.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Thu Mar 5 15:54:06 2020 +0100
+
+ crypto-selftests-pk.c: Use specified key in test_sig()
+
+ Previously, test_sig() would use the same key regardless the value
+ provided in bits parameter. The changes introduced make test_sig() to
+ choose the key according to the value provided in bits.
+
+ For RSA, only 2048 bits key is available for testing. The calls were
+ adjusted accordingly.
+
+ Introduced 2048 bits DSA key in test_sig(). Removed unused 512 bits
+ key, leaving only the 2048 bits key available.
+
+ For GOST, use the same keys for test_sig() and test_known_sig(). Remove
+ the unused keys.
+
+ Reorder constant values and change variables names for better
+ readability.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 16 11:09:29 2020 +0100
+
+ tests/sign-is-secure: fix off-by-one error
+
+ Reported by Peter Dettman in:
+ https://gitlab.com/gnutls/gnutls/-/issues/128#note_304892538
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 16 11:03:41 2020 +0100
+
+ algorithms: properly calculate hash strength for Ed448
+
+ The Ed448 signature scheme internally uses XOF (SHAKE256) as the hash
+ function with 114-octet output. According to FIPS-202, the strength
+ against collisions is calculated as:
+
+ min(114*8/2, 256) = 256
+
+ Reported by Peter Dettman in:
+ https://gitlab.com/gnutls/gnutls/-/issues/128#note_304892538
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Mar 12 12:56:37 2020 +0300
+
+ lib/x509: use common routine for parsing data version
+
+ OSS Fuzzer noted an issue in parsing (incorrect) CRL files with
+ zero-length version field. Certificate parser does not have this issue,
+ while CRL and OCSP Request and Response parsers shows this problem. To
+ remove code duplication extract common function and use it from all four
+ parsers.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Thu Apr 4 17:22:04 2019 +0200
+
+ crypto-selftests-pk.c: Fix PK_KNOWN_TEST and PK_TEST
+
+ Previously, when multiple tests where declared in sequence using one of
+ the macros, only the first test would be executed. This happened
+ because a check for the GNUTLS_SELF_TEST_FLAG_ALL was embedded in the
+ macro. To allow more than one test to be executed in sequence, the
+ check for the flag was removed from both macros.
+
+ To keep the previous behaviour (execute only the first test) the check
+ for the flag was moved to be after the first test, except for RSA since
+ the RSA encryption test must be executed in FIPS mode.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Wed Apr 3 13:40:04 2019 +0200
+
+ crypto-selftests-pk.c: Move hardcoded values to the top
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Mar 10 22:42:02 2020 +0300
+
+ x509: apply same fix to print_crq
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Mar 10 22:41:54 2020 +0300
+
+ x509: apply same fix to print_crl
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Mar 10 12:12:36 2020 +0300
+
+ x509: drop endless loop in print_extensions
+
+ If crq is malformed in extensions part, print_extensions() might loop
+ endlessly because gnutls_x509_crq_get_extension_info would return
+ unhandled GNUTLS_ASN1_DER_ERROR looping over extension index, rather
+ than bailing out. Fix this by handling this error code properly. Found
+ thanks to oss-fuzz.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Feb 29 17:01:10 2020 +0100
+
+ lib: use static assertion to check enum values
+
+ We previously had checks of enum values with '#if', such as below:
+
+ #define GNUTLS_EXTENSION_MAX_VALUE 31
+
+ typedef enum extensions_t {
+ ...
+ GNUTLS_EXTENSION_MAX /* not real extension - used for iterators */
+ } extensions_t;
+
+ /* we must provide at least 16 extensions for users to register */
+ #if GNUTLS_EXTENSION_MAX_VALUE - GNUTLS_EXTENSION_MAX < 16
+ # error not enough extension types
+ #endif
+
+ This doesn't work as expected; because GNUTLS_EXTENSION_MAX is not
+ defined as a preprocessor macro, it always expands to 0. To properly
+ do this check, we need to use static assert as provided as the
+ 'verify' macro in gnulib.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Mar 1 10:16:08 2020 +0100
+
+ hello_ext: use 64-bit integer to track extensions
+
+ We currently have 26 predefined extensions, allowing the user to
+ define 5 extra as tested in tests/handshake-large-packet.c. However,
+ if we introduce one more, session->internals.used_exts exceeds.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Mar 7 01:05:45 2020 +0300
+
+ fuzz: add simple x509 certificate requests and revocation lists fuzzers
+
+ Add x509 certificate requests and certificate revocation lists fuzzers.
+ Use data from tests/cert-tests as a starting seed for the corpora.
+
+ Fixes #903
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Mar 7 01:09:55 2020 +0300
+
+ lib/x509/output.c: remove occasioinal memory leak in print_issuer_sign_tool()
+
+ Remove memory leak in error handling in print_issuer_sign_tool() by
+ moving asn1_delete_structure to the end of the function.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 2 20:28:21 2020 +0100
+
+ RELEASES.md: describe the release process
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Fri Feb 28 16:18:58 2020 +0100
+
+ Add support for loading EdDSA keys from PKCS#11 and using them
+
+ Signed-off-by: Jakub Jelen <jjelen@redhat.com>
+
+Author: Ross Nicholson <phunkyfish@gmail.com>
+Date: Sun Feb 23 07:55:43 2020 +0000
+
+ Adding missing macosx directory for aarch64 acceleration
+
+ Signed-off-by: Ross Nicholson <phunkyfish@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Feb 21 16:38:29 2020 +0100
+
+ keylogfile: simplify the callback mechanism
+
+ This partially reverts commit 97117556 with a simpler interface. The
+ original intention of having the callback mechanism was to reuse it
+ for monitoring QUIC encryption changes. However, it turned out to be
+ insufficient because such changes must be emitted after a new epoch is
+ ready.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Feb 21 13:14:48 2020 +0100
+
+ Add valgrind suppression for fun:decode_complex_string.isra.0
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Feb 21 13:14:03 2020 +0100
+
+ Add --gen-suppressions=all to valgrind to iautomatically generate suppression rules
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Feb 18 14:35:37 2020 +0300
+
+ lib: drop unused pbkdf2 helpers
+
+ Updated pbkdf2 API in GnuTLS removed the need for PBKDF2 helpers, drop
+ them now.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sat Feb 8 23:47:17 2020 +0100
+
+ gnutls-cli: Add option to store all stapled OCSP responses
+
+ Note that there's a small modification to the behavior of the existing
+ --ocsp-save option: If there is no stapled OCSP response the output
+ file is still created and will be empty.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Feb 8 18:04:27 2020 +0100
+
+ TravisCI: Add bison [skip ci]
+
+ The latest gnulib needs a newer bison than TravisCI OSX has.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 08:13:50 2020 +0100
+
+ keylogfile: generalize with a callback
+
+ This refactors the keylogfile mechanism by adding a callback to get
+ notified when a new secret is derived and installed. That way,
+ consumers can implement custom logging feature per session, which is
+ particularly useful in QUIC implementation.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Feb 7 16:55:11 2020 +0100
+
+ .lgtm.yml: Fix --disable-documentation to --disable-doc [skip ci]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Feb 6 16:48:48 2020 +0100
+
+ cfg.mk: Exclude sc_prohibit_gnu_make_extensions from syntax-check
+
+ This new gnulib check does not work with GNU awk 5.0.1 and GNU make 4.2.1.
+
+ References:
+ https://lists.gnu.org/archive/html/bug-gnulib/2019-05/msg00095.html
+ https://lists.gnu.org/archive/html/bug-gnulib/2019-06/msg00040.html
+ https://lists.gnu.org/archive/html/bug-gnulib/2019-07/msg00046.html
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Feb 6 15:52:50 2020 +0100
+
+ Update gnulib to fix building on OSX 10.9
+
+ Fixes #926
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dimitri John Ledkov <xnox@ubuntu.com>
+Date: Tue Jan 14 15:14:59 2020 +0000
+
+ testcompat-openssl: improve testing against secured OpenSSL versions.
+
+ In Debian, and soon Ubuntu, OpenSSL is compiled with SECLEVEL=2 and
+ requiring minimum TLSv1.2. However, smaller hashes/keys/versions are
+ allowed if one enables SECLEVEL=1. Do so when testing pre v1.2 algos,
+ and thus enabling testing more compatability combinations.
+
+ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Feb 5 16:06:30 2020 +0300
+
+ nettle/gost: gost28147: require calling set_param before set_key
+
+ Require selecting parameter set before setting the key. There is no need
+ to provide default setting, if a param is always selected anyway.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Feb 3 05:18:29 2020 +0100
+
+ tests: skip pkcs12-gost under GNUTLS_FORCE_FIPS_MODE
+
+ The MAC algorithm used in the PBKDF2 is actually prohibited in the
+ FIPS mode and previously there wasn't a check for that.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 17:58:56 2020 +0100
+
+ privkey_pkcs8: remove unused #include <nettle/pbkdf2.h>
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 17:57:37 2020 +0100
+
+ pkcs7-crypt: refactor using gnutls_pbkdf2
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 16:15:51 2020 +0100
+
+ pkcs12: refactor using gnutls_pbkdf2
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 16:00:56 2020 +0100
+
+ secrets: refactor using gnutls_hkdf_{extract,expand}
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Feb 2 14:44:05 2020 +0100
+
+ crypto-api: add generic crypto functions for KDF
+
+ This exposes HKDF and PBKDF2 functions from the library. Instead of
+ defining a single KDF interface as in PKCS #11, this patch defines 3
+ distinct functions for HKDF-Extract, HKDF-Expand, and PBKDF2
+ derivation, so that we can take advantage of compile time checking of
+ necesssary parameters.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Sun Feb 2 09:47:25 2020 -0600
+
+ session_pack: fix leak in error path
+
+ If called at the wrong time, it allocates the buffer sb and forgets to
+ clear it.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 1 23:09:01 2020 +0100
+
+ .mailmap: map Dmitry's email to a single name [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 1 23:02:55 2020 +0100
+
+ NEWS: fixed issue number for 448
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 1 22:54:13 2020 +0100
+
+ NEWS: refactored for release
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 1 22:44:41 2020 +0100
+
+ hooks.m4: bumped so-version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 29 20:00:53 2020 +0300
+
+ nettle/gost: support use GOST DSA support from master branch
+
+ Use GOST DSA and GOST curves provided by Nettle's master branch.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jan 28 13:05:14 2020 +0300
+
+ pkcs12: do not go try calculating pbkdf2 with 0 iterations
+
+ Nettle will abort on a call to pbkdf2 if iterations is 0. Add check to
+ GnuTLS PKCS12 GOST code to check that iter is not 0.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Bjoern Jacke <bjacke@samba.org>
+Date: Mon Jan 27 19:40:53 2020 +0100
+
+ add support for local threads with studio and ibm compilers
+
+ Signed-off-by: Bjoern Jacke <bjacke@samba.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 26 21:45:29 2020 +0100
+
+ tlsfuzzer: optimized tests for CI and enabled x448
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 26 21:32:18 2020 +0100
+
+ tlsfuzzer: fix test-tls13-large-number-of-extensions.py
+
+ This test requires a TLS-1.3-only server as its tests clash with
+ extensions supported by a TLS-1.2 server. Ensure that the extensions
+ that overlap with TLS-1.2 are not manipulated as we don't have
+ a pure TLS-1.3-only implementation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 21 10:32:59 2020 +0100
+
+ GOSTR341194: mark as insecure for digital signatures
+
+ Although there are no practical attacks known on the algorithm, the practical
+ strength of the algorithm is weaker than the theoritical. In addition this algorithm
+ is already considered legacy, and as such mark it as insecure for digital
+ signatures to reduce the attack surface.
+
+ Relates: #909
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Jan 26 18:39:18 2020 +0100
+
+ Avoid pushd/popd bashism in testsuite
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jan 20 11:48:50 2020 +0100
+
+ tests/key-material-dtls.c: Try again on GNUTLS_E_AGAIN and GNUTLS_E_INTERRUPTED
+
+ This fixes issues on the CI cross-runners with 'make -jN', N > 1.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 4 14:37:46 2020 +0100
+
+ Use make with crafted -j for CI builds and tests
+
+ This speeds up the Gitlab CI runners. E.g. measured timings of the
+ Debian.x86_64 runner show ~40% speedup (down from 38 to 23 minutes).
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 25 22:28:32 2020 +0100
+
+ tests: updated tlsfuzzer tests to latest version
+
+ This adds new tests, reduces running time, and removes test-tls13-obsolete-curves.py.
+ The latter introduced too pendantic tests on curves we don't implement,
+ and requires significant changes to passing with limited benefit. For example
+ it requires the server to error on mismatching entries (and we simply ignore
+ them). As its value is low (we do not target to be a reference implementation
+ for testing broken clients), it was removed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 25 22:02:48 2020 +0100
+
+ key shares: avoid using internal errors
+
+ On unknown curves or illegal parameters, make sure we return the
+ right error code which will translate to the appropriate alert.
+
+ Resolves: #907
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 24 23:12:07 2020 +0100
+
+ fuzz: fixed Ed448 fuzzer traces
+
+ The fuzzer files for ed448 were the reverse for client and server.
+ Enhanced the fuzzer tools to run a single fuzzer, and added more
+ clear documentation on how to generate and manually test the fuzzer
+ outputs.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 24 23:11:34 2020 +0100
+
+ README-adding-traces.md: updated with more precise information
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 24 22:57:49 2020 +0100
+
+ fuzzers: added ed448 keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 25 11:18:09 2020 +0100
+
+ Create files in gl/ licenced lgpl2+ instead of lgpl3+
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 24 22:53:50 2020 +0100
+
+ fuzzers: when provided with a parameter they will run on a single file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jan 24 22:04:41 2020 +0300
+
+ .gitlab-ci.yml: remove --disable-gost from nettle-master test
+
+ Remove --disable-gost switch from the test using Nettle's master branch
+ as GnuTLS is now compatible again with nettle/master.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jan 23 13:07:23 2020 +0300
+
+ lib/nettle/gost: restore compatibility with nettle master
+
+ Use newer format of ecc curve data if curve448 support is detected.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 24 16:38:15 2020 +0100
+
+ .gitlab-ci.yml: force running jobs on linux runners
+
+ There are shared windows runners in gitlab, that will fail
+ running our jobs.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 23 16:25:43 2020 +0100
+
+ fuzz: import key, certificate, and traces using Ed448
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 22 05:25:19 2020 +0100
+
+ tlsfuzzer: enable tests for X448
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 20 11:17:51 2020 +0100
+
+ .gitlab-ci.yml: set WINEPATH to allow eccdata run under Wine
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 19 12:13:48 2020 +0100
+
+ .gitlab-ci.yml: export LDFLAGS throughout the FreeBSD build
+
+ Otherwise the build process wouldn't be able to find -lgmp.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jan 13 11:35:15 2020 +0100
+
+ .gitlab-ci.yml: add target to build against nettle master
+
+ This is similar to the build/gnutls target in nettle's own gitlab CI.
+ The only difference is that this will build/test all branches of
+ GnuTLS against the master branch of nettle.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 22 08:27:43 2019 +0200
+
+ algorithms: implement X448 key exchange and Ed448 signature scheme
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Apr 21 21:13:30 2019 +0200
+
+ nettle: vendor in Curve448 and Ed448 implementation
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 15 11:05:31 2020 +0100
+
+ tls13: request OCSP responses as a server
+
+ The TLS1.3 protocol requires the server to advertise an empty
+ OCSP status request extension on its certificate verify message
+ for an OCSP response to be sent by the client. We now always
+ send this extension to allow clients attaching those responses.
+
+ Resolves: #876
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jan 20 15:08:04 2020 +0300
+
+ x509: add OGRNIP DN entry definition used by qualified GOST certificates
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 6 15:14:48 2019 +0300
+
+ x509: include digestParamSet into GOST 512-bit curves A and B params
+
+ Old implementations do not understand PublicKeyParams with omitted
+ digestParamSet. So include the field for old 512-bit curves to improve
+ compatibility with old implementations.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jan 20 03:16:56 2020 +0300
+
+ fuzz in gost pkcs7/8/12 files
+
+ Add several examples of PKCS#7/#8/#12 files using GOST keys, ciphers and
+ digest functions.
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jan 20 03:11:08 2020 +0300
+
+ pkcs12: use correct key length when using STREEBOG-512
+
+ PKCS#12 files using GOST HMAC (GOST R 34.11-94 and Streebog) use special
+ function to generate MAC key. Pass correct key length (fixed to be 32)
+ when generating PKCS#12 files protected with Streebog (currently it
+ incorrectly uses 64 there).
+
+ Signed-off-by: Dmitry Baryshkov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 17 21:34:45 2020 +0100
+
+ gnutls-cli-debug: ignore tests when algorithms are unavailable
+
+ When gnutls-cli-debug is run on systems where a particular algorithm
+ is disabled, ensure that we don't stop the testing; in that case
+ we ignore the test.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 15 14:44:22 2020 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 15 09:46:38 2020 +0100
+
+ tls13: do not send OCSP responses as client without server requesting
+
+ In client side ensure we see a request for OCSP from servers before
+ sending one.
+
+ Relates: #876
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dimitri John Ledkov <xnox@ubuntu.com>
+Date: Tue Jan 7 11:32:37 2020 +0000
+
+ libgnutls: Add system-wide default-priority-string override.
+
+ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jan 13 01:20:28 2020 +0300
+
+ lib: fix _kx_priority_gost termination item
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jan 12 19:24:51 2020 +0300
+
+ tests/priorities: add tests for GOST ciphersuites enablement
+
+ Add test counting GOST ciphersuites and ciphers available.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sat Jan 11 21:16:50 2020 +0100
+
+ gnutls-cli: Log all stapled OCSP responses when running with --verbose
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jan 10 14:17:44 2020 +0300
+
+ pk: set generated key algo before calling pct_test
+
+ In wrap_nettle_pk_generate_keys() set params->algo before calling
+ pct_test() as GOST sign/verify use that field.
+
+ Reported-by: Daiki Ueno
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jan 10 14:16:56 2020 +0300
+
+ CI: FIPS140-2 run make check without enforcing FIPS mode
+
+ Some distributions might enable --enable-fips140-mode, without actually
+ enabling/enforcing FIPS at runtime. Catch issues in such configurations
+ (reported by Daiki Ueno).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 7 11:24:01 2020 +0100
+
+ tests: add test for revoked OCSP response
+
+ This adds a test that exercises a failed handshake upon receipt of an
+ OCSP response with the "revoked" status.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 8 16:01:38 2020 +0100
+
+ ocsp: set GNUTLS_CERT_INVALID if OCSP response indicates revocation
+
+ This makes the OCSP based certificate verification adhere to the
+ convention used throughout the library: "The 'GNUTLS_CERT_INVALID'
+ flag is always set on a verification error and more detailed flags
+ will also be set when appropriate."
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 22:17:55 2020 +0300
+
+ NEWS: expand documentation for GOST priority strings
+
+ Use +GOST-ALL shortcut to enable GOST ciphersuites. Also document newly
+ added GOST shortcuts.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 22:11:51 2020 +0300
+
+ priority: make priority matching less error-prone
+
+ To remove possibility of using wrong length or using strncasecmp()
+ instead of c_strncasecmp() define PRIO_MATCH(name) macro taking care
+ about all details.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 22:07:19 2020 +0300
+
+ priority: add new GOST-ALL shortcut
+
+ Add GOST-ALL as an alias for CIPHER-GOST-ALL, MAC-GOST-ALL, KX-GOST-ALL,
+ SIGN-GOST-ALL and GROUP-GOST-ALL.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 22:03:44 2020 +0300
+
+ priority: add more GOST shortcuts
+
+ Add shortcuts for GOST ciphers, MACs and KXes. For now they contain only
+ one item, but this list will be expanded as support for GOST-CTR-ACPKM
+ ciphersuites will be added.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 21:10:55 2020 +0300
+
+ lib/priority: add SIGN-GOST-ALL keyword
+
+ Add SIGN-GOST-ALL keyword containing all defined GOST signature
+ algorithms.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 9 13:03:10 2020 +0100
+
+ doc: clarify thread safeness in gnutls_global_init()
+
+ This documents and clarifies the thread safeness of gnutls_global_init()
+ and its constraints.
+
+ Resolves: #900
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 20:22:11 2020 +0300
+
+ lib/priority: use c_strncasecmp() for string comparison
+
+ Use c_strncasecmp() instead of just strncasecmp() which can be affected
+ by locale.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 21:31:32 2020 +0300
+
+ doc: document GOST priority options
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 21:37:28 2020 +0300
+
+ doc: document GOST cipher and MAC algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 8 22:08:14 2020 +0300
+
+ priority: fix GROUP-GOST-ALL comparison length
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 4 13:38:01 2020 +0100
+
+ tests: replace invalid extension OIDs with valid ones
+
+ libtasn1 4.15.0 or earlier allow encoding and decoding
+ of invalid OIDs, but more recent versions may stop
+ accepting them. Ensure that our test suite includes
+ OIDs which can be decoded by all versions of libtasn1.
+
+ Relates:
+ https://gitlab.com/gnutls/libtasn1/issues/25
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dimitri John Ledkov <xnox@ubuntu.com>
+Date: Mon Jan 6 09:41:27 2020 +0000
+
+ tests/Makefile.am: use absolute top_srcdir for GNUTLS_PRIORITY_FILE
+
+ Some tests, e.g. in suite/tls-fuzzer execute scripts from
+ sub-directories, making the relative path to system.prio in the
+ environment pointing to a non-existent file. Export system.prio
+ testsuite file as an absolute path to avoid this issue.
+
+ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 3 20:21:07 2020 +0100
+
+ doc: updated epub.texi from gnutls.texi
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 3 16:58:04 2020 +0100
+
+ .gitlab-ci.yml: identify on runtime to db2epub directory
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jan 3 13:17:28 2020 +0100
+
+ Remove && command concatenation in .gitlab-ci.yml
+
+ As it turns out, `set -e` doesn't work if one of the commands fail,
+ maybe except the last command.
+ Seen, tested and reproduced on Fedora28 image.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 3 13:55:09 2020 +0100
+
+ .gitlab-ci.yml: merged ASAN and UBSAN runs
+
+ This in addition to merging the two CI runs, it also attempts
+ to run the fuzz code under SHANI for CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Edward Stangler <estangler@bradmark.com>
+Date: Fri Jan 3 10:36:21 2020 +0000
+
+ Fixes dummy getrandom() when errno = EAGAIN.
+
+ Fixes #892.
+
+ Signed-off-by: Edward Stangler <estangler@bradmark.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jan 2 16:15:15 2020 +0100
+
+ Fix '-Werror=unused-const-variable=' in fuzz/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Dec 22 13:20:03 2019 +0100
+
+ Fix NULL ptr access in _gnutls_iov_iter_next()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Dec 21 19:21:55 2019 +0100
+
+ Use check_for_datefudge in tests
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Dec 20 11:00:53 2019 +0100
+
+ Fix "left shift cannot be represented in type 'int'" in hello_ext.[ch]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 19 12:33:34 2019 +0100
+
+ Fix 2x -Wunused-function in tests/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 19 12:23:34 2019 +0100
+
+ certtool-cfg.c: Silence -Wunused-variable if HAVE_IPV6 not set
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 19 11:48:47 2019 +0100
+
+ status_request.c: Silence -Wsign-compare
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 19 11:46:23 2019 +0100
+
+ rnd-fuzzer.c: Suppress shift sanitization check
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 19 11:17:43 2019 +0100
+
+ handshake.c: Suppress warning in fuzzing build
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Dec 18 19:44:10 2019 +0100
+
+ Fix implicit value change in verify-high.c
+
+ verify-high.c:284:7: runtime error: implicit conversion from type 'size_t'
+ (aka 'unsigned long') of value 15421545260338 418178 (64-bit, unsigned) to
+ type 'uint32_t' (aka 'unsigned int') changed the value to 437555714 (32-bit,
+ unsigned)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Dec 18 16:39:38 2019 +0100
+
+ UBSAN: Fail tests if UB detected
+
+ Suppressions are in devel/ubsan.supp.
+ Suppressions only work on recoverable checks.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 29 21:53:32 2019 +0100
+
+ gnutls_x509_crt_get_extension_info: optimize when critical equals NULL
+
+ That is, do not perform the look ups necessary to calculate the value
+ when it will not be used.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 30 05:35:45 2019 +0100
+
+ fuzz: import certificate with and without sanity checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 29 22:33:07 2019 +0100
+
+ x509: reject certificates having duplicate extensions
+
+ According to RFC5280 a certificate must not include more than
+ one instance of a particular extension. We were previously printing
+ warnings when such extensions were found, but that is insufficient
+ to flag such certificates. Instead, refuse to import them.
+
+ Resolves: #887
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 3 08:53:55 2020 +0100
+
+ tests/suite: do not include scripts into dist
+
+ This part of the test suite is only run on CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 2 14:09:50 2020 +0100
+
+ ecore cli: updated and rewritten to use libev
+
+ That removes a lot of code that was not necessary in the gnutls test
+ suite.
+
+ Resolves: #884
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 2 22:32:43 2020 +0100
+
+ .gitlab-ci.yml: use separate images for mingw and fedora builds
+
+ This should result to faster image loading for CI builds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 2 14:55:11 2020 +0100
+
+ tests: use newer nettle APIs in cipher-override.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 1 21:37:01 2020 +0100
+
+ doc: updated copyrights for 2020
+
+ This updates the copyright year for documentation
+ and excludes gnulib files from the copyright check.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Dec 29 12:52:21 2019 +0300
+
+ cli: fix building with GOST disabled
+
+ Fix building gnutls-cli (benchmark part) with GOST keys support being
+ disabled.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Dec 29 12:49:16 2019 +0300
+
+ cli: support building with OCSP and ANON disabled
+
+ Support gnutls-cli when building GnuTLS with OCSP and ANON
+ authentication API disabled.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Dec 29 12:49:16 2019 +0300
+
+ serv: support building with OCSP disabled
+
+ Support gnutls-serv when building GnuTLS with OCSP API disabled.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Nov 9 02:29:19 2019 +0300
+
+ tls12-server-kx-neg: add tests without GOST signature algorithms
+
+ Add tests mimicking SChannel clients which are unable to send proper
+ SignatureAlgorithms extension.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Nov 9 02:01:22 2019 +0300
+
+ SignatureAlgorithms: force-enable GOST signatures for GOST KX
+
+ SChannel-based clients can not send GOST identifiers as a part of
+ SignatureAlgorithms extension. To mitigate this forcefully enable GOST
+ signature algorithms if client sends GOST ciphersuite.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 24 16:26:27 2019 +0300
+
+ benchmark: enable benchmarking of GOST CNT ciphersuite/KX
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 24 02:33:26 2019 +0300
+
+ benchmark: support benchmarking GOST ciphers/MACs
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 24 02:32:17 2019 +0300
+
+ benchmark: use mac key size instead of block size
+
+ Use newly added gnutls_hmac_get_key_size() to get key size instead of
+ assuming that key size = block size (incorrect for GOST 28147 IMIT).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 24 02:31:30 2019 +0300
+
+ crypto-api: add gnutls_hmac_get_key_size() function
+
+ Add gnutls_hmac_get_key_size() to retrieve MAC key size.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 24 01:20:24 2019 +0300
+
+ nettle/gost: remove gost28147_imit_init
+
+ Rewrite gost28147 imit code to clean up state and index on key setup to
+ be sure that imit context is properly cleaned.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Nov 20 16:10:11 2019 +0100
+
+ guile: Arrange to make 'gnutls.scm' architecture-independent.
+
+ Fixes #838.
+ Reported by Andreas Metzler.
+
+ * configure.ac: Define and substitute 'maybe_guileextensiondir'.
+ * guile/Makefile.am (.in.scm): Substitute 'maybe_guileextensiondir'.
+ * guile/modules/gnutls.in <top level>: Use @maybe_guileextensiondir@.
+ Check if %LIBDIR is true.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 23 20:20:58 2019 +0100
+
+ x509: do not tolerate invalid DER time
+
+ This effectively reverts !400 and ensures that we no longer tolerate
+ invalid DER time. This complements the previous commit by Lili Quan
+ and ensures we provide the --disable-strict-der-time backwards compatibility
+ option.
+
+ Resolves: #207
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 14 10:51:48 2019 +0100
+
+ certtool: always set extensions from template
+
+ Previously we would only set these extensions specific with add_extension
+ when generating using --generate-certificate. The change makes sure these
+ options are considered even when generating an extension from a certificate
+ request. Issue reported on the mailing list.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 14 10:44:16 2019 +0100
+
+ tests: check certificate generation from certificate request
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 20 20:37:32 2019 +0100
+
+ tests: ensure test suite does not apply global config
+
+ When running the test suite we do not apply the global
+ gnutls configration as it may change options that are
+ tested.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 5 11:40:31 2019 +0100
+
+ gnutls-cli: improved output of --benchmark-tls-kx
+
+ It is now printed in a way that separates the tests. Example:
+ ```
+ (TLS1.3)-(ECDHE-SECP256R1)-(RSA-PSS-RSAE-SHA256)-(AES-128-GCM)
+ - 179.19 transactions/sec
+ - avg. handshake time: 5.57 ms
+ - standard deviation: 0.57
+
+ (TLS1.3)-(ECDHE-X25519)-(RSA-PSS-RSAE-SHA256)-(AES-128-GCM)
+ - 182.24 transactions/sec
+ - avg. handshake time: 5.48 ms
+ - standard deviation: 0.64
+ ```
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 4 13:58:21 2019 +0100
+
+ gnutls-cli: benchmark-tls-kx can work with sub-ms accuracy
+
+ This allows micro and nanoseconds to be reported if necessary,
+ and it changes reporting of sample variance to standard deviation
+ giving a possibly better overview as it is in the same units as
+ the average.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jul 19 15:40:46 2018 +0300
+
+ gnutls-cli-debug: add GOST_CNT-related KX/cipher/MAC tests
+
+ Add test for VKO-GOST-12, GOST28147-TC26Z-CNT and GOST28147-TC26Z-IMIT
+ support by the server.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 19 21:13:15 2019 +0100
+
+ README.md: updated to list fuzz coverage results [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dimitri John Ledkov <xnox@ubuntu.com>
+Date: Sun Dec 15 20:32:02 2019 +0000
+
+ doc: update reference to the default configuration file
+
+ Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 19 20:28:50 2019 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 19 09:37:34 2019 +0100
+
+ _gnutls_verify_crt_status: apply algorithm checks to trusted CAs
+
+ If a CA is found in the trusted list, check in addition to
+ time validity, whether the algorithms comply to the expected
+ level. This addresses the problem of accepting CAs which would
+ have been marked as insecure otherwise.
+
+ Resolves: #877
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 18 14:38:32 2019 +0100
+
+ certtool: added option to apply a certificate verification profile
+
+ This applies to the --verify and --verify-chain commands.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 18 14:29:21 2019 +0100
+
+ Export profile ID/name handling functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 18 14:04:35 2019 +0100
+
+ is_level_acceptable: apply the system-wide profile in all verifications
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Lili Quan <13132239506@163.com>
+Date: Thu Dec 19 17:14:20 2019 +0100
+
+ Introduced check to reject certificates with non-digits in time field
+
+ According to RFC5280 we should reject such certificates.
+
+ Resolves: #870
+
+ Signed-off-by: Lili Quan <13132239506@163.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 13 23:47:16 2019 +0300
+
+ abi-check: fix include paths
+
+ If GnuTLS is built outside of source tree, abicheck will miss gnutls.h
+ header which is generated in the build tree. Expand arguments to include
+ it.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 18 23:28:48 2019 +0300
+
+ doc: document GROUP-GOST-ALL keyword
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 27 15:48:57 2019 +0300
+
+ NEWS: add news entry, describing TLS 1.3 vs GOST issues
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jul 17 19:41:47 2019 +0300
+
+ ext/signature: use GOST signatures for GOST ciphersiuites
+
+ draft-smyshlyaev-tls12-gost-suites limits SignatureAndHash algorithms
+ in CertificateRequest message to GOST values if GOST cipher suite is
+ selected.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 3 10:48:09 2019 +0300
+
+ tls13-server-kx-neg: add test for GOST-enabled server and client
+
+ If both client and server have enabled TLS 1.3 and GOST-CNT
+ ciphersuites, they should correctly negotiate a connection, but using
+ TLS 1.2 version.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 9 07:17:59 2017 +0300
+
+ tests: added testcases for ciphersuite/KX negotiation with VKO-GOST
+
+ This verifies whether the ciphersuite negotiation will detect and
+ reject incompatible data present in credentials.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 21:37:38 2017 +0300
+
+ tests: add tests for KX-GOST-VKO using different key variants
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 27 03:31:49 2016 +0300
+
+ Add GOST cipher suites
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Feb 10 12:18:40 2019 +0300
+
+ priority: add GROUP-GOST-ALL keyword
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 30 13:11:28 2016 +0300
+
+ Support GOST certificate request values
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 21:56:23 2017 +0300
+
+ lib: fix group selection in case of GOST cipher suites
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Dec 17 20:09:54 2019 +0100
+
+ Sync with fuzzers from OSS-Fuzz
+
+ Only lots of corpora removed (by merge step). Not sure why.
+ But there are several new UBs detected.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Dec 17 19:52:58 2019 +0100
+
+ Amend fuzz scripts and README for clang-8
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Dec 17 19:52:05 2019 +0100
+
+ Add fuzz corpora for gnutls_ext_raw_parse_fuzzer
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 16 12:54:23 2019 +0100
+
+ fuzzer: added fuzzer for gnutls_ext_raw_parse()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 16 12:45:06 2019 +0100
+
+ gnutls_ocsp_status_request_is_checked: mark explicitly as unsigned the return type
+
+ Also some documentation updates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 16 11:35:48 2019 +0100
+
+ README.md: updated CI build badge [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 14 15:41:17 2019 +0100
+
+ Provide flag to identify sessions that an OCSP response was requested
+
+ That adds the flag GNUTLS_SFLAGS_CLI_REQUESTED_OCSP which can be
+ checked by a server application to determine whether the
+ client has requested stapled OCSP responses.
+
+ This includes minor cleanups in the status request handling code.
+
+ Resolves: #829
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 7 21:30:17 2019 +0100
+
+ abi: updated to latest const changes and added NEWS entry
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue May 21 21:50:33 2019 +0200
+
+ Add const to function arguments in lib/x509
+
+ This change does not introduce functionality changes.
+ It just adds const promises to the caller.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 5 17:06:22 2019 +0100
+
+ gnutls-serv: do not exit on command failure
+
+ If gnutls_reauth() or gnutls_heartbeat_ping() fail, gnutls-serv
+ would simply quit. This prevents using this tool in a test environment
+ like tlsfuzzer. Ensure that we don't quit on error.
+
+ Resolves: #868
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 4 22:18:02 2019 +0100
+
+ .triage-policies.yml: updated to work with latest gitlab-triage [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Vitezslav Cizek <vcizek@suse.com>
+Date: Wed Dec 4 15:24:17 2019 +0100
+
+ lib: remove obsolete AVOID_INTERNALS
+
+ Although commit 1f246c381e8a7449d84b143ffe50a0818622d2a3 enabled
+ the self-check functions unconditionally, the #ifdefs AVOID_INTERNALS
+ remained in lib/crypto-selftests-pk.c.
+
+ Signed-off-by: Vitezslav Cizek <vcizek@suse.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 2 17:32:16 2019 +0100
+
+ Revert "Released 3.6.11.1 including missing files"
+
+ This reverts commit 1e9c9ba0c0798b5566902e6c5ab83418826dd7f5.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 2 17:08:43 2019 +0100
+
+ Released 3.6.11.1 including missing files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 2 08:56:05 2019 +0100
+
+ libopts: include new files into dist
+
+ This also includes --enable-local-libopts flag to make dist
+ to catch future regressions.
+
+ Resolves: #867
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 1 22:39:01 2019 +0100
+
+ released 3.6.11
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sun Dec 1 19:20:17 2019 +0100
+
+ Write OCSP status request debug information to logfile, if set
+
+ The status information not part of the payload data and should be
+ separate when using --logfile.
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Fiona Klute <fiona.klute@gmx.de>
+Date: Sun Dec 1 18:45:28 2019 +0100
+
+ Send log messages about loading client credentials to logfile, if set
+
+ Signed-off-by: Fiona Klute <fiona.klute@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 29 20:30:26 2019 +0100
+
+ .travis.yml: explicitly install openssl to address build issue
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 29 16:19:07 2019 +0100
+
+ NEWS: documented AES-CFB8 fix [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 29 13:06:41 2019 +0100
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 28 09:08:28 2019 +0100
+
+ .travis.yml: update submodules [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 29 09:40:55 2019 +0100
+
+ base64: minor improvements in OOM handling and test suite
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 28 15:05:17 2019 +0100
+
+ gnutls_base64_decode2() succeeds decoding the empty string
+
+ This is a behavioral change of the API but it conforms to
+ the RFC4648 expectations.
+
+ Resolves: #834
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 27 16:13:06 2019 +0100
+
+ Revert "tests: ignore datefudge-check check when running on command line"
+
+ This commit was breaking CI on FreeBSD systems.
+
+ This reverts commit 1fe4f8e289d666979618fbb909983ac05aad11ac.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 25 22:36:22 2019 +0100
+
+ certtool: always include the CRL distribution points on CAs
+
+ Previously we would omit the CRL distribution points from a non-self
+ signed CA certificate, even if contained in the template.
+
+ Resolves: #765
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 25 22:38:05 2019 +0100
+
+ tests: ignore datefudge-check check when running on command line
+
+ That allows running the tests individually without make or setting
+ top_builddir variable.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 22 17:21:19 2019 +0300
+
+ tests: make tests pass with disabled GOST algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 22 16:43:49 2019 +0300
+
+ gitlab-ci: enable running make check on minimal build
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Mon Nov 11 21:36:22 2019 +0100
+
+ guile: Silence auto-compilation warning for 'guild'.
+
+ Reported by Helmut Grohne <helmut@subdivi.de>
+ and Andreas Metzler <ametzler@bebt.de>
+ at <https://bugs.debian.org/943905>.
+
+ * guile/Makefile.am (%.go): Pass "GUILE_AUTO_COMPILE=0" to avoid
+ warnings about 'guild' needing to be compiled.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Nov 10 14:06:58 2019 +0300
+
+ vko: fix possible unitilized scalar access
+
+ Fix error path in _gnutls_gost_keytrans_decrypt. If
+ _asn1_strict_der_decode() fails, cleanup path will try to
+ gnutls_pk_params_release(&pub), which will access unitialized pub
+ variable. Fix by deleting asn1 sctructure directly.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Mon Nov 11 21:30:48 2019 +0100
+
+ guile: Do not attempt to load shared object when cross-compiling.
+
+ Reported by Helmut Grohne <helmut@subdivi.de>
+ and Andreas Metzler <ametzler@bebt.de>
+ at <https://bugs.debian.org/943905>.
+
+ * configure.ac: Add 'CROSS_COMPILING' conditional.
+ * guile/Makefile.am (CROSS_COMPILING_VARIABLE): New variable.
+ (%.go): Use it.
+ * guile/modules/gnutls.in <top level>: Do not call 'load-extension'
+ when "GNUTLS_GUILE_CROSS_COMPILING" is defined.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 27 03:30:34 2016 +0300
+
+ Add support for VKO GOST key exchange
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 7 18:25:01 2019 +0100
+
+ .gitlab-ci.yml: bump configure cache version
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Günther Deschner <gd@samba.org>
+Date: Wed Nov 6 13:17:57 2019 +0100
+
+ crypto-selftests: test CFB8 ciphers with different chunksizes
+
+ Signed-off-by: Guenther Deschner <gd@samba.org>
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 8 10:10:09 2019 +0100
+
+ nettle: use included CFB8 implementation if nettle is 3.5
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Feb 10 02:38:43 2019 +0300
+
+ groups: add function to return group by curve
+
+ Two GOST groups will have two curves attached. Add function to retrieve
+ group by curve, rather than by group id.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 7 18:01:33 2019 +0300
+
+ ecc: define curve->group relationship
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Aug 29 11:09:31 2017 +0300
+
+ Declare groups corresponding to GOST curves
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Dec 2 06:26:55 2016 +0300
+
+ Add GOST key transport support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 7 13:19:55 2018 +0300
+
+ nettle: add support for GOST key derivation
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 27 18:58:12 2016 +0300
+
+ _gnutls_pk_derive: add argument for nonce
+
+ GOST VKO key derivation needs another opaque argument (called UKM).
+ Add an argument to _gnutls_pk_derive to accomodate that keying material.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 14 15:39:39 2018 +0300
+
+ nettle/gost: add support for GOST VKO algorithm
+
+ GOST VKO is a variant of ECDHE algorithm.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 14 15:39:19 2018 +0300
+
+ nettle/gost: provide GOST keywrapping support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Miroslav Lichvar <mlichvar@redhat.com>
+Date: Wed Nov 6 11:37:10 2019 +0100
+
+ prf: don't crash when called before handshake completion
+
+ If a gnutls_prf*() function is called before the handshake is completed,
+ return GNUTLS_E_INVALID_REQUEST instead of crashing.
+
+ Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 6 12:07:24 2019 +0100
+
+ nettle: backport fixes to cfb8_decrypt
+
+ cfb8: don't truncate output IV if input is shorter than block size:
+ https://git.lysator.liu.se/nettle/nettle/commit/f4a9c842621baf5d71aa9cc3989851f44dc46861
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 5 16:47:17 2019 +0100
+
+ gnutls_privkey_sign_data2: removed unnecessary text [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 1 14:04:27 2019 +0100
+
+ .gitlab-ci.yml: do not inline strcmp in valgrind build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 1 10:24:24 2019 +0100
+
+ .gitlab-ci.yml: removed unnecessary use of --enable-valgrind-tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: nia <nia@NetBSD.org>
+Date: Thu Oct 31 18:36:49 2019 +0000
+
+ Add NEWS entry for the NetBSD KERN_ARND change.
+
+ Signed-off-by: Nia Alarie <nia@NetBSD.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 18 05:36:49 2017 +0300
+
+ tls-sig: reverse bytes in TLS signatures for GOST signatures
+
+ GOST TLS suites have one peculiarity: CertificateVerify message uses
+ byte order opposite to the rest of GOST signature usage (BE instead of
+ LE). So, reverse byte order in signatures in TLS code. For now this
+ applies only to TLS 1.2 code. GOST TLS 1.3 ciphersuites will also follow
+ this approach. Legacy TLS 1.0 ciphersuites also had this peculiarity.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 30 10:39:49 2019 +0100
+
+ .gitlab-ci.yml: updated CI environment to F31
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 11 20:46:41 2019 +0200
+
+ tests: include config.h in rawpk-api.c
+
+ This seems to have impacted windows compilation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 11 15:57:43 2019 +0200
+
+ tests: global-init-override do not run in windows
+
+ It cannot be compiled in f30.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 11 14:44:39 2019 +0200
+
+ updated to libopts 5.18.16
+
+ This fixes compilation in Fedora 30 which ships with this
+ version of autogen.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 27 03:12:45 2019 +0300
+
+ serv: move closing TABLE tag after actual table end
+
+ Move closing TABLE tag after printing information on cipher and MAC.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 27 03:08:33 2019 +0300
+
+ ecc: fix curve sizes for TC26-256 gost curves
+
+ Fix curve size being incorrectly set to 64 instead of 32 for several
+ GOST curves.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: nia <nia@NetBSD.org>
+Date: Sat Oct 26 20:58:49 2019 +0100
+
+ nettle: Support sysctl(KERN_ARND) for RNG on NetBSD.
+
+ This system call will never block and does not require a file
+ descriptor to be opened. It provides an endless stream of random
+ numbers from the kernel's ChaCha20-based random number generator.
+
+ Signed-off-by: Nia Alarie <nia@NetBSD.org>
+
+Author: Björn Jacke <bjacke@samba.org>
+Date: Fri Oct 25 17:25:39 2019 +0200
+
+ doc: describe how to make gnutls-cli quiet for pipe usage
+
+ Signed-off-by: Bjoern Jacke <bjacke@samba.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 24 18:01:55 2019 +0300
+
+ lib: simplify uint24 handling
+
+ Drop separate uint24 type and functions to convert between it and
+ uint32_t. This makes _gnutls_read/_write_uint24 simpler and easier to
+ understand. And with faster assembly code.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 20 18:49:41 2019 +0300
+
+ lib: drop gnutls_uint64 usage as sequence number
+
+ GnuTLS is depending already on uint64_t being a properly defined type.
+ So there is no need to have a special byte-array type for 8-byte
+ integers. Use uint64_t instead, thus simplifying a code quite heavily.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 21 15:55:47 2019 +0300
+
+ sign: convert tls13_ok to flags field
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 21 18:55:26 2019 +0300
+
+ tls-sig: split TLS 1.0/1.1 CertificateVerify code
+
+ For the symmetry split the TLS 1.[01] CertificateVerify code, so that
+ main functions work as pure multiplexors.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 21 14:08:00 2019 +0300
+
+ mac: mark GOST28147-TC26Z-IMIT as using CONTINUOUS_MAC
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 18 04:09:51 2017 +0300
+
+ Support GOST cipher suite MAC calculation
+
+ GOST ciphersuites require that MAC is calculated over _all_ packets,
+ rather than just current packet. Add flag to auth_cipher_hd_st
+ controlling this behaviour.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 21 13:57:55 2019 +0300
+
+ mac: change preimage_insecure to be a flag
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 18 13:19:04 2019 +0300
+
+ cipher: replace several bools with single flags instance
+
+ Replace bools in cipher_entry_st with flags field.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 21 19:34:45 2018 +0300
+
+ lib: pubkey vs TLS signature compatibility for GOST algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 18 13:22:06 2019 +0300
+
+ src: fix noreturn-related warning
+
+ Recent autogen started adding '#include <stdnoreturn.h>' into -args.h
+ files. However in GnuTLS tools code this results in the following
+ warnings, because stdnoreturn.h unconditionally redefines 'noreturn' to
+ _Noreturn:
+
+ warning: '_Noreturn' attribute directive ignored
+
+ Use __noreturn__ attribute instead as does Gnulib.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Dec 2 08:28:34 2016 +0300
+
+ Allow using implicit IV for stream ciphers with TLS
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Aug 29 11:10:33 2017 +0300
+
+ prf: add Streebog (GOST R 34.11-2012) PRF support
+
+ Add support and tests for PRF generated using both Streebog versions.
+ This is necessary for adding GOST TLS ciphersuites support.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Oct 12 20:59:22 2019 +0200
+
+ Add const to several read-only packet sequence params
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Oct 13 12:04:20 2019 +0200
+
+ tests/buffer.c: Add unit test for _gnutls_buffer_unescape()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:54:12 2019 +0200
+
+ lib/x509/x509.c: Check before pointer dereference in get_alt_name()
+
+ Fixes Coverity issue 1361513
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:44:35 2019 +0200
+
+ cipher: Let _gnutls_auth_cipher_setiv() return int
+
+ Fixes Coverity issue 1454646
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:34:22 2019 +0200
+
+ lib/record.c: Use assignment instead of memcpy()
+
+ Fixes Coverity issue 1454647
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:27:11 2019 +0200
+
+ lib/sslv2_compat.c: Check return value of _gnutls_generate_session_id()
+
+ Fixes Coverity issue 1454649
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:11:10 2019 +0200
+
+ lib/x509/output.c: Remove unneeded NULL check in print_crt_pubkey()
+
+ Fixes Coverity issue 1454670
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 18:04:44 2019 +0200
+
+ lib/auth/srp_passwd.c: Fix NULL dereference in _gnutls_srp_pwd_read_entry()
+
+ Fixes Coverity issue 1454652
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 17:53:54 2019 +0200
+
+ lib/str.c: Replace sscanf() in _gnutls_buffer_unescape()
+
+ Fixes Coverity issue 1454651
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 17:39:24 2019 +0200
+
+ lib/handshake.c: Check return value of _gnutls_version_max()
+
+ Fixes Coverity issue 1454674
+ Fixes Coverity issue 1454658
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Oct 9 17:37:42 2019 +0200
+
+ Remove trailing spaces in several files
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 10 17:49:01 2019 +0200
+
+ .gitlab-ci.yml: removed coverity build [ci skip]
+
+ The coverity run is subject to several restrictions by the service,
+ and thus it is not really useful in the main CI runs as it cannot reasonably
+ be run on MRs or master. As such we simplify the main CI file by moving the
+ coverity to the coverage sub-project and running it weekly.
+
+ The new location is at:
+ https://gitlab.com/gnutls/coverage
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 5 03:30:32 2019 +0200
+
+ crq APIs: fix typos [ci skip]
+
+ Resolves: #842
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 25 07:04:04 2019 +0200
+
+ document limitations of gnutls_record_discard_queued() [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ricardo M. Correia <rcorreia@wizy.org>
+Date: Wed Oct 9 17:37:22 2019 +0200
+
+ README.md: document lscpu/util-linux dependency for make check
+
+ Closes #764
+
+ Signed-off-by: Ricardo M. Correia <rcorreia@wizy.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Oct 9 01:29:07 2019 +0300
+
+ testpkcs11.sh: test that we output mechanism flags correctly
+
+ Verify some of PKCS#11 mechanism flags.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Sep 25 21:11:09 2019 +0300
+
+ p11tool: print mechanism info in list-mechanisms
+
+ Print key size range and flags in mechanisms list.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Oct 9 00:10:09 2019 +0300
+
+ tests/psk-file: fix heizenbug in last test
+
+ Currently last test case in psk-file expects that the server will
+ terminate connection with fatal error and close connection. Client will
+ receive GNUTLS_E_PUSH_ERROR error. However on slow boxes (or under qemu)
+ client is able to receive server's fatal alert thus returning unexpected
+ error. To make this behaviour predictable make server wait for client to
+ read all data and actually close connection on it's own.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 8 07:23:31 2019 +0200
+
+ session tickets: parse extension during session resumption on client side
+
+ It is possible for a server to send a new session ticket during
+ TLS1.2 resumption. To be able to parse it as client we need to
+ check the extension during resumption as well.
+
+ Resolves: #841
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jun 24 01:37:31 2019 +0300
+
+ ext/supported_groups: don't consider non-EC groups for EC
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Aug 2 02:08:00 2019 +0300
+
+ tests: correct gost server certificates
+
+ Correct GOST server certificates:
+ - use only Digital Signature Key Usage,
+ - use new format for 512-bit curve key and certificate.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 8 06:48:44 2019 +0200
+
+ .gitlab-ci.yml: only run coverity task on 3_6_x tags [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Oct 2 17:05:10 2019 +0300
+
+ cert-tests/gost: add certificate with new GOSTParameters struct
+
+ Add certificate example using simplified (new) GOSTParameters structure.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 7 20:59:34 2019 +0200
+
+ .gitlab-ci.yml: include an automated coverity build on tags
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Sep 25 18:13:37 2019 +0300
+
+ lib: implement support for updated GOST PublicKeyParameters
+
+ Recomendation for standardization R 1323565.1.023-2018 has made changes
+ to PublicKeyParameters for GOST R 34.10-2012 keys. It has removed
+ encryptionParamSet (since now S-BOX is basically fixed as TC26-Z) and
+ made digestParamSet OPTIONAL (as it can be concluded from public key
+ OID). Implement these requirements.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Apr 25 15:06:58 2019 +0300
+
+ nettle/pk: add support for "new" TC26 256 B curve
+
+ TC26 likes aliases. Thus "new" TC26 256 B curve is the same as old
+ CryptoPro-256-A curve (but with limitation to use GOST R 34.10-2012).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 28 21:40:30 2019 +0300
+
+ lib/ecc: add documentation for GOST-related curves
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 7 15:24:53 2019 +0300
+
+ lib: define more GOST curves
+
+ Declare GOST curves from GOST R 34.10-2001 and GOST R 34.10-2012 (test
+ curves) and GOST curves defined by TC26 itself.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Oct 1 18:15:19 2019 +0200
+
+ gnutls_aead_cipher_{en,de}cryptv2: write back cached data to buffers
+
+ Previously, those functions failed to write the output to the buffers
+ if the buffer length is not multiple of cipher block size. This makes
+ sure that the cached data is always flushed.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Oct 1 18:14:48 2019 +0200
+
+ iov: add _gnutls_iov_iter_sync to write back cached data to iov
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 3 10:34:18 2019 +0200
+
+ iov: _gnutls_iov_iter_next: return bytes instead of blocks
+
+ This eliminates the need of special handling of final block. Also
+ adds more tests in exceptional cases.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 5 03:27:01 2019 +0200
+
+ NEWS: added entry for 3.6.11
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Fri Oct 4 20:50:19 2019 +0200
+
+ Updated NEWS to reflect the added raw public-key handling functionality for gnutls-cli/serv tools.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon Sep 30 21:22:59 2019 +0200
+
+ Added functional regression tests for rawpk functionality in gnutls-cli and gnutls-serv.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Tue Aug 27 17:10:04 2019 +0200
+
+ Implemented raw public key support for gnutls-serv application.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon Aug 26 17:12:40 2019 +0200
+
+ Implemented raw public key support for gnutls-cli application.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Oct 2 14:47:44 2019 +0300
+
+ nettle/mac: add missing ifdef
+
+ Add an ifdef guarding gost28147 include.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Sep 29 18:55:18 2019 +0200
+
+ cipher-alignment: migrate LDADD/CFLAGS after rename
+
+ Test was renamed from mini-alignment to cipher-alignment.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 29 12:24:02 2019 +0200
+
+ bumped versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 28 21:25:25 2019 +0200
+
+ .gitlab-ci.yml: run pic-check on i686-linux-gnu to catch wrong assembly
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Sep 28 14:28:12 2019 +0200
+
+ Regenerate asm files with -fPIC
+
+ CRYPTOGAMS' perl-scripts can produce different output if -fPIC is passed
+ as option. Set -fPIC for the same files as openssl does.
+
+ Closes #818
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 28 12:42:12 2019 +0200
+
+ certtool: ensure that PKCS#8 file does not contain key description
+
+ Resolves: #840
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 28 21:23:17 2019 +0300
+
+ NEWS: document previous changes [ci skip]
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Aug 2 13:55:18 2019 +0300
+
+ tests: add verbose logging to server-kx-neg tests
+
+ Add support for verbose logging to tls*-server-kx-neg tests.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 19 17:42:53 2018 +0300
+
+ lib/algorithms: add AID values assigned by IANA
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Sep 27 17:00:29 2019 +0300
+
+ x509: add support for Russian extensions defined for qualified certificate
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Sep 1 11:05:35 2019 +0300
+
+ crypto-selftests: add CNT and IMIT self tests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 14 15:37:20 2018 +0300
+
+ nettle: provide GOST 28147-89 IMIT MAC support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jun 14 15:36:55 2018 +0300
+
+ nettle: provide GOST 28147-89 CNT mode support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Sep 26 16:45:25 2019 +0200
+
+ ext/supported_versions: reorder client precedence if necessary
+
+ If the client advertises TLS < 1.2 before TLS 1.3 and the server is
+ configured with TLS 1.3 enabled, the server should select TLS 1.3;
+ otherwise the client will disconnect when seeing downgrade sentinel.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 25 06:23:22 2019 +0200
+
+ gnutls_session_get_data2: fix operation without a timeout callback
+
+ When TLS1.3 was introduced, gnutls_session_get_data2 was modified
+ to assume that the callbacks set included the timeout one which was
+ not previously necessary except for some special cases. This corrects
+ that issue and makes sure that gnutls_session_get_data2() does not
+ fail (but not necessarily succeed), if that timeout callback is not
+ set.
+
+ Resolves: #823
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 25 06:18:48 2019 +0200
+
+ _gnutls_io_check_recv: added newline to error message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 23 21:42:14 2019 +0200
+
+ tests: cipher-alignment: ensure cipher registration
+
+ That is, ensure that the registered cipher is called at least
+ once in the program. That is, to make this test fail if the registration
+ API ever become deprecated/no-op.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 23 21:11:53 2019 +0200
+
+ tests: mini-alignment moved to modern nettle API
+
+ That is, it no longer uses the deprecated API, and it is also
+ removed to cipher-alignment for clarity.
+
+ Resolves: #835
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 23 21:05:48 2019 +0200
+
+ nettle: use nettle_get_secpp* consistently
+
+ We already depend on nettle 3.4.1 which provides that symbol,
+ ensure that we use it consistently.
+
+ Relates: #835
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 20 22:09:39 2019 +0200
+
+ Updates in OCSP status response related documentation
+
+ gnutls_certificate_set_ocsp_status_request_file2: corrected documentation
+
+ This corrects the documented return code in gnutls_certificate_set_ocsp_status_request_file2
+ and the applicability of gnutls_ocsp_status_request_is_checked.
+
+ Resolves: #836
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 20 21:04:09 2019 +0200
+
+ tests: added server side OCSP check
+
+ This checks whether gnutls_ocsp_status_request_is_checked() is functional
+ on server-side verification.
+
+ Relates: #829
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 20 20:57:51 2019 +0200
+
+ tests: added server-side verification test
+
+ This tests gnutls_certificate_verify_peers2() operation in server
+ side.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 19 21:26:25 2019 +0200
+
+ gnutls_ocsp_status_request_is_checked: added tests in client side
+
+ This ensures that this function has functional tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 16 15:03:41 2019 +0200
+
+ pkcs11-mock: updated license based on upstream project [ci skip]
+
+ Based on the relicense of the original project:
+ https://github.com/Pkcs11Interop/pkcs11-mock
+
+ Applied in commit: 8751256956e414c1b0a30414831f5083afbf64bf
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Jun 1 16:54:47 2019 +0200
+
+ guile: Add support for Guile 3.0.
+
+ * configure.ac: Add 3.0 to 'GUILE_PKG', as well as the
+ previously-supported versions.
+ * doc/gnutls-guile.texi (Guile Preparations): Update list of supported
+ versions.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Jun 1 16:52:34 2019 +0200
+
+ doc: Run guile with '-q'.
+
+ This makes sure we don't load the user's ~/.guile.
+
+ * doc/Makefile.am (GUILE_FOR_BUILD): Pass '-q'.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 12 15:21:55 2019 +0200
+
+ tlsfuzzer: enable atypical padding check
+
+ The atypical padding check is complementary to the existing
+ GnuTLS 2.12.x interop test.
+
+ This commit also upgrades to the latest version, and adds new TLS1.3
+ tests as well.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 8 18:04:18 2019 +0200
+
+ lib/*: remove unnecessary cast to ssize_t
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 8 18:02:08 2019 +0200
+
+ gnutls_int.h: make DECR_LEN neutral to signedness
+
+ DECR_LEN was previously implemented in a way that it first decrements
+ the given length and then checks whether the result is negative. This
+ requires the caller to properly coerce the length argument to a signed
+ integer, before invoking the macro.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Sep 11 11:24:17 2019 +0200
+
+ .gitlab-ci.yml: bump configure cache version
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 10 13:50:45 2019 +0200
+
+ .gitlab-ci.yml: export guile related envvars for doc-dist.Fedora
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 6 08:36:04 2019 +0200
+
+ tests: check interoperability testing with gnutls 2.12.x and SHA256
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 3 21:51:58 2019 +0200
+
+ _gnutls_epoch_set_keys: do not forbid random padding in TLS1.x CBC ciphersuites
+
+ Since some point in 3.6.x we updated the calculation of maximum record size,
+ however that did not include the possibility of random record padding available
+ for CBC ciphersuites which exceeds the maximum. This commit allows for larger
+ sizes for these ciphersuites to account for random padding as applied by
+ gnutls 2.12.x.
+
+ Resolves: #811
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Jul 20 16:13:02 2019 +0200
+
+ .gitlab-ci.yml: minimal.Fedora.x86_64: Pass '--disable-guile' the 2nd time as well.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Jul 20 16:08:48 2019 +0200
+
+ .gitlab-ci.yml: doc-dist.Fedora: Pass "GUILE", "GUILD", and "guile_snarf" to 'configure'.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Aug 31 16:38:13 2019 +0200
+
+ maint: Include Guile's M4 macros.
+
+ This ensures 'GUILE_PKG' & co. behaves as we want. Previously we had
+ problem in CI when using 'guile.m4' coming from potentially old distro
+ packages, as discussed in issue !1020:
+
+ https://gitlab.com/gnutls/gnutls/merge_requests/1020#note_194443890
+
+ * m4/guile.m4: New file, from Guile's 'stable-2.2' branch,
+ commit 9846178c69445142ef0b9432417453d2d4de6635.
+ * .x-sc_prohibit_test_minus_ao: New file.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Sep 5 11:36:27 2019 +0300
+
+ priority: fix loop which removes systemwide disabled KX algos
+
+ Fix c&p error in KX-removal loop.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sun Sep 1 13:50:35 2019 +0200
+
+ Added initial corpora for rawpk client and server fuzzers.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sun Sep 1 13:49:59 2019 +0200
+
+ Implemented server rawpk fuzzer.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sun Sep 1 13:49:40 2019 +0200
+
+ Implemented client rawpk fuzzer.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 2 16:34:08 2019 +0300
+
+ gnutls-cli-debug: fix early break for no version supported check
+
+ Currently gnutls-cli-debug code hardodes index of tests, after which it
+ will check if any known protocols (SSL 3.0/TLS1.[0123]) are supported by
+ the server. However this number is hardcoded and thus easy to break.
+ This is exactly what happened after adding %ALLOW_SMALL_RECORDS check.
+ Two tests were added in front of tests lists without updating this
+ index.
+
+ So let's make this check robust by adding another test which will return
+ fatal error if no known protocols are supported. While we are at it,
+ also simplify tests loop by removing internal loop completely and
+ controlling opening/closing a socket with a flag.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 3 21:32:47 2019 +0200
+
+ tests: added interoperability test with gnutls 2.12.x
+
+ This enables this test in debian build.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sat Aug 31 16:33:33 2019 +0200
+
+ guile: Update the list of certificate status values.
+
+ * guile/modules/gnutls/build/enums.scm (%certificate-status-enum): Add
+ 'gnutls_certificate_status_t' values that were missing.
+ * guile/src/core.c (scm_gnutls_peer_certificate_status): Add
+ 'MATCH_STATUS' clauses to handle them.
+ * guile/modules/gnutls.in: Export them.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Michael Catanzaro <mcatanzaro@gnome.org>
+Date: Tue Aug 13 14:55:19 2019 -0500
+
+ Fix typo in gnutls_db_set_cache_expiration() docs
+
+ 21600 seconds is six hours.
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@gnome.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Aug 2 07:40:44 2019 +0200
+
+ crypto-api: add gnutls_aead_cipher_{en,de}cryptv2
+
+ This adds an in-place equivalent of gnutls_aead_cipher_encrypt() and
+ gnutls_aead_cipher_decrypt(), that works on data buffers.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 1 18:13:38 2019 +0200
+
+ crypto-api: use giovec_t iterator interface for aead_encryptv
+
+ This replaces the macros AUTH_UPDATE and ENCRYPT used in
+ gnutls_aead_cipher_encryptv() with the iov_iter interface.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 1 17:41:45 2019 +0200
+
+ iov: add iterator interface for giovec_t
+
+ This adds an iterator interface over giovec_t array, extracting a
+ fixed sized block.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 7 15:55:44 2019 +0200
+
+ nettle: prohibit deterministic ECDSA/DSA under FIPS except selftests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 5 15:21:55 2019 +0200
+
+ nettle: enable deterministic ECDSA/DSA during FIPS selftests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jul 29 14:01:11 2019 +0200
+
+ pk: implement deterministic ECDSA/DSA
+
+ This exposes the deterministic ECDSA/DSA functionality through the
+ GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Aug 7 14:37:00 2019 +0200
+
+ privkey_sign_prehashed: remove unused argument
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jul 29 15:10:51 2019 +0200
+
+ privkey_sign_raw_data: remove unnecessary local variable
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jul 29 14:00:30 2019 +0200
+
+ nettle: add functions for deterministic ECDSA/DSA
+
+ This adds functions to perform deterministic ECDSA/DSA, namely
+ _gnutls_{ecdsa,dsa}_compute_k(), which computes the k value according
+ to RFC 6979. The retrieved k value can be given to
+ nettle_{ecdsa,dsa}_sign() through a wrapper random function.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 2 21:57:40 2019 +0200
+
+ read_cpuid_vals: use __get_cpuid_count() only when available
+
+ This makes the functionality available on gcc 4.8.
+
+ Resolves: #812
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 2 22:16:31 2019 +0200
+
+ src/Makefile.am: fix detection of .bak files
+
+ This fixes detection in a way to work in builds outside the
+ source directory.
+
+ Resolves: #810
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 2 21:25:39 2019 +0200
+
+ configure: AS_HELP_STRING cannot print variables; don't try
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Karsten Ohme <k_o_@users.sourceforge.net>
+Date: Tue Jun 18 12:17:14 2019 +0000
+
+ Notes about Ubuntu specific software versions not available.
+
+ Signed-off-by: Karsten Ohme <k_o_@users.sourceforge.net>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Mon Jul 29 17:47:42 2019 +0200
+
+ Ship inih/LICENSE.txt in release tarball
+
+ inih's license terms requires shipping a copy of the license when
+ redistributing the source.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Michael Catanzaro <mcatanzaro@igalia.com>
+Date: Fri Jul 26 11:18:07 2019 -0500
+
+ Improve documentation of gnutls_record_send()
+
+ It's no longer required to retry this function with the same parameters
+ if you want to use gnutls_record_discard_queued().
+
+ Fixes #806
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@igalia.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 26 09:57:29 2019 +0200
+
+ certtool: default to yes on signing certificates for CAs
+
+ When asking the questions for CA certificate generation, default
+ to yes to signing certificates. This is because that's the most
+ common type of CAs generated and defaulting to yes eliminates
+ the need for restart on error.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 25 20:38:14 2019 +0200
+
+ bumped version for 3.6.9
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 22 12:43:50 2019 +0200
+
+ gnutls.h: mark AEAD ciphers as such in gnutls_cipher_algorithm_t description
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 22 10:00:51 2019 +0200
+
+ abi-check: correctly bail-out on errors
+
+ Added suppressions for _MAX enumerator values.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Karsten Ohme <k_o_@users.sourceforge.net>
+Date: Sat Jun 22 00:39:56 2019 +0200
+
+ Support for Generalname registeredID from RFC 5280 in subject alt name
+
+ Added test certificates (cert10.der) with registered ID
+
+ Updated Makefile for inclusion of test certificates
+
+ Updated SAN unknown test certificates (cert5.der)
+
+ Signed-off-by: Karsten Ohme <k_o_@users.sourceforge.net>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 21 10:18:35 2019 +0200
+
+ libgnutls.abignore: added comment linking to syntax
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 21 10:06:22 2019 +0200
+
+ NEWS: updated for upcoming release [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jul 16 14:41:50 2019 +0200
+
+ Fix documented params for gnutls_certificate_retrieve_function3()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 14 22:27:50 2019 +0200
+
+ Fixed alerts returned on TLS1.3 corner cases
+
+ This enables the tls-fuzzer tests 'test-tls13-certificate-verify.py'.
+
+ Resolves: #682
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jul 14 12:17:18 2019 +0300
+
+ nettle/backport: fix xts-backport guarding check
+
+ Check for nettle_xts_encrypt_message() function rather than just
+ xts_encrypt_message(). All functions in nettle are renamed to contain
+ `nettle_` prefix.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jul 11 21:37:08 2019 +0300
+
+ nettle/gost: support building with GOST-enabled Nettle
+
+ Nettle library starts to gain support for GOST algorithms. Support
+ building GnuTLS with GOST-enabled nettle library.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jun 30 08:23:41 2019 +0200
+
+ tests: remove unused destructive/p11-kit-load.sh
+
+ This file is replaced with tests/p11-kit-load.sh and
+ tests/pkcs11/list-tokens.c.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 19 17:21:16 2019 +0200
+
+ pkcs11: ignore login error when traversing tokens
+
+ If a token is a general access device, it is expected that login
+ attempt to that token returns error:
+ https://github.com/p11-glue/p11-kit/blob/master/trust/module.c#L852
+
+ On the other hand, _pkcs11_traverse_tokens treats the error as fatal
+ and stops iteration. This behavior prevents object search without
+ token specifier if such tokens are registered in the system.
+
+ Reported by Stanislav Zidek in
+ https://bugzilla.redhat.com/show_bug.cgi?id=1705478
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jul 8 16:54:56 2019 +0200
+
+ ext/session_ticket: avoid calling memcpy on overlapping memory areas
+
+ In _gnutls_encrypt_session_ticket, ticket.encrypted_state is allocated
+ from ticket_data->data, thus those memory areas may overlap. Using
+ memcpy here leads to undefined behavior.
+
+ Spotted by valgrind run on ppc64le.
+
+ ==95231== Source and destination overlap in memcpy(0x47ce3a2, 0x47ce3a2, 160)
+ ==95231== at 0x408A840: memcpy (vg_replace_strmem.c:1023)
+ ==95231== by 0x424EE9F: pack_ticket (session_ticket.c:139)
+ ==95231== by 0x424FA4F: _gnutls_encrypt_session_ticket (session_ticket.c:335)
+ ==95231== by 0x4199E3B: generate_session_ticket (session_ticket.c:249)
+ ==95231== by 0x419A333: _gnutls13_send_session_ticket (session_ticket.c:307)
+ ==95231== by 0x40F8817: _gnutls13_handshake_server (handshake-tls13.c:511)
+ ==95231== by 0x4110DEB: handshake_server (handshake.c:3331)
+ ==95231== by 0x410C70B: gnutls_handshake (handshake.c:2727)
+ ==95231== by 0x10009EBF: retry_handshake (serv.c:1306)
+ ==95231== by 0x1000AB67: tcp_server (serv.c:1500)
+ ==95231== by 0x10009E5B: main (serv.c:1297)
+ ==95231==
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 9 10:06:47 2019 +0200
+
+ lib: mark infinite loops explicitly
+
+ There were few infinite loop constructions which were checking
+ for an always true condition. Make sure that this construction
+ is marked explicitly as while(1) to assist static analysers, or
+ reviewers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 9 09:56:24 2019 +0200
+
+ tests: improve coverage of CRQ related functions
+
+ That adds sanity check of crq-related functions that were not included
+ in the testsuite at all.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 8 19:33:50 2019 +0200
+
+ encode_ber_digest_info: added sanity check
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15665
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 3 21:04:23 2019 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 13 09:13:22 2019 +0200
+
+ testcompat-openssl: added interop test with DTLS 1.2
+
+ This tests AES-CBC ciphersuites in isolation, as they are
+ prioritized lower than AES-GCM. We want to test them explicitly
+ because they have different behavior under EtM.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 7 23:22:52 2019 +0200
+
+ tests: added sanity check for rfc7633 behavior
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 7 16:51:30 2019 +0200
+
+ tests: status-request-missing: renamed to rfc7633-missing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 7 16:39:53 2019 +0200
+
+ status-request-ext: run under all TLS versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 7 16:35:11 2019 +0200
+
+ tests: status-request: cleanup
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 7 16:34:21 2019 +0200
+
+ tests: status-request-missing: run for all TLS versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 29 21:02:11 2019 +0200
+
+ gnutls-cli-debug: test whether RSA key exchange is supported
+
+ Resolves: #449
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 28 21:08:32 2019 +0200
+
+ gnutls_session_get_desc: avoid printing a NULL value
+
+ When gnutls_session_set_premaster() is used (under openconnect),
+ it is possible that gnutls_session_get_desc will print a string like
+ this: "(DTLS1.2)-(ECDHE-(null))-(AES-256-GCM)"
+
+ With this change we ensure that we do not print null values.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 21 15:49:26 2019 +0200
+
+ nettle/rnd-fips: add FIPS 140-2 continuous RNG test
+
+ This adds a continuous random number generator test as defined in FIPS
+ 140-2 4.9.2, by iteratively fetching fixed sized block from the system
+ and comparing consecutive blocks.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 16:54:30 2019 +0300
+
+ lib: document gnutls_hmac_fast vs nonce relationship
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 00:27:01 2019 +0300
+
+ tests/gnutls_hmac_fast: run test for AES-UMAC-96/-128
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 25 00:12:29 2019 +0300
+
+ nettle: return true for gnutls_mac_exists(AES-CMAC*)
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 16:28:58 2019 +0300
+
+ NEWS: add an entry for AES-GMAC algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 00:27:01 2019 +0300
+
+ tests/gnutls_hmac_fast: run test for AES-GMAC-128/-192/-256
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 16:19:15 2019 +0300
+
+ nettle/mac: fail mac calculation if nonce is required but not provided
+
+ Fail _wrap_nettle_mac_set_nonce() and _wrap_nettle_mac_fast() if MAC
+ requires nonce, but it was not supplied.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 28 00:27:04 2019 +0300
+
+ nettle/mac: in mac_fast call set_nonce after set_key
+
+ Calling set_nonce before set_key is plain incorrect. For GMAC key is not
+ initialized. For UMAC set_key will reset nonce to empty.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jun 24 20:29:31 2019 +0300
+
+ lib: add support for AES-GMAC
+
+ Add support for computing AES-GMAC using MAC API, as requested by Samba
+ for SMB3 support.
+
+ Resolves: #781
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 28 14:59:19 2019 +0200
+
+ tests: gnutls_x509_crt_list_import: verify that return code is as documented
+
+ That checks whether the return code of gnutls_x509_crt_list_import()
+ contains the number of loaded certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 28 08:20:31 2019 +0200
+
+ gnutls_x509_crt_list_import2: updated doc to reflect the actual return value options
+
+ Resolves: #794
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 29 15:28:28 2019 +0200
+
+ Align _gnutls_x86_cpuid_s as OPENSSL_ia32cap_P would be
+
+ We were not setting the third array member correctly, though
+ this didn't have any impact to previous implementations as they
+ did not rely on it. This also moves away from the custom implementation
+ of cpuid (which was limited), and we now rely on the compiler's
+ version.
+
+ This effectively enables support for SHA_NI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 26 14:43:19 2019 +0200
+
+ Updated asm files to latest version under cryptogams license
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jun 26 14:24:42 2019 +0300
+
+ NEWS: document gnutls_hash/hmac_copy addition
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 26 11:27:27 2019 +0200
+
+ gnutls_hash/hmac_copy: check its usability in all cases
+
+ During the test suite run we require that all supported
+ MAC and hash algorithms implement the copy function.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 26 11:20:25 2019 +0200
+
+ accelerated ciphers: implement hmac and hash copy
+
+ This implements the new API to all internal implementations.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jun 26 11:00:39 2019 +0300
+
+ lib: add support for gnutls_hash_copy()
+
+ Add gnutls_hash_copy() function for copying message digest context.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jun 24 17:42:10 2019 +0300
+
+ crypto-selftests: add test for gnutls_hmac_copy()
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jun 24 17:38:56 2019 +0300
+
+ api: add gnutls_hmac_copy() function
+
+ Add gnutls_hmac_copy() API to duplicate MAC handler state, which is
+ necessary for SMB3 support.
+
+ Resolves: #787
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 30 01:34:14 2016 +0300
+
+ Add MAC copying support to nettle backend
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 30 01:32:30 2016 +0300
+
+ Add MAC api to support copying of instances
+
+ GOST ciphersuites requires continuously computing MAC of all the
+ previously sent or received data. The easies way to support that is to
+ add support for copy function, that creates MAC instance with the same
+ internal state.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 29 10:36:24 2019 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 4 16:25:37 2019 +0200
+
+ config: added ability to override and mark algorithms as disabled
+
+ This allows the system administrator or the distributor to use
+ the gnutls configuration file to mark hashes, signature algorithms,
+ TLS versions, curves, groups, ciphers KX, and MAC algorithms as
+ insecure (the last four only in the context of a TLS session).
+ It also allows to set a minimum profile which the applications
+ cannot fall below.
+
+ The options intentionally do not allow marking algorithms as
+ secure so that the configuration file cannot be used as an attack
+ vector. This change also makes sure that unsupported and disabled protocols
+ during compile time (e.g., SSL3.0), do not get listed by gnutls-cli.
+
+ The configuration file feature can be disabled at compile time
+ with an empty --with-system-priority-file.
+
+ This patch it introduces the function gnutls_get_system_config_file()
+ allowing applications to check whether a configuration file
+ was used.
+
+ Resolves: #587
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 3 11:59:37 2019 +0200
+
+ Use inih to parse configuration file
+
+ This introduces the inih copylib, and makes our configuration
+ file parsing more flexible.
+
+ Relates: #587
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 19 21:38:32 2019 +0200
+
+ Marked the crypto backend registration APIs as deprecated
+
+ This is to warn for a future conversion of these APIs to a no-op.
+
+ Resolves: #789
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 19 14:20:26 2019 +0000
+
+ gnutls-cli-debug.sh: sanity check of %ALLOW_SMALL_RECORDS test
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 7 11:39:53 2019 +0200
+
+ tlsfuzzer: test both with and without %ALLOW_SMALL_RECORDS
+
+ The option changes the behavior of the server, it would make sense to
+ check both with and without %ALLOW_SMALL_RECORDS.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 7 15:10:36 2019 +0200
+
+ tlsfuzzer: use fixed HTTP response for record_size_limit tests
+
+ Previously those tests assumed varying sizes of connection information
+ gnutls-serv sends. This is too brittle and if the default algorithm
+ has changed the tests need to be updated.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 7 14:54:58 2019 +0200
+
+ gnutls-serv: add --httpdata option to respond with fixed sized data
+
+ By default, the gnutls-server --http responds with the connection
+ information. While this is useful for manual testing, fixed content
+ would be more desirable for automated testing.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 7 11:37:37 2019 +0200
+
+ gnutls-cli-debug: check if %ALLOW_SMALL_RECORDS is required
+
+ This adds a new test against the server to check if
+ %ALLOW_SMALL_RECORDS is required to continue communicating with the
+ server. The test is in two parts: one to check if the server accepts
+ records with the default size (512 bytes) and the other is to check if
+ %ALLOW_SMALL_RECORDS helps if the previuos test fails.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 19 14:36:31 2019 +0200
+
+ gnutls-serv: add --recordsize option
+
+ This adds a means to set maximum record size to receive. If the size
+ is less than our default (< 512), --priority with %ALLOW_SMALL_RECORDS
+ also needs to be specified.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Karsten Ohme <k_o_@users.sourceforge.net>
+Date: Wed Jun 19 07:51:16 2019 +0200
+
+ Corrected call for updating ABI files
+
+ Signed-off-by: Karsten Ohme <k_o_@users.sourceforge.net>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 16 14:08:54 2019 +0200
+
+ doc: updated p11-kit links [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Jun 15 11:38:46 2019 +0200
+
+ CONTRIBUTING.md: Fix syntax error [ci skip]
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Jun 12 11:37:39 2019 +0200
+
+ guile: Add support for post-handshake reauthentication.
+
+ * guile/modules/gnutls/build/enums.scm (%connection-flag-enum): New
+ variable.
+ (%gnutls-enums): Add it.
+ * guile/modules/gnutls.in: Export 'reauthenticate',
+ 'connection-flag->string', and all the 'connection-flag/' bindings.
+ * guile/src/core.c (scm_gnutls_make_session): Add rest arguments FLAGS
+ and honor it.
+ (scm_gnutls_reauthenticate): New function.
+ * guile/tests/reauth.scm: New file.
+ * guile/Makefile.am (TESTS): Add it.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Jun 12 11:32:19 2019 +0200
+
+ guile: Loop or poll upon GNUTLS_E_AGAIN and GNUTLS_E_INTERRUPTED.
+
+ * guile/src/core.c (do_fill_port) [USING_GUILE_BEFORE_2_2]: Loop while
+ 'gnutls_record_recv' returns GNUTLS_E_AGAIN or GNUTLS_E_INTERRUPTED.
+ (read_from_session_record_port) [!USING_GUILE_BEFORE_2_2]: Likewise, and
+ return -1 if SCM_GNUTLS_SESSION_TRANSPORT_IS_FD and we got GNUTLS_E_AGAIN.
+ (session_record_port_fd) [!USING_GUILE_BEFORE_2_2]: New function.
+ (scm_init_gnutls_session_record_port_type) [!USING_GUILE_BEFORE_2_2]:
+ Call 'scm_set_port_read_wait_fd'.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Jun 7 11:06:18 2019 +0200
+
+ guile: Add bindings for 'gnutls_error_is_fatal'.
+
+ * guile/src/errors.c (scm_gnutls_fatal_error_p): New function.
+ * guile/modules/gnutls.in: Export 'fatal-error?'.
+ * guile/tests/errors.scm: test 'fatal-error?'.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Jun 7 10:34:42 2019 +0200
+
+ guile: Update list of error values.
+
+ * guile/modules/gnutls/build/enums.scm (%error-enum): Update list of
+ error constants.
+ * guile/modules/gnutls.in (gnutls): Adjust exports accordingly.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 12 14:02:05 2019 +0200
+
+ fips: run selftests over overridden AES-CBC algorithm
+
+ Previously, we only tested nettle's AES-CBC in
+ _gnutls_fips_perform_self_checks1(), which is called before the
+ implementation is overridden. This adds an AES-CBC self-test in
+ _gnutls_fips_perform_self_checks2() so it can test the actual
+ implementation.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Jun 6 18:30:28 2019 +0200
+
+ guile: Deprecate OpenPGP bindings.
+
+ * guile/modules/gnutls.in (define-deprecated): New macro.
+ Use it for all the *openpgp* bindings.
+ * guile/src/core.c: Rename *openpgp* bindings with a '%' prefix.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 10 22:12:09 2019 +0200
+
+ gnutls_privkey_sign_hash2: accept the GNUTLS_PRIVKEY_SIGN_FLAG_TLS1_RSA flag
+
+ Previously this flag was ignored, although documented not to.
+ This patch also enables the tests sign-verify-newapi and sign-verify-data-newapi
+ which were supposed to test this interface, but were never enabled.
+
+ This was caught by Andreas Metzler.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 30 13:49:22 2019 +0200
+
+ tests: removed debugging output from GETPORT
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 8 19:19:03 2019 +0200
+
+ .gitlab-ci.yml: include top log files in all build failures [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Jun 7 10:16:02 2019 +0200
+
+ guile: Remove unbounded uses of 'alloca'.
+
+ * guile/src/core.c (ALLOCA_MAX_SIZE, FAST_ALLOC): New macros.
+ (set_certificate_file):
+ (scm_gnutls_set_certificate_credentials_x509_key_files_x)
+ (scm_gnutls_set_srp_server_credentials_files_x)
+ (scm_gnutls_set_srp_client_credentials_x)
+ (scm_gnutls_srp_base64_encode, scm_gnutls_srp_base64_decode)
+ (scm_gnutls_set_psk_server_credentials_file_x)
+ (scm_gnutls_pkcs8_import_x509_private_key)
+ (scm_gnutls_x509_certificate_matches_hostname_p)
+ (scm_gnutls_import_openpgp_private_key): Use 'FAST_ALLOC' instead of
+ 'alloca'.
+ * guile/src/utils.c: Remove unneeded <alloca.h> include.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Jun 7 10:11:12 2019 +0200
+
+ guile: Always provide 'scm_gc_malloc_pointerless'.
+
+ * guile/src/core.c (scm_gc_malloc_pointerless)
+ [!HAVE_SCM_GC_MALLOC_POINTERLESS]: New macro.
+ (make_session_record_port): Remove #ifdef HAVE_SCM_GC_MALLOC_POINTERLESS.
+
+ Signed-off-by: Ludovic Courtès <ludo@gnu.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 5 16:48:39 2019 +0200
+
+ tls13/key_update: ignore multiple key updates instead of error
+
+ This fixes the multiple KeyUpdate messages handling in commit
+ 65e2aa80d114d4bef095d129c2eda475e473244a, where illegal_parameter is
+ sent even if the limit doesn't exceed.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jun 3 21:53:05 2019 +0200
+
+ Prefix gcc attributes with 'attr_'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 3 13:26:18 2019 +0200
+
+ gnutls_prf_early: corrected Since version [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Jun 2 12:42:16 2019 +0200
+
+ Fix warn_unused_result for clang < 4
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 1 16:18:50 2019 +0200
+
+ .gitlab-ci.yml: switched fedora to latest version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 30 14:42:52 2019 +0200
+
+ Makefile.am: do not create files when it shouldn't
+
+ If a pdf or html file is not distributed, previously `make dist`
+ would create a file called '*.pdf' which did not make sense. This
+ addresses this problem.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 25 21:17:27 2019 +0200
+
+ Do not regenerate autogen files if --enable-local-libopts is given
+
+ This addresses issue on installed systems which have autogen but
+ use --enable-local-libopts. In these systems if the installed autogen
+ would not match the local libopts library version compilation would
+ fail because the auto-generated files depend on the corresponding to
+ autogen version libopts internals.
+
+ Resolves: #772
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 27 15:16:52 2019 +0200
+
+ Remove malloc from gnutls_srp_set_server_fake_salt_seed()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon May 20 12:49:51 2019 +0200
+
+ gnutls_session_set_data(): Check for allocation error
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon May 20 12:46:54 2019 +0200
+
+ _gnutls_set_[str]datum: Cleanup, add function attributes
+
+ _gnutls_set_datum(): Do not change output 'dat' on error
+ _gnutls_set_strdatum: Likewise, cleanup code
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue May 21 11:17:39 2019 +0200
+
+ Add nonnull, nonnull_all and warn_unusd_result attributes in lib/gnutls_int.h
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 28 07:05:46 2019 +0200
+
+ doc: do not distribute pdf files
+
+ It compicates the 'make dist' phase and does not add much
+ value as the files are available from the web site.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 28 06:45:56 2019 +0200
+
+ released 3.6.8
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 27 22:34:42 2019 +0200
+
+ minor updates in the latex version of the manual [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 27 21:29:44 2019 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 26 21:35:19 2019 +0200
+
+ RELEASES.md: document the releases policy [ci skip]
+
+ This adds a file to document the policy on releases based on
+ the discussions taken place in the last face to face meeting.
+
+ https://gitlab.com/gnutls/gnutls/wikis/face2face-meeting-fosdem2019
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 24 12:59:13 2019 +0200
+
+ .gitlab-ci.yml: ensure that the LIBS variable is empty after a configure run
+
+ We do not use this variable as it is global and applies to all of
+ tests, applications and library, and when it is set it is usually due to
+ bugs in configure.ac.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 21:20:49 2019 +0200
+
+ Do not add libraries in the global LIBS in configure
+
+ This ensures that libraries are linked with the programs
+ requiring them.
+
+ Resolves: #735
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 11:41:45 2019 +0200
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 24 05:46:18 2019 +0200
+
+ tests: prf-early fixes the global version
+
+ This allows having fixed data in the hello message involved.
+ That required exposing the variable holding the global gnutls
+ version number for testing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 21:32:58 2019 +0200
+
+ certtool: corrected typo in manual [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 21:11:58 2019 +0200
+
+ Revert "bumped version"
+
+ In order to make the CI functional again. The version number update
+ seems to conflict with tests/tls13/prf-early.sh
+
+ This reverts commit d34d93b8713cf10235ce7016fd69b6932b0752c0.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 15:29:23 2019 +0200
+
+ tests: prf-early.sh: use the static flag of datefudge
+
+ This eliminates unexpected failures of the test in slower systems.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 15:41:19 2019 +0200
+
+ tlsfuzzer: reverted accidental move to incorrect version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 11:44:12 2019 +0200
+
+ NEWS: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 23 11:41:45 2019 +0200
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed May 22 15:08:45 2019 -0400
+
+ Pass down Q for FFDHE in al pre TLS1.3 as well
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Tue May 21 09:40:01 2019 -0400
+
+ Check Q for FFDHE primes in prime-check
+
+ These are mersenne primes so q = (p - 1) / 2
+ We check that p = (q * 2) + 1
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Mon May 20 17:13:12 2019 -0400
+
+ Always pass in and check Q in TLS 1.3
+
+ In FIPS mode do an extra check that we did have Q, but it is always
+ passed into the tls13 derive function from the callers.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri May 17 14:05:37 2019 -0400
+
+ Add plumbing to handle Q parameter in DH exchanges
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Tue May 14 18:38:33 2019 -0400
+
+ Add test to ensure ECDH exchange behaves correctly
+
+ This test ensures that public keys are properly tested for validity
+ before a ECDH exchange is computed.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri May 10 14:49:05 2019 -0400
+
+ Add test to ensure DH exchange behaves correctly
+
+ This test ensures that public keys are properly tested for validity
+ before a DH exchange is computed.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri May 3 12:32:56 2019 -0400
+
+ Add Full Public Key Check for DH
+
+ This is for NIST SP800-56A requirements and FIPS CAVS testing.
+ GnuTLS never passes in a non-empty Q for normal operations, but tests will
+ and if Q is passed in it needs to be checked.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed May 1 10:57:51 2019 -0400
+
+ Fix Copy&Paste error
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 22 10:39:27 2019 +0200
+
+ tls13/key_update: increase handling limit from 1 to 8
+
+ The limit was too small when testing the capability of handling
+ multiple KeyUpdate messages with tlsfuzzer.
+
+ This requires a change in the rate limit logic, as previously it
+ doesn't count the KeyUpdate messages despite the name of
+ KEY_UPDATES_PER_SEC.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 22 11:51:57 2019 +0200
+
+ tlsfuzzer: use %ALLOW_SMALL_RECORDS for testing
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed May 22 11:16:03 2019 +0200
+
+ priority: add new option to allow small records (>= 64)
+
+ There is a mismatch in the lower limit of record sizes in RFC
+ 8449 (64) and our default (512). If the server advertises a smaller
+ limit than our default, the client has no way to keep communicating
+ with the server.
+
+ This patch adds a new priority string option %ALLOW_SMALL_RECORDS to
+ set the limit to 64.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue May 21 08:32:21 2019 +0200
+
+ record_add_to_buffers: check if there is an incomplete handshake header
+
+ The function checks if a Handshake message is interleaved with an
+ Application Data, but the check was insuffient because it assumed that
+ a complete header is received in the buffer.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri May 17 11:51:00 2019 +0200
+
+ algorithms: eliminate the FFDHE alert desc requirement
+
+ This implements the errata for RFC 7919 eliminating the requirement to
+ reply with an insufficient_security alert when we have negotiated an
+ FFDHE group, but cannot find common ciphersuite:
+ https://www.rfc-editor.org/errata/eid4908
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Aleksei Nikiforov <darktemplar@basealt.ru>
+Date: Fri May 17 14:44:06 2019 +0300
+
+ Mark second argument of function gnutls_x509_crt_equals2 as const
+
+ This will allow using this function with certificates
+ returned by function gnutls_certificate_get_peers
+ without casts dropping const qualifier or
+ making temporary copies out of retrieved data.
+
+ Signed-off-by: Aleksei Nikiforov <darktemplar@basealt.ru>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 21 08:22:08 2019 +0200
+
+ tests: verify functionality of GNUTLS_VERIFY_DISABLE_CA_SIGN flag
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Kenneth J. Miller <ken@miller.ec>
+Date: Mon Apr 15 17:56:13 2019 +0200
+
+ pubkey: remove deprecated TLS1_RSA flag check
+
+ The gnutls_certificate_verify_flags comparisons against
+ OLD_PUBKEY_VERIFY_FLAG_TLS1_RSA conflicts with
+ GNUTLS_VERIFY_DISABLE_CA_SIGN and no longer seems to be used in calls to
+ both gnutls_pubkey_verify_data2 and gnutls_pubkey_verify_hash2 as it
+ seems to have been fully replaced by GNUTLS_VERIFY_USE_TLS1_RSA.
+
+ Resolves: #754
+
+ Signed-off-by: Kenneth J. Miller <ken@miller.ec>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 21 05:54:35 2019 +0200
+
+ x509.h: corrected typo in newly introduced definition
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 20 21:34:30 2019 +0200
+
+ x509.h: removed stray '%'
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 20 16:13:12 2019 +0200
+
+ certtool: CA certificates will contain the digital signature key usage flag
+
+ This change ensures that all certificates will contain the digital
+ signature key usage flag if that's specified in the template.
+
+ Resolves: #767
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 20 14:40:31 2019 +0200
+
+ Added profile to correspond to the future security parameter
+
+ It seems that the FUTURE security level parameter was added
+ without a corresponding verification profile. This patch address
+ the issue by introducing it.
+
+ Resolves: #770
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 20 15:47:41 2019 +0200
+
+ tests: added unit tests of utc and generalTime convertor
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 29 19:03:55 2019 +0200
+
+ server auth: disable TLS 1.3 if no signature algorithm is usable
+
+ This is a server side counterpart of
+ 005a4d04145707daad9588acedfdb5f6cd97c80c.
+
+ Instead of signalling an error when no algorithm is usable in TLS 1.3,
+ it downgrades the session to TLS 1.2 with a warning.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 18 21:13:10 2019 +0200
+
+ algorithms/secparams.c: fixed indentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 20 14:34:56 2019 +0200
+
+ gnutls-serv: GERR macro will output in stderr
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon May 20 11:10:11 2019 +0200
+
+ Apply STD3 ASCII rules in gnutls_idna_map()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 10 11:42:46 2019 +0200
+
+ Fix _Thread_local for C99 installed in C11 environments
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 10 11:27:32 2019 +0200
+
+ Remove redundant typedef of Tspi_Context_GetTpmObject_func()
+
+ Gcc 4.4 errors out on this.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed May 15 09:47:24 2019 +0200
+
+ Update gnulib for gcc-9 manywarnings
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 14 21:39:46 2019 +0200
+
+ Check all memory allocation in examples and certtool
+
+ Resolves: #739
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 25 17:08:43 2019 +0200
+
+ ext/record_size_limit: distinguish sending and receiving limits
+
+ The previous behavior was that both sending and receiving limits are
+ negotiated to be the same value. It was problematic when:
+
+ - client sends a record_size_limit with a large value in CH
+ - server sends a record_size_limit with a smaller value in EE
+ - client updates the limit for both sending and receiving, upon
+ receiving EE
+ - server sends a Certificate message larger than the limit
+
+ With this patch, each peer maintains the sending / receiving limits
+ separately so not to confuse with the contradicting settings.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue May 7 14:49:05 2019 +0300
+
+ lib/nettle: fix carry flag in Streebog code
+
+ Fix carry flag being calculated incorrectly in Streebog code.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 10 13:31:23 2019 +0200
+
+ Fix endless looping GETPORT in tests/scripts/common.sh
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 10 06:30:12 2019 +0200
+
+ _gnutls_srp_entry_free: follow consistent behavior in freeing data
+
+ _gnutls_srp_entry_free would previously not free any parameters that
+ were known to gnutls to account for documented behavior of
+ gnutls_srp_set_server_credentials_function(). This was not updated
+ when the newly added 8192 parameter was added to the library.
+
+ This introduces a safety check for generator parameters, even though
+ in practice they are the same pointer.
+
+ Resolves: #761
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 8 22:08:18 2019 +0200
+
+ dane.h: added multiple inclusion header guard
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 8 21:52:54 2019 +0200
+
+ tools: suppress ctime() error from static analysers
+
+ This function is not thread safe and can be easily misused
+ even in single threaded scenarios (one such minor bug fixed).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 8 22:05:10 2019 +0200
+
+ accelerated: added header guards
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 11:11:23 2019 +0200
+
+ Add or clean header guards in lib/includes/gnutls/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed May 1 20:33:28 2019 +0200
+
+ Add or clean header guards in lib/nettle
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:22:59 2019 +0200
+
+ Add or clean header guards in tests/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:19:01 2019 +0200
+
+ Add or clean header guards in src/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:11:13 2019 +0200
+
+ Add or clean header guards in lib/x509/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:08:27 2019 +0200
+
+ Add or clean header guards in lib/tls13/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:05:32 2019 +0200
+
+ Add or clean header guards in lib/extras/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 12:03:07 2019 +0200
+
+ Add or clean header guards in lib/ext/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Apr 28 11:55:37 2019 +0200
+
+ Add or clean header guards in lib/auth/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Mar 14 21:21:50 2019 +0100
+
+ Add or clean header guards in lib/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Apr 24 21:21:12 2019 +0200
+
+ Add 'Header guards' section in CONTRIBUTING.md
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daniel Schaefer <git@danielschaefer.me>
+Date: Sun May 5 14:35:02 2019 +0200
+
+ guile: Properly format guile configure options
+
+ Without the square brackets autoconf turns hyphens into underscores,
+ which is not what we want or what the help says.
+
+ Signed-off-by: Daniel Schaefer <git@danielschaefer.me>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 3 19:10:03 2019 +0200
+
+ gnutls_sign_list: document the non-thread-safeness
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Apr 30 14:42:51 2019 +0200
+
+ crypto: add private API to retrieve internal IV
+
+ For FIPS validation purposes, this adds a new function
+ _gnutls_cipher_get_iv() that exposes internal IV after encryption and
+ decryption. The function is not generally useful because the IV value
+ can be easily calculated from the initial IV and the subsequent
+ ciphertext but for FIPS validation purposes.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 29 13:15:33 2019 +0200
+
+ abi-check: supply --hd2 to abi-check-latest target
+
+ To suppress changes in internal structures.
+ Suggested by Nikos Mavrogiannopoulos.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 20 18:46:23 2019 +0200
+
+ certtool: refuse to accept an incompatible key type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 15 14:32:55 2019 +0200
+
+ certtool: generate RSA-PSS certificates from RSA keys
+
+ When generating certificates it was not possible to generate
+ an RSA-PSS certificate from an RSA key (common scenario). This
+ fixes the certificate generation to include such a method.
+
+ Ironically there was a test for this scenario but the test
+ was limited to checking that the combination of certtool parameters
+ succeeded; modified the test to check the textual expression of
+ the certificate for the RSA-PSS indicators.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 19 22:04:24 2019 +0200
+
+ tls13/session_ticket: use the same ticket_age_add regardless of endianness
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 19 16:59:31 2019 +0200
+
+ tls13/session_ticket: avoid UB regarding 64-bit time encoding
+
+ On 32-bit platform, struct timespec.tv_sec can be signed 32-bit and
+ thus right shifting 32 could be an undefined behavior.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Apr 19 08:12:56 2019 +0200
+
+ tests: make datefudge check robuster
+
+ When checking datefudge availability under cross-compiling environment
+ with a binfmt wrapper, it is not sufficient to check against the host
+ executable. This instead uses a test executable compiled for the
+ target architecture.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 14:35:32 2019 +0200
+
+ serv, cli: add --keymatexport option
+
+ This adds --keymatexport and --keymatexportsize options to both
+ gnutls-serv and gnutls-cli. Those would be useful for testing
+ interoperability with other implementations.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 12:11:00 2019 +0200
+
+ prf: add function to retrieve early keying material
+
+ This adds a new function gnutls_prf_early, which shall be called in a
+ handshake hook waiting for GNUTLS_HANDSHAKE_CLIENT_HELLO. The test
+ needs to be run in a datefudge wrapper as the early secrets depend on
+ the current time (through PSK).
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 12:07:00 2019 +0200
+
+ handshake: generate early exporter secret
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 12:00:46 2019 +0200
+
+ handshake: move early secrets calculation to pre_shared_key
+
+ TLS 1.3 Early Secret and the derived keys are calculated upon a PSK
+ being selected, thus the code fits better in ext/pre_shared_key.c.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 12:10:00 2019 +0200
+
+ tests/tls13/prf: check if the exported material matches on server
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 11 11:23:26 2019 +0200
+
+ prf: centrally define "exporter" label in handshake.h
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Thu Apr 18 18:43:30 2019 +0200
+
+ doc: Add documentation for GNUTLS_CERT_IGNORE
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Apr 16 14:27:10 2019 +0200
+
+ p11tool: copy vendor query attributes when listing privkeys
+
+ When listing private keys on a specified token, "pin-value" is
+ ignored and the tool looks for GNUTLS_PIN, because it internally
+ strips out vendor query attributes from the original URL.
+
+ This also replaces the global uses of GNUTLS_PIN envvar in
+ testpkcs11.sh to check the case where the envvar is not in effect.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 7 13:22:21 2019 +0200
+
+ abi-check: simplify ABI comparison using libabigail tools
+
+ These have output ABI format compatibility and that means we can
+ take snapshots to test ABI against. We also hard-code explicitly
+ the SONAME version to ensure no accidental SONAME bumps happen.
+
+ This patch also moves symbols.last in the devel/ subdirectory
+ and no internal files are shipped.
+
+ Relates: #292
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 7 18:29:02 2019 +0200
+
+ .gitignore: ignore tests/libpkcs11mock2.la
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 7 14:30:30 2019 +0200
+
+ gnutls.h: re-define GNUTLS_CRT_RAWPK
+
+ This was available before 3.6.4, and was incorrectly removed.
+ It was found using libabigail tools.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Bernhard M. Wiedemann <bwiedemann@suse.de>
+Date: Sun Apr 14 16:53:52 2019 +0200
+
+ Extend test cert to 2049-05-27
+
+ instead of expiring in 2024-02-29
+ This update did not trigger y2038 bugs on 32-bit systems.
+
+ Without this patch, one test fails after 2024:
+ doit:124: rsa pss key: gnutls_x509_crt_verify_data2 |
+ FAIL x509sign-verify (exit status: 1)
+
+ Signed-off-by: Bernhard M. Wiedemann <bwiedemann@suse.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Apr 14 15:25:31 2019 +0000
+
+ Fix link error with gcc-9
+
+ Use LDADD instead of LDFLAGS to link test cipher-openssl-compat against
+ libcrypto. This fixes a build error with gcc9 which passes the linker
+ option --as-needed by default.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 14 16:15:23 2019 +0200
+
+ doc: mark TLS1.2 functions as such [ci skip]
+
+ gnutls_cipher_suite_get_name and gnutls_session_get_master_secret
+ are marked as TLS1.2 or earlier-only as they cannot be used with
+ TLS 1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 13 08:37:50 2019 +0200
+
+ gnutlsxx.h: removed fixme comments [ci skip]
+
+ They served no purpose.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 13 08:33:57 2019 +0200
+
+ gnutls-cli: renamed global variable name
+
+ That is because the same variable name is used by local
+ variables as well.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Apr 11 09:46:21 2019 +0200
+
+ Fix WIN32 custom push/pull functions
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+ Reported-by: J. Ali Harlow (@j_ali on Gitlab.com)
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Apr 9 18:20:15 2019 +0200
+
+ tests: fix race condition in tls13/post-handshake-with-cert-pkcs11
+
+ The test had a strange setup of server/client processes: the server
+ runs in a child process and the client runs in a parent process. The
+ intention behind this was to detect softhsm availability in the parent
+ process and exit with 77 if missing. However, there was a potential
+ race when the server exits and proceeds to the next call of start().
+
+ This fixes the process setup and moves the softhsm detection at the
+ program startup.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Apr 9 19:01:46 2019 +0300
+
+ build: rename guile variables to match upstream names
+
+ Reduce confusion between the upstream terms and the gnutls terms.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Wed Apr 3 18:42:26 2019 +0300
+
+ build: allow override guile system location
+
+ guile has three settings acquired from system:
+ * GUILE_SITE
+ * GUILE_SITE_CCACHE
+ * GUILE_EXTENSION
+
+ The <guile-2.2 m4 macro exposed only GUILE_SITE while build tried to guess the
+ other variables based on the $libdir of the gnutls which may be different.
+
+ The >=guile-2.2 m4 macro provides all settings for build to use as default,
+ while allowing to override each.
+
+ Resolves: #748
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Marius Bakke <mbakke@fastmail.com>
+Date: Tue Apr 9 14:17:09 2019 +0200
+
+ Makefile.am: Don't assume autoopts-config returns a single dash.
+
+ On distributions such as Nix or Guix, `autoopts-config libsrc` may
+ return something along the lines of
+ "/gnu/store/...-autogen-5.18.16/share/autogen/libopts-42.1.17.tar.gz".
+
+ * Makefile.am (libopts-check): Print only the last field from
+ autoopts-config output.
+
+ Signed-off-by: Marius Bakke <mbakke@fastmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Apr 9 12:19:00 2019 +0200
+
+ Pass CI commit check if branches are 'even'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Apr 8 20:34:24 2019 +0300
+
+ tests: cert-tests: crl: cleanup files
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Apr 9 07:59:53 2019 +0300
+
+ ci: refresh the cache due to failures in debian
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 7 13:03:20 2019 +0200
+
+ CONTRIBUTING.md: document unit testing method of internal functions [ci skip]
+
+ Resolves: #749
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 4 16:51:28 2019 +0200
+
+ tests: add post-handshake auth test using PKCS#11 token
+
+ This adds a test that exercise the client's auth rejection logic,
+ using the RSA-PSS disabled PKCS #11 token.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 4 16:40:11 2019 +0200
+
+ tests: add mock PKCS#11 module disabling RSA-PSS
+
+ This adds libpkcs11mock2.so, which wraps SoftHSM but filters out the
+ use of the CKM_RSA_PKCS_PSS mechanism. That way we can simulate the
+ situation where the certificate is RSA while the private key cannot be
+ used for RSA-PSS.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 6 08:34:43 2019 +0200
+
+ nettle: include config.h before checking for definitions
+
+ This makes sure that we don't include the internal backport
+ if compiled with a version of nettle that includes that code.
+ We also exclude nettle/backport from the static analyzer's list
+ as it contains files outside our control (from nettle project).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Maciej S. Szmigiero <mail@maciej.szmigiero.name>
+Date: Thu Mar 28 23:04:13 2019 +0100
+
+ gnutls_memset(): calling explicit_bzero() is enough to zero-fill a buffer
+
+ If we use explicit_bzero() to zero-fill a buffer in gnutls_memset() we
+ don't need to zero it again via a volatile trick later in this function.
+
+ Signed-off-by: Maciej S. Szmigiero <mail@maciej.szmigiero.name>
+
+Author: Elta Koepp <elta_koepp@gmail.com>
+Date: Fri Apr 5 10:04:12 2019 -0400
+
+ [OSCP] Fix : null pointer resp
+
+ Signed-off-by: Elta Koepp <elta_koepp@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Apr 4 17:01:24 2019 +0200
+
+ cert auth: reject auth if no signature algorithm is usable in TLS 1.3
+
+ Previously, when there is no overlap between usable signature
+ algorithms and the "signature_algorithms" extension in Certificate
+ Request, the client failed in sending Certificate Verify, followed by
+ a connection close. In TLS 1.3, it is possible to keep the connection
+ but reject the authentication by not sending Certificate Verify.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 1 14:14:12 2019 +0200
+
+ handshake: remove unnecessary HSK_CRT_SENT flag
+
+ Previously, while the flag HSK_CRT_SENT was checked in
+ _gnutls13_send_certificate_verify, the flag was never set anywhere.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 3 11:59:37 2019 +0200
+
+ .gitlab-ci.yml: do not run commit-check on master branch
+
+ That is, because there are no diffs to check.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri Mar 29 14:01:14 2019 -0400
+
+ Fix check_if_signed
+
+ Fix the target branch we check against by adding upstream as remote.
+
+ Drop the use of set -e as this causes the shell to immediately exit on
+ errors instead of allowing the code to check the failure and report what
+ it faled about.
+
+ Also print which commits are being checked and what information was found
+ so that a CI failure can be better diagnosed.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 30 05:37:02 2019 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri Oct 19 15:53:27 2018 -0400
+
+ Vendor in XTS functionality from Nettle
+
+ If nettle's XTS is not available, use a vendored in version from master.
+ This is necessary as long as we need to link against 3.4 for ABI
+ compatibility reasons.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 29 06:08:06 2019 +0100
+
+ fuzz: improvements in gnutls_x509_verify_fuzzer [ci skip]
+
+ Added a larger set of corpus (generated with afl-fuzz), and made
+ sure that the fuzzer application crashes if verification succeeds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Mar 28 10:41:13 2019 +0100
+
+ Let check_if_signed fail if git fails
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Elta Koepp <alexi_2019@protonmail.com>
+Date: Wed Mar 27 13:38:50 2019 +0000
+
+ Update ocsptool-common.c
+
+Author: Elta Koepp <alexi_2019@protonmail.com>
+Date: Wed Mar 27 12:55:55 2019 +0000
+
+ Detect malloc failure.
+
+ malloc(data.size + 1) maybe returns NULL on failure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 27 07:21:31 2019 +0100
+
+ released 3.6.7
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 25 16:06:39 2019 +0100
+
+ handshake: add missing initialization of local variable
+
+ Resolves: #704
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 25 15:47:51 2019 +0100
+
+ fuzz: added fuzzer for certificate verification
+
+ This also adds a reproducer for CVE-2019-3829.
+
+ Resolves: #694
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 26 16:11:42 2019 +0100
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Tue Mar 26 11:05:06 2019 +0100
+
+ fips140: Perform SHA-3 self tests
+
+ It is required to perform the self tests to validate SHA-3
+ implementation.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 24 08:37:05 2019 +0100
+
+ tools: removed unused code
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ke Zhao <kzhao@redhat.com>
+Date: Thu Mar 21 11:27:24 2019 -0400
+
+ gnutls-cli: Fix output with option "--logfile"
+
+ The X.509 connection would still print informational message to the
+ stdout by default. Move that output to logfile and add x509 functionality
+ test in the test suite.
+
+ Signed-off-by: Ke Zhao <kzhao@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sat Mar 23 00:38:17 2019 +0200
+
+ configure.ac: remove --with-guile-site-dir
+
+ The hack of distcheck is not known and should not be the default as the
+ GUILE_SITE_DIR macro is the default expected behavior.
+
+ There is little value in specifying any other location of the site-dir as it
+ is out of the guile configuration so best to remove.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 20 11:40:15 2019 +0100
+
+ _x509_en/decode_provable_seed: clarified purpose of functions [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 1 11:15:47 2019 +0100
+
+ handshake: increase the default number of tickets we send to 2
+
+ This makes it easier for clients which perform multiple connections
+ to the server to use the tickets sent by a default server. That's
+ because 2 tickets allow for 2 new connections (if one is using each
+ ticket once as recommended), which in turn lead to 4 new and so on.
+
+ Resolves: #596
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 23 21:02:56 2019 +0100
+
+ Improved estimation of wait in gnutls_session_get_data2
+
+ Previously we would wait an arbitrary value of 50ms for the
+ server to send session tickets. This change makes the client
+ wait for the estimated single trip time + 60 ms for the server
+ to calculate the session tickets. This improves the chance
+ to obtain tickets from internet servers during the call of
+ gnutls_session_get_data2().
+
+ Resolves: #706
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 16 19:59:07 2019 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Ke Zhao <kzhao@redhat.com>
+Date: Wed Mar 6 13:23:24 2019 -0500
+
+ gnutls-cli: Add option "--logfile" to redirect information message output
+
+ First, add an option "--logfile" so user could choose a specific file to
+ store all the informational messages. In some cases, informational
+ messages may cause unexpected result if the output is standard output.
+
+ With this option, user could redirect these messages to a specific
+ file. This will be helpful in testing and tracking.
+
+ Second, replace printf() function with log_msg() function
+
+ This log_msg() function is used when "--logfile" is enabled.
+
+ Third, add a functionality test for "--logfile" option
+
+ Add a test script to test if "--logfile" option works as it should be.
+
+ Signed-off-by: Ke Zhao <kzhao@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 15 17:00:17 2019 +0100
+
+ Removed all FIXME comments in code [ci skip]
+
+ We expand informational comments on limitations, but with removing
+ FIXME (keyword didn't help fixing these), and remove completely unhelpful
+ comments, obsolete ones, or comments about ideas.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 13 15:14:37 2019 +0100
+
+ pkcs11: security officer login implies writable session
+
+ According to the PKCS#11 v2.30, 6.7.1 there are no read-only Security Officer
+ sessions.
+
+ Resolves: #721
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Steve Lhomme <robux4@ycbcr.xyz>
+Date: Wed Mar 13 14:54:28 2019 +0000
+
+ inet_ntop is available in Windows but not via arpa/inet.h
+
+ It's found in ws2tcpip.h which is already included in gnutls_int.h
+
+ arpa/inet.h doesn't exist on Windows, so add arpa_inet to the list of headers
+ replaced by gnulib if not found.
+
+ Signed-off-by: Steve Lhomme <robux4@ycbcr.xyz>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Mar 7 10:16:46 2019 +0100
+
+ Update the GNU Free Documentation License (FDL)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Feb 25 10:36:36 2019 +0100
+
+ Fix URL of ABI compliance checker
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Feb 25 10:32:24 2019 +0100
+
+ Fix URLs of p11-kit
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 17:00:41 2019 +0100
+
+ Use https:// in lib/, src/, and m4/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 16:56:08 2019 +0100
+
+ Use https:// for arbitrary files #1
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 16:44:37 2019 +0100
+
+ Use https:// for www.iana.org
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 16:25:25 2019 +0100
+
+ Use https:// for csrc.nist.gov
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 16:22:43 2019 +0100
+
+ Use https:// for www.gnu.org and www.example.com
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 13 09:03:39 2019 +0100
+
+ .gitlab-ci.yml: updated cache key name
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 10 13:59:32 2019 +0100
+
+ tests: verify that 'certtool -i --outder' does not output text
+
+ A common regression in the past, was certtool outputting text while
+ writing raw DER data. Ensure that the certificate-info option does not
+ regress.
+
+ Resolves: #627
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 9 21:50:46 2019 +0100
+
+ SECURITY.md: updated to reflect the current practice [ci skip]
+
+ This change updates the SECURITY guidelines to reflect the current
+ practice (no special security releases), and thus refer directly
+ to the upcoming or following release. Furthermore, it removes
+ any mention of absolute time, as the release cadence is already
+ fixed to bi-monthly.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 9 21:14:39 2019 +0100
+
+ doc: removed cyclo subdir
+
+ This directory had a makefile which was intended to calculate the cyclomatic
+ complexity, however that was not functional, and not related with gnutls'
+ documentation.
+
+ Resolves: #727
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 8 20:17:49 2019 +0100
+
+ NEWS: fix NEWS entries [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Mar 4 17:17:47 2019 +0100
+
+ tls13/certificate: utilize "certificate_required" alert
+
+ This could make errors more distinguishable when the client sends no
+ certificates or a bad certificate.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Feb 27 18:38:09 2019 +0100
+
+ alert: recognize "certificate_required"
+
+ This may be sent if the server received an empty Certificate message.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Fri Jan 18 13:17:46 2019 +0100
+
+ .gitlab-ci.yml: Test FIPS HMAC self-test
+
+ This enables the integrity self-tests in FIPS140 test build.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Fri Jan 11 11:23:21 2019 +0100
+
+ fips140: Ignore newlines read at the end of HMAC file
+
+ This makes the integrity check to ignore newlines appended after the
+ HMAC value.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+Date: Thu Jan 10 14:04:02 2019 +0100
+
+ fips140: Fix the names of files used in integrity checks
+
+ The names of the libraries haven't been updated when the soname version
+ were bumped.
+
+ Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
+
+Author: Bas van Schaik <gitlab.com@s.traiectum.net>
+Date: Thu Feb 28 22:15:26 2019 +0000
+
+ Create .lgtm.yml for LGTM.com C/C++ analysis
+
+ Signed-off-by: Bas van Schaik <gitlab.com@s.traiectum.net>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 25 14:41:24 2019 +0100
+
+ .gitlab-ci.yml: added thread sanitizer run
+
+ This checks for unsafe uses of variables in our included threaded
+ tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 25 14:35:16 2019 +0100
+
+ Protected _gnutls_epoch_get from _gnutls_epoch_gc on false start
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 25 15:11:19 2019 +0100
+
+ gnutls_record_send2: try to ensure integrity of operations on false and early start
+
+ This adds a double check in the sanity check of gnutls_record_send2()
+ for the initial_negotiation_completed value, making sure that the
+ check will be successful even in parallel operation of send/recv.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 24 21:13:27 2019 +0100
+
+ mini-dtls-pthread: renamed and fixed several shortcomings
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 24 00:19:21 2019 +0100
+
+ Make false start and early start multi-thread recv/send safe
+
+ An application that is sending and receiving from different threads
+ after handshake is complete cannot take advantage of false start because
+ gnutls_record_send2() detects operations during the handshake process
+ as invalid.
+
+ Because in early start and false start the remaining handshake process needs
+ only to receive data, and the sending side is already set-up, this error
+ detection is bogus. With this patch we remove it.
+
+ Resolves: #713
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 23 18:57:09 2019 +0100
+
+ doc: added more information on operation under multiple threads
+
+ Relates: #713
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Mar 1 20:13:38 2019 +0100
+
+ Update ./bootstrap from latest gnulib
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 27 10:01:47 2019 +0100
+
+ Clarifications on AEAD ciphers
+
+ Relates: #716
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 27 09:29:04 2019 +0100
+
+ Improve documentation for gnutls_cipher_get_iv_size
+
+ This clarifies what is returned and what is to be expected on algorithms
+ with variable IV sizes.
+
+ Resolves: #717
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 26 15:42:01 2019 +0100
+
+ pkcs11: clarify GNUTLS_PKCS11_TOKEN_MODNAME presence [ci skip]
+
+ Resolves: #633
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 26 15:21:48 2019 +0100
+
+ cppcheck: suppress warning on nettle code [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Feb 23 18:43:49 2019 +0100
+
+ gnutls-cli: fix --benchmark-ciphers type overflow
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 23 21:19:06 2019 +0100
+
+ _gnutls_recv_handshake: added explicit sanity checks
+
+ Although, this function acts on the message provided as expected and thus
+ it should never call a message parsing function on unexpected
+ messages, we make a more explicit sanity check. This unifies the
+ sanity checks existing within the involved functions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 12 15:20:23 2019 +0100
+
+ gnutls_x509_crt_init: Fix dereference of NULL pointer
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 12 15:14:07 2019 +0100
+
+ Remove redundant resets of variables after free()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 12 15:09:11 2019 +0100
+
+ Automatically NULLify after gnutls_free()
+
+ This method prevents direct use-after-free and
+ double-free issues.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Feb 19 13:56:35 2019 +0100
+
+ tlsfuzzer: update to the latest upstream for downgrade protection tests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Feb 9 10:26:56 2019 +0100
+
+ ext/supported_versions: regenerate server random
+
+ This adds a call to _gnutls_gen_server_random() in handling the
+ "supported_versions" extension, so that the TLS 1.3 downgrade sentinel
+ is set only when the earlier versions are selected.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 5 11:01:20 2019 +0100
+
+ Update ax_code_coverage.m4 to latest release of autoconf-archive
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Thu Feb 21 14:49:36 2019 +0100
+
+ lib: x509: Minor directory browsing simplification
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Mon Feb 18 14:41:56 2019 +0100
+
+ Revert "Revert "verify-high2: Fix cert dir iteration on Win32""
+
+ This reverts commit 681330882da19099eea360fab141cab937c45677.
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+ This revert also contains the fix to the original commit (invalid
+ utf8->utf16 conversion) and a minor simplification of the _treaddir loop.
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Mon Feb 18 17:12:54 2019 +0100
+
+ iconv: Allow _gnutls_utf8_to_ucs2 to output little endian
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Mon Feb 18 09:37:04 2019 +0100
+
+ lib: Provide _Thread_local on MSVC
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Feb 18 21:38:38 2019 +0100
+
+ Add test for starttls XMPP
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Feb 6 11:30:06 2019 +0100
+
+ gnutls-cli: Fix --starttls-proto=xmpp
+
+ Fixes two issues with gnutls-cli --starttls-proto=xmpp:
+ 1. Print 'Timeout' on timeout instead of random errno message
+ 2. Do not wait for linefeed when using XMPP (XML)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Feb 18 15:38:56 2019 +0100
+
+ check_if_signed: Get source branch if not set
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: R. Andrew Bailey <bailey@akamai.com>
+Date: Thu Feb 14 09:38:33 2019 -0500
+
+ tests: wrap ADD_SYSCALL for getrandom in test for SYS_getrandom
+
+ Signed-off-by: R. Andrew Bailey <bailey@akamai.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Feb 8 14:46:33 2019 +0100
+
+ gnutls_record_set_max_size: make it work on server side
+
+ The record_size_limit extension can also be specified by the server to
+ indicate the maximum plaintext. Also add test cases for asymmetric
+ settings between server and client.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 31 13:39:35 2019 +0100
+
+ tlsfuzzer: update to the latest upstream for record_size_limit test
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Feb 8 13:22:13 2019 +0100
+
+ ext/record_size_limit: account for content type octet in TLS 1.3
+
+ In TLS 1.3, the protocol maximum of plaintext size is 2^14+1, while
+ it is 2^14 in TLS 1.2. To accommodate that, this introduces the
+ following invariant:
+ - when the maximum is set by the user with
+ gnutls_record_set_max_size(), store it as is. The value range is
+ [511, 16834].
+ - when the maximum is negotiated through record_size_limit extension,
+ it can be [512, 16385]. In TLS 1.3, subtract by 1 to fit in [511,
+ 16384].
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 31 16:56:55 2019 +0100
+
+ decrypt_packet_tls13: add check for max plaintext size
+
+ There is check in _gnutls_recv_in_buffers already, but for TLS 1.3 we
+ need to take account of the padding.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 25 17:00:44 2019 +0100
+
+ record: reject too large plaintext after decryption
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 30 16:45:08 2019 +0100
+
+ constate: reset max_record_recv_size upon renegotiation
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 30 10:21:07 2019 +0100
+
+ session_pack: reset max_record_recv_size when packing
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 17 11:53:35 2019 +0100
+
+ ext/record_size_limit: don't confuse with negotiated/user-supplied maximum
+
+ As documented in gnutls_int.h, max_record_send_size is for tracking
+ the user-supplied maximum, while max_record_recv_size for the
+ protocol negotiated maximum.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Jan 20 09:18:21 2019 +0100
+
+ ext/max_record: server shouldn't send it with record_size_limit
+
+ Otherwise, the connection will be disconnected by the client, as
+ suggested in RFC: A client MUST treat receipt of both
+ "max_fragment_length" and "record_size_limit" as a fatal error, and it
+ SHOULD generate an "illegal_parameter" alert.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 7 16:28:52 2019 +0100
+
+ _gnutls_hello_ext_is_present: don't ignore max_fragment_length
+
+ The extension is assigned the internal ID 0.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jan 25 17:04:40 2019 +0100
+
+ .dir-locals.el: disable indent-tabs-mode in js-mode
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 14 13:01:34 2019 +0100
+
+ bootstrap.conf: do not override GNULIB_SRCDIR
+
+ This was not set in all of our CI platforms, and was causing
+ issues in MacOSX.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 11 09:18:46 2019 +0100
+
+ x509: corrected issue in the algorithm parameters comparison
+
+ Each certificate has two fields to set the signature algorithm
+ and parameters used for the digital signature. One of the fields is
+ authenticated and the other is not. It is required from RFC5280 to
+ enforce the equality of these fields, but currently due to an issue
+ we wouldn't enforce the equality of the parameters fields. This
+ fix corrects the issue.
+
+ We also move an RSA-PSS certificate in chainverify that was relying
+ on invalid parameters, to this set of invalid certificates.
+
+ Resolves: #698
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 13 07:54:59 2019 +0000
+
+ tests: added further checks for gnutls_pkcs11_token_get_info
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jan 29 16:10:59 2019 +0100
+
+ Fix uninitialized warning in pkcs11.c
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Feb 13 17:22:21 2019 +0100
+
+ Cleanup lib/auth/cert.c as suggested by cppcheck
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Feb 11 10:41:47 2019 +0100
+
+ Fix 32bit overflow issue in src/serv-args.def
+
+ Fixing this warning seen on 32bit architectures:
+
+ serv-args.c: In function 'doOptMaxearlydata':
+ serv-args.c:1431:14: warning: overflow in conversion from 'long long int' to 'long int' changes value from '4294967296' to '0' [-Woverflow]
+ { 1, 4294967296 } };
+ ^~~~~~~~~~
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Feb 8 13:03:30 2019 +0100
+
+ Remove typedef'ing ssize_t in gnutls.h
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Feb 6 20:54:45 2019 +0100
+
+ Use inet_pton() from gnulib
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 9 10:52:29 2019 +0100
+
+ bootstrap: refuse to bootstrap if any dependencies bring gnulib's network stack
+
+ If gnulib's network stack is brought (due to a dependency) in the library
+ it will make the library unusable to non-gnulib using applications. This
+ prevents windows applications for example to use gnutls, and so on. Even
+ more it is quite hard to catch that issue because our testsuite uses
+ gnulib as well. Instead we try to catch the these modules at import time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Feb 6 20:35:11 2019 +0100
+
+ Use inet_ntop() from gnulib
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 3 12:18:30 2019 +0100
+
+ _gnutls_gen_rawpk_crt: corrected the use of assert
+
+ The API could return 0 or 1 matching certificates. The case of zero
+ can only happen in client side.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 3 08:47:50 2019 +0100
+
+ raw public keys: apply the key usage bits the same way as X.509
+
+ That is, we require a signing certificate when negotiating
+ TLS1.3, or when sending a client certificate (on all cases).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 2 09:13:40 2019 +0100
+
+ Fallback to TLS 1.2 when incompatible with signature certs are provided
+
+ This only takes into account certificates in the credentials structure.
+ If certificates are provided in a callback, these must be checked by
+ the provider. For that we assume that the credentials structure is
+ filled when associated with a session; if not then the fallback mechanism
+ will not work and the handshake will fail.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 2 07:10:10 2019 +0100
+
+ Enforce the certificate key usage restrictions on all cases
+
+ That is, we require a signing certificate when negotiating
+ TLS1.3, or when sending a client certificate (on all cases).
+
+ Before we would not perform any checks under TLS1.3 or when client
+ certificates are sent, assuming that the certificates used will always
+ be signing ones. However if the user sets up incorrectly a decryption
+ certificate we would use it for signing. This fix makes sure that an
+ error is returned early when these scenarios are detected.
+
+ Resolves: #690
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jan 21 12:54:58 2019 +0100
+
+ Fetch OSS-Fuzz corpora much faster [skip ci]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 4 15:10:19 2019 +0100
+
+ .triage-policies.yml: added [ci skip]
+
+ This adds a set of policies regarding issues and merge requests
+ to be enforced by the gitlab-triage bot. That is:
+ - Issues without any label for more than a month are marked
+ with needs attention label
+ - Issues with needinfo label are closed if they are not updated
+ within a month
+ - Merge requests marked as WIP with no update within 5 months
+ are closed.
+
+ These rules are not enforced automatically; we have to schedule
+ a run of the gitlab-triage bot.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Feb 2 17:47:48 2019 +0300
+
+ build: do not generate mech-list.h if p11-kit is not available
+
+ Compiling GnuTLS with no p11-kit installed will result in a serie of
+ warnings during build time because mech-list.h will be generated even if
+ pkcs11 tool compilation is disabled. Move mech-list.h generation to
+ happen only if pkcs11 is enabled, thus removing these warnings.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Feb 2 17:32:01 2019 +0300
+
+ build: pass NETTLE_LIBS together with HOGWEED_LIBS
+
+ libhogweed might depend on exact non-system-wide nettle, so let's pass
+ NETTLE_LIBS flags together when using HOGWEED_LIBS.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 26 21:44:28 2019 +0100
+
+ Add GNUTLS_E_RECEIVED_DISALLOWED_NAME for illegal SNI names
+
+ An illegal/disallowed SNI server name previously generated
+ the misleading message "An illegal parameter has been received.".
+
+ This commit changes it to
+ "A disallowed SNI server name has been received.".
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jan 30 21:58:34 2019 +0300
+
+ lib/nettle: replace nettle-stdint.h with just stdint.h
+
+ Nettle library is going to drop nettle-stdint.h. Replace this include
+ with with just <stdint.h>.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jan 28 15:25:30 2019 +0100
+
+ Fix 'make glimport' and update CONTRIBUTING.md
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jan 27 13:59:56 2019 +0200
+
+ .gitignore: add test files
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jan 27 13:17:35 2019 +0200
+
+ build: detect previous supported guile
+
+ A recent change in the m4 macro of guile enforces latest guile:
+ ---
+ AC_DEFUN([GUILE_PROGS],
+ [_guile_required_version="m4_default([$1], [$GUILE_EFFECTIVE_VERSION])"
+ if test -z "$_guile_required_version"; then
+ _guile_required_version=2.2
+ fi
+ ---
+
+ The result:
+ ---
+ checking for guile-snarf... /usr/bin/guile-snarf
+ checking for guild... /usr/bin/guild
+ checking for guile-2.2... no
+ checking for guile2.2... no
+ checking for guile-2... no
+ checking for guile2... no
+ checking for guile... /usr/bin/guile
+ checking for Guile version >= 2.2... configure: error: Guile 2.2 required, but 2.0.14 found
+ ---
+
+ Probably best to specify the supported version explicitly when calling
+ GUILE_PROGS, to keep existing behavior calling the GUILE_PKG detects the
+ existing packages.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jan 25 11:51:56 2019 +0100
+
+ Fix unused var warning in guile/src/core.c
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jan 25 12:26:46 2019 +0100
+
+ Fix abi-check failure
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 25 08:32:17 2019 +0100
+
+ NEWS: updated
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 25 08:24:21 2019 +0100
+
+ src/Makefile.am: remove .bak files before autogenerating
+
+ This avoids errors due to files pre-existing but not being
+ writable.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 25 08:18:01 2019 +0100
+
+ bumped versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 25 08:13:26 2019 +0100
+
+ Makefile.am: require guile-2.2 for release
+
+ That's because guile.m4 from previous releases has issues
+ with the latest version.
+
+ Resolves: #631
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 24 20:25:59 2019 +0100
+
+ priorities: when %NO_EXTENSIONS is specified disable TLS1.3
+
+ This makes the behavior of this priority string option well-defined
+ even when TLS1.3 is enabled.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Thu Jan 24 18:48:40 2019 +0100
+
+ certtool.1: fix formatting
+
+ Apostroph at start of a line is a control character in manpages, avoid
+ it. Also drop wrong indent.
+ See https://bugs.debian.org/920215
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 23 17:52:47 2019 +0100
+
+ tlsfuzzer: update to the latest upstream for record_size_limit tests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jan 24 01:57:13 2019 +0300
+
+ configure.ac: fix substitution for libatomic
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 23 20:51:11 2019 +0100
+
+ .travis.yml: avoid installing submodules
+
+ They are not necessary for building and testing the basic
+ test suite.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 23 20:42:34 2019 +0100
+
+ update on "Fix gnutls.pc for multiarch builds"
+
+ This replaces LTLIBUNISTRING with LIBUNISTRING in Makefile.am.
+ The former is no longer produced by configure.ac.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 23 15:13:12 2019 +0100
+
+ set_ciphersuite_list(): Use linear approach to cleanup priorities
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 22 15:47:39 2019 +0100
+
+ tests: check record_size_limit is reset after resumption
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Jan 19 10:31:52 2019 +0100
+
+ constate: don't restore max_record_recv_size from resumed data
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 17 17:50:49 2019 +0100
+
+ ext/record_size_limit: mark it as mandatory extension
+
+ In a resuming session record_size_limit is always renegotiated, and
+ thus the server should parse the extension always.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jan 17 11:52:50 2019 +0100
+
+ ext/record_size_limit: reject too large extension payload
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 5 14:12:46 2019 +0100
+
+ gnutls-serv: improvements in UDP server
+
+ This modifies the server to deinitialize the session after use
+ (avoiding leaks), and to only send the hello verify request when
+ a client hello is seen.
+
+ This also adds a basic unit test of gnutls-serv with the --udp option.
+
+ Resolves #632
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Fabrice Fontaine <fontaine.fabrice@gmail.com>
+Date: Wed Jan 23 13:36:23 2019 +0100
+
+ configure.ac: add comment for -latomic
+
+ Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 23 08:42:54 2019 +0100
+
+ tests: added tests for multiple ticket reception
+
+ This introduces tests for the reception (parsing) of multiple tickets
+ by a gnutls client. It uses the tlslite-ng server because unlike a gnutls
+ server, tlslite-ng does send multiple tickets in a single record. That
+ way we test that we can parse both ways of sending tickets.
+
+ Resolves: #511
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 23 11:45:39 2019 +0100
+
+ Update gnulib
+
+ Closes #653 (printf %n crashes on Android)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 21 20:53:06 2019 +0100
+
+ gnutls_alert_send_appropriate: do not send alert to peer on all errors
+
+ That is, do not send alerts for success, or for errors indicating that
+ an alert has been received. This changes the documented function behavior
+ but does not break any existing caller expectations.
+
+ Relates: #672
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 21 20:33:00 2019 +0100
+
+ gnutls_pkcs11_privkey_import_url: enable RSA-PSS only when an RSA key can sign
+
+ In gnutls_pkcs11_privkey_import_url() we only enabled RSA-PSS functionality to
+ the key if the CKM_RSA_PKCS_PSS mechanism is available to the token. However,
+ if the specific key is not marked for use with digital signatures (CKA_SIGN
+ set), then we may have still ended-up using it and fail when using it. We
+ now test whether CKA_SIGN is set prior to enabling such keys for PSS.
+
+ Resolves: #667
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 21 20:56:10 2019 +0100
+
+ alert: associate unsupported curve alerts with handshake failure
+
+ Resolves: #672
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jan 10 14:53:32 2019 +0100
+
+ Check for Signed-off-by: in CI
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sun Jan 20 12:00:07 2019 +0100
+
+ Avoid excessive CPU usage in gnutls_idna_map()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 19 18:19:42 2019 +0100
+
+ Fix uninitialized variable in tests/x509dn.c
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 19 18:04:31 2019 +0100
+
+ crypto-selftests.c: Fix checking return value
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 11 07:23:40 2019 +0100
+
+ auto-generate the AUTHORS file
+
+ The original file was unmaintained since long time. This is now
+ auto-generated from the git shortlog, at release time.
+
+ Relates: #606
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Fabrice Fontaine <fontaine.fabrice@gmail.com>
+Date: Thu Jan 17 13:24:04 2019 +0100
+
+ configure.ac: check if libatomic is needed
+
+ gnutls source code uses the C++11 <atomic> functionality since
+ https://github.com/gnutls/gnutls/commit/7978a733460f92b31033affd0e487c86d66c643d,
+ which internally is implemented using the __atomic_*() gcc built-ins
+
+ On certain architectures, the __atomic_*() built-ins are implemented in
+ the libatomic library that comes with the rest of the gcc runtime. Due
+ to this, code using <atomic> might need to link against libatomic,
+ otherwise one hits build issues such as:
+
+ ../lib/.libs/libgnutls.so: undefined reference to `__atomic_fetch_sub_4'
+
+ on an architecture like SPARC.
+
+ To solve this, a configure.ac check is added to know if we need to
+ link against libatomic or not. The library is also added to gnutls.pc.
+
+ Fixes:
+ - http://autobuild.buildroot.org/results/6c749bd592ceffeacadd2ab570d127936cce64b2
+ - http://autobuild.buildroot.org/results/30aa83d3cf3482af8a59250c196c85f4a278d343
+
+ Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jan 17 10:22:45 2019 +0100
+
+ Fix gnutls.pc for multiarch builds
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 14 10:56:27 2019 +0100
+
+ certtool: data encipherment is disabled by default
+
+ For the TLS protocol this option is not necessary, and if enabled
+ by mistake (as default) and no other option is set, then the
+ generated key will be unusable. Thus we disable it, to generate
+ working keys by default.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 10 19:23:12 2019 +0100
+
+ .travis.yml: use ./bootstrap instead of make autoreconf
+
+ The latter is no longer available after the removal of
+ GNUMakefile.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 10 07:56:17 2019 +0100
+
+ The flag %NO_EXTENSIONS is disabling extension support while being functional
+
+ That is, the %NO_EXTENSIONS option is the only documented way to disable
+ extensions completely from a session. Clarify that message, mention that
+ its behavior is undefined when combine with TLS1.3, and make sure that it
+ is functional. The latter makes sure that safe renegotiation and extended
+ master secret extensions remain disabled when this flag is given.
+
+ That simplifies testing certain scenarios under TLS1.0 or TLS1.1 when
+ no extensions must be used.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 8 12:26:19 2019 +0100
+
+ When sending no extensions do not include a zero length
+
+ According to RFC5246:
+ The presence of extensions can be detected by determining whether
+ there are bytes following the compression_method field at the end of
+ the ServerHello.
+
+ and as such we correct our behavior to not send the zero length bytes.
+ This was our behavior in 3.5.x and 3.3.x branch, and thus this corrects
+ a regression of gnutls with these branches.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Signed-off-by: David Woodhouse <dwmw2@infradead.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 8 19:37:49 2019 +0000
+
+ Avoid calling sign_algorithm_get_name() when we already have pointer to the algorithm.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 2 13:21:49 2019 +0100
+
+ tls-sig: check RSA-PSS signature key compatibility also in TLS 1.2
+
+ This extends commit 51d21634 to cover the optional TLS 1.2 cases,
+ which RFC 8446 4.2.3 suggests: "Implementations that advertise support
+ for RSASSA-PSS (which is mandatory in TLS 1.3) MUST be prepared to
+ accept a signature using that scheme even when TLS 1.2 is negotiated".
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 8 18:09:29 2019 +0100
+
+ tlsfuzzer: update to the latest upstream for the TLS 1.2 CV tests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 8 18:06:17 2019 +0100
+
+ alert: map GNUTLS_E_UNKNOWN_COMPRESSION_ALGORITHM to illegal_parameter
+
+ This alert is more appropriate according to the tlsfuzzer test:
+ https://github.com/tomato42/tlsfuzzer/commit/4b6a4aa8b00cf3f3bcb2388d1bfdad985610ed1d
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 8 14:40:25 2019 +0100
+
+ Revert "build: remove src/*.bak from distribution"
+
+ This reverts commit 9ba397aa841730e4824d2bf8537aa15e711ad9b3, as it
+ turned out to be not practical. See !862 for the discussion.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 8 12:07:00 2019 +0100
+
+ _gnutls_hello_ext_set_datum: removed unnecessary remark [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Maks Naumov <maksqwe1@ukr.net>
+Date: Tue Jan 8 00:05:23 2019 +0200
+
+ Fix _gnutls_write_new_general_name() result checking
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Jan 7 17:46:10 2019 +0200
+
+ build: install all m4 macros
+
+ having all m4 macros in m4/ directory enables easier autoreconf process for
+ downstream as dependency programs that provide these macros are not required.
+
+ both gtk-doc and guile requires huge dependency list, and currently are
+ required per any change (patch) in autotools.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 2 13:44:50 2019 +0100
+
+ ext/pre_shared_key: avoid unnecessary use of VLA for MSVC
+
+ Suggested by Gisle Vanem in:
+ https://github.com/gnutls/gnutls/commit/fd8c1ec8fe155861dffa28811127f101b6697b4b#r31802648
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jan 4 09:47:24 2019 +0100
+
+ Fix typos in lib/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jan 3 16:36:17 2019 +0100
+
+ Unroll MinGW CI runner commands
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 3 09:51:34 2019 +0100
+
+ tests: treat all signals as error
+
+ Previously we were only treating SIGSEGV as error though there is
+ no reason to treat other signals as success and they may hide an
+ actual error case (e.g., when SIGPIPE is received). With this change we
+ treat any signals received by the child except SIGTERM as error, and
+ we ensure that SIGPIPE is ignored in all tests.
+
+ This also updates tests/slow/cipher-api-test.c to test failures with
+ SIGABRT or otherwise consistently.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 4 14:48:26 2019 +0100
+
+ Revert "verify-high2: Fix cert dir iteration on Win32"
+
+ This was failing CI (x509cert-tl) but was not detected due to
+ a bug.
+
+ This reverts commit 362a0c30b79ccede7e5bc3a7747c3e7f1d30889a.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Marga Manterola <marga@google.com>
+Date: Thu Jan 3 17:57:29 2019 +0000
+
+ Fix typo when checking for ed25519 support
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jan 1 14:26:04 2019 +0100
+
+ Fix typos in doc/
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 3 09:13:56 2019 +0100
+
+ _gnutls13_handshake_sign_data: properly fail on signing error
+
+ When signing failed, gnutls would return an invalid signed message
+ (with no data) instead of failing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 2 10:29:48 2019 +0100
+
+ Fix 'make distcheck'
+
+ The following error will be fixed:
+
+ ERROR: files left in build directory after distclean:
+ ./tests/softhsm-privkey-eddsa-test.config
+ make[1]: *** [Makefile:1833: distcleancheck] Error 1
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 2 10:22:26 2019 +0100
+
+ Remove auto-generated gnulib files from repo
+
+ Bootstrapping with latest gnulib updated both files,
+ so they are obviously auto-generated files which do not
+ belong into the repository.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 2 10:02:11 2019 +0100
+
+ Update required autoconf version to 2.63
+
+ This fixes the bootstrap error with the latest gnulib:
+
+ gnulib/gnulib-tool: *** minimum supported autoconf version is 2.63. Try adding AC_PREREQ([2.63]) to your configure.ac.
+ gnulib/gnulib-tool: *** Stop.
+ ./bootstrap: gnulib-tool failed
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 2 09:56:42 2019 +0100
+
+ Update gnulib
+
+ This fixes the following 'make syntax-check' failure:
+
+ maint.mk: out of date copyright in ./gnulib/lib/version-etc.c; update it
+ make: *** [maint.mk:1199: sc_copyright_check] Error 1
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jan 2 09:49:19 2019 +0100
+
+ Update copyright year in doc/gnutls.texi
+
+ This fixes the following error of 'make syntax-check':
+
+ maint.mk: out of date copyright in doc/gnutls.texi; update it
+ make: *** [maint.mk:1201: sc_copyright_check] Error 1
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 30 16:25:08 2018 +0100
+
+ examples: ignore GNUTLS_E_AGAIN or INTERRUPTED errors
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 30 16:00:43 2018 +0100
+
+ examples: use a valid DNS name
+
+ This prevents a gnutls server from sending an unexpected message
+ alert due to invalid DNS name encoding, if the example is not modified.
+
+ Resolves: #663
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Dec 29 19:16:57 2018 +0100
+
+ Fix OSS-Fuzz build
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 25 14:44:11 2018 +0300
+
+ tests: cipher-openssl-compat: don't call EVP_CIPHER_CTX_init()
+
+ There is no need to call EVP_CIPHER_CTX_init() after
+ EVP_CIPHER_CTX_new().
+
+ Fixes #658
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 25 14:43:56 2018 +0300
+
+ tests: cipher-openssl-compat: don't fail if OpenSSL doesn't provide cipher
+
+ LibreSSL does not provide ChaCha20-Poly1305 through EVP_CIPHER
+ interface, so let's skip the test if cipher is not available.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 20 17:49:21 2018 +0100
+
+ gnutls_pubkey_import_ecc_raw: set the public key bits
+
+ This sets the number of key bits once an ECC key is imported.
+
+ Resolves #640
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 21 07:58:24 2018 +0100
+
+ GNUTLS_X509_NO_WELL_DEFINED_EXPIRATION: deprecated
+
+ This removes the documented use of this macro. It was non-functional.
+ Given the nature of the definition of the non-well defined date for
+ certificates, it may be wise not to use a special macro at all. The
+ reason is that the no-well defined date is a real date (~year 9999),
+ and any approximation with seconds will be unstable due to irregular
+ leap seconds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 21 07:54:40 2018 +0100
+
+ gnutls-cli-debug: removed unused variable
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Mon Dec 17 11:37:12 2018 +0100
+
+ win32: Check that CertOpenStore is behaving as CertOpenSystemStore
+
+ The test isn't located in tests/windows since we need the actual
+ libcrypt32 implementations.
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Dec 20 16:33:34 2018 +0100
+
+ testrandom.sh: Fix endless loop
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 19 09:41:41 2018 +0100
+
+ vasprintf: use from gnulib; don't bundle twice
+
+ Relates #653
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Thu Dec 13 17:31:29 2018 +0100
+
+ win32: Use CertOpenStore instead of CertOpenSystemStore
+
+ CertOpenSystemStore is not available when building for windows store.
+ Both functions are available since windows XP, so there is no
+ compatibility change.
+ CertOpenSystemStore documentation states "Only current user certificates
+ are accessible using this method, not the local machine store." hence we
+ pass CERT_SYSTEM_STORE_CURRENT_USER.
+ We also use the wide chars variants, in the event the ansi ones are
+ silently rejected by windows store applications (which is not
+ documented, but which I strongly suspect)
+ This is equivalent to Wine's implementation of CertOpenSystemStore:
+ https://github.com/wine-mirror/wine/blob/master/dlls/crypt32/store.c#L904
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Tue Dec 4 15:18:36 2018 +0100
+
+ keys-win: Disable private key import on windows store
+
+ Windows store drastically limits the available functions.
+ In this case, at least CryptSetProvParam and the NCrypt* functions
+ can't be used
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Tue Dec 4 13:22:52 2018 +0100
+
+ verify-high2: Fix cert dir iteration on Win32
+
+ And especially when building for windows store, which only allows
+ unicode version of opendir & friends functions.
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Tue Dec 4 11:53:48 2018 +0100
+
+ lib: Don't hardcode LoadLibraryA
+
+ Those functions are forbidden when building for Windows Store
+
+ Signed-off-by: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Dec 18 16:27:29 2018 +0100
+
+ .gitlab-ci.yml: Remove assert in gl/tests/test-strerror.c
+
+ A bug made our CI cross builds fail.
+ See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916779
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:22:10 2018 +0100
+
+ tests/cert-tests/certtool-eddsa: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:20:17 2018 +0100
+
+ tests/cert-tests/certtool: SKIP if --disable-bash-tests was given
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:13:31 2018 +0100
+
+ tests/cert-tests/pkcs12-utf8: Use /bin/sh instead of bash
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:12:31 2018 +0100
+
+ tests/cert-tests/pkcs12-corner-cases: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:11:53 2018 +0100
+
+ tests/cert-tests/certtool-ecdsa: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 16:06:18 2018 +0100
+
+ tests/cert-tests/pem-decoding: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 13:28:26 2018 +0100
+
+ tests/cert-tests/certtool-crl-decoding: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 12:34:01 2018 +0100
+
+ tests/long-crl.sh: Increase portability (fix for busybox)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 12:14:27 2018 +0100
+
+ tests/gnutls-cli-debug.sh: Remove bashisms
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 23 19:58:49 2018 +0100
+
+ tests/scripts/common.sh: Add check_if_equal()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Nov 16 12:08:06 2018 +0100
+
+ tests/scripts/common.sh: Make random port value work on busybox
+
+ On busybox 'date +%N' returns an empty value.
+ On 'dash' (Debian shell) $RANDOM doesn't work.
+
+ This commit works first tries $RANDOM and then falls back to 'date +%N'.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 15 22:14:18 2018 +0100
+
+ doc: minor fixes [ci skip]
+
+ Created NEWS entry for 3.6.6 and unified the listing of gnutls_init_flags_t
+ items.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Sat Dec 15 22:01:10 2018 +0100
+
+ pkcs11: fix memleak in gnutls_pkcs11_token_get_ptr
+
+ find_token_modname_cb uses p11_kit_config_option to retrieve the module
+ name, but its return value (stored in tn.modname) must be freed.
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sat Aug 26 14:22:44 2017 +0200
+
+ Implemented support for raw public-key functionality (RFC7250).
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Hugo Beauzée-Luyssen <hugo@beauzee.fr>
+Date: Thu Dec 13 11:00:03 2018 +0100
+
+ configure.ac: Always enable unicode support on windows
+
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Nov 29 18:21:22 2018 +0100
+
+ pkcs11: fix memleak when querying for GNUTLS_PKCS11_TOKEN_MODNAME
+
+ find_token_modname_cb uses p11_kit_config_option to retrieve the module
+ name, but its return value must be free'd.
+
+ Other fixes:
+ - Do not silently truncate the output buffer, return an error instead.
+ - If the module name is unavailable, do not write "(null)" to the
+ output. Write an empty string instead.
+ - The module path can be of arbitrary length, so passing output=NULL to
+ learn the length seems reasonable, except that snprintf crashed on a
+ NULL pointer dereference.
+
+ Fixes: 241f9f0b1 ("Added GNUTLS_PKCS11_TOKEN_MODNAME for gnutls_pkcs11_token_get_info")
+ Signed-off-by: Peter Wu <peter@lekensteyn.nl>
+
+Author: Peter Wu <peter@lekensteyn.nl>
+Date: Thu Nov 29 18:43:39 2018 +0100
+
+ pkcs11: clarify gnutls_pkcs11_*_get_info output_size
+
+ It was not clear whether @output_size contains the actual string length
+ or the buffer length (including null terminator).
+
+ Signed-off-by: Peter Wu <peter@lekensteyn.nl>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Nov 15 10:44:20 2018 +0100
+
+ build: remove src/*.bak from distribution
+
+ Instead, include the autogen-generated *.c, *.h and the stamp files in
+ the distribution.
+
+ To prevent the bundled files being linked with incompatible autogen
+ libopts, this adds an extra check in configure. If the detected
+ system libopts version is too old, it will use the included libopts
+ implementation.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 12 09:48:01 2018 +0100
+
+ GNUTLS_PCERT_NO_CERT: marked as unused/ignored
+
+ This flag was already a no-op.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 11 09:34:22 2018 +0100
+
+ srp/psk: update recommendations for usernames [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 12 06:15:25 2018 +0100
+
+ doc: include PSK examples into documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 6 14:59:30 2018 +0100
+
+ tlsfuzzer: update to the latest upstream to eanble CCS tests
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Dec 4 17:15:02 2018 +0100
+
+ Fix gnutls_handshake_set_timeout() for values < 1000
+
+ handshake-timeout.c now tests for <1000ms timeout and for >=1000ms
+ timeout. The test duration decreased from 45s to 1.2s.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 22 14:59:11 2018 +0100
+
+ record: make CCS handling stricter in TLS 1.3
+
+ In TLS 1.3, the change_cipher_spec messages received under the
+ following conditions should be treated as unexpected record type:
+ containing value other than 0x01, or received after the handshake.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 5 14:44:23 2018 +0100
+
+ bootstrap: only update the required submodules for building
+
+ Although we have few submodules they are not all required for
+ building and testing. This patch modified bootstrap.conf not
+ to update all of them, but only the necessary for building and
+ testing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Dec 1 13:26:20 2018 +0100
+
+ Fix error message on old or missing nettle.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 1 06:04:45 2018 +0100
+
+ released 3.4.1
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed Oct 3 13:12:38 2018 -0400
+
+ Constant time/cache PKCS#1 RSA decryption
+
+ This patch tries to make the code have the same time and memory access
+ aptterns across all branches of the decryption function so that timining
+ or cache side channels are minimized or neutralized.
+
+ To do so it uses a new nettle rsa decryption function that is
+ side-channel silent.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 28 16:00:34 2018 +0100
+
+ Added test about rsa decryption under pkcs11
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 30 10:28:28 2018 +0100
+
+ gnutls_x509_crt_set_expiration_time: fixed documentation [ci skip]
+
+ Fixed the documentation of the function to reflect reality.
+ This function did not accept the GNUTLS_X509_NO_WELL_DEFINED_EXPIRATION
+ macro.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 30 08:49:50 2018 +0100
+
+ NEWS: updated [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 30 08:44:35 2018 +0100
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Nov 29 06:05:22 2018 +0300
+
+ tests: attempt to fix test errors on Mac OS X
+
+ It looks like Mac OS X's grep has issues with applying basic regexps
+ with alternation operator inside. Use several grep calls in pipeline to
+ achieve the same result.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 28 23:39:32 2018 +0300
+
+ travis: print logs for all failed tests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 28 14:10:35 2018 +0300
+
+ lib: fix pkcs11 using defines from PKCS#11 3.0 for EdDSA
+
+ pkcs11 support code uses several definitions from forthcoming PKCS#11
+ standard version. Older p11-kit versions do not provide these
+ definitions. Detect and disable code supporting EdDSA if compiling
+ GnuTLS with older p11-kit library.
+
+ Closes #626
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Fixes: 88377775a3eff679a9ec60ab9bfc6b3c683a0407
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 28 20:08:29 2018 +0100
+
+ CONTRIBUTING.md: specify rules for static/inline functions [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 22 17:36:17 2018 +0100
+
+ CONTRIBUTING.md: proposal for new features/modifications approach [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 21 21:09:33 2018 +0100
+
+ CONTRIBUTING.md: added proposal on commenting style [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 28 16:03:59 2018 +0300
+
+ tests: fix crl test under MinGW32/64
+
+ Use --outfile instead of output redirection to stop CR from sneaking
+ into temp file. Extra CR symbols make grep choke on that file.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Stephan Mueller <smueller@chronox.de>
+Date: Tue Nov 27 22:27:26 2018 +0100
+
+ DRBG: Use ACVP validated test vector in self test
+
+ Due to removing all of the FIPS 140-2 continuous self test leftovers,
+ the DRBG test vector must be updated as the very first DRBG block is not
+ dropped any more.
+
+ The test complies with the CAVP test definition specified in "The
+ NIST SP 800-90A Deterministic Random Bit Generator Validation
+ System (DRBGVS)" section 6.2.
+
+ The test vector is obtained during a successful trial run using the
+ NIST ACVP server. The following registration was used to generate the
+ test vector:
+
+ {
+ "algorithm":"ctrDRBG",
+ "prereqVals":[
+ {
+ "algorithm":"AES",
+ "valValue":"same"
+ }
+ ],
+ "predResistanceEnabled":[
+ false
+ ],
+ "reseedImplemented":true,
+ "capabilities":[
+ {
+ "mode":"AES-256",
+ "derFuncEnabled":false,
+ "entropyInputLen":[
+ 384
+ ],
+ "nonceLen":[
+ 0
+ ],
+ "persoStringLen":[
+ 0,
+ 256
+ ],
+ "additionalInputLen":[
+ 0,
+ 256
+ ],
+ "returnedBitsLen":512
+ }
+ ]
+ },
+
+ Signed-off-by: Stephan Mueller <smueller@chronox.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 27 13:47:46 2018 +0100
+
+ Fix session description info printing
+
+ This fixes a truncation issue in session description information printing
+ for certain ciphersuites, and adds a limited testing of expected description
+ strings for certain ciphersuites.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 20 11:30:22 2018 +0100
+
+ Prevent applications from combining legacy versions of TLS with TLS1.3
+
+ It can happen that an application due to a misconfiguration, enables TLS1.3
+ in combination with TLS1.0 or TLS1.1 only. In that case a server which is
+ unaware of the TLS1.3 protocol will reply by selecting the TLS1.2 protocol
+ instead and that answer will be rejected by the client. With this change
+ we ensure that TLS1.3 is not enabled in these problematic scenarios.
+
+ Resolves: #621
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 21 18:35:07 2018 +0300
+
+ cert-tests: verify --no-text switch for pkcs7/pkcs12 info
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 16 03:46:52 2018 +0300
+
+ certtool: don't output textual information if --no-text was given
+
+ Disable text output if --no-text option was given for --p7-info and
+ --p12-info.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 21 20:05:20 2018 +0300
+
+ certtool: don't output pkcs12 information to stderr
+
+ Print all pkcs12-info output to outfile, rather than stderr.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 21 18:35:07 2018 +0300
+
+ cert-tests: verify --no-text switch for cert/crq/pub/privkeys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 16 03:46:52 2018 +0300
+
+ certtool: don't output textual information if --no-text was given
+
+ Change privkey/certificate/CRL/CSR handling to disable text output if
+ --no-text option was given.
+
+ Closes #487
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Mon Nov 19 11:47:45 2018 -0500
+
+ tests: tpm: Use kill_proc to terminate a process
+
+ Use kill_proc to terminate a process by first sending it SIGTERM,
+ waiting max. 1 second and then use SIGKILL.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Mon Nov 19 11:19:53 2018 -0500
+
+ tests: tpm: Redirect help screen output to stdout
+
+ The dash shell doesn't seem to understand &>/dev/null, so use
+ >/dev/null to quiet down the help screen check.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 24 16:59:12 2018 +0100
+
+ doc: suggest to check max_early_data_size before sending early data
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 22 14:59:54 2018 +0100
+
+ tests: resume: suppress compiler warnings
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Stephan Mueller <smueller@chronox.de>
+Date: Sun Nov 25 13:46:44 2018 +0100
+
+ DRBG: Remove all traces of FIPS 140-2 continuous self test
+
+ The removal allows the CAVS / ACVP test required for a successful FIPS
+ 140-2 validation to pass.
+
+ Signed-off-by: Stephan Mueller <smueller@chronox.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 22 15:04:00 2018 +0100
+
+ .gitignore: ignore more files and sort them alphabetically
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Nov 24 15:58:48 2018 +0100
+
+ bootstrap.conf: add "autogen" to buildreq
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 24 15:57:11 2018 +0100
+
+ build: fix srcdir detection when VPATH build
+
+ Unlike the ".c.c.bak:" and ".h.h.bak:" rules, ".def.stamp:" needs this
+ adjustment because the source files (*.bak) are not provided as $<.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sat Nov 24 16:00:48 2018 +0100
+
+ tests: remove unnecessary session creation in tls13/anti_replay
+
+ This test only checks the behavior of _gnutls_anti_replay_check, thus
+ session is not needed at all.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 21 21:09:55 2018 +0100
+
+ doc: corrected typos [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 19 14:16:50 2018 +0100
+
+ tests: added test for RSA decryption under gnutls_privkey_import_ext4
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 19 14:07:39 2018 +0100
+
+ crypto-self-tests-pk: added RSA-PSS sign/verify tests
+
+ This also corrects the GOST R 34.10-2012-512-TC26-512-A self
+ test.
+
+ Relates: #597
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 16 21:04:49 2018 +0100
+
+ tests: added TLS1.3 tests for PKCS#11 and external key types
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Thu Oct 25 10:03:01 2018 -0400
+
+ Add support for EDDSA/Ed25519 object support via PKCS#11
+
+ Tested with softHSM 2.5.0
+
+ Resolves #417
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Thu Oct 25 10:44:14 2018 -0400
+
+ Fix RSA-PSS tests to properly return skip value
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 18 20:22:08 2018 +0100
+
+ gnutls_certificate_type_get*: updated documentation to list limitations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 19 06:50:55 2018 +0100
+
+ tests: resume: use spaces around '?' and ':' according to coding style
+
+ Also set a link to the kernel coding style in CONTRIBUTIONS.md
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 14 15:20:08 2018 +0100
+
+ gnutls_certificate_type_get*: ensure that the default type is returned
+
+ That is, ensure that unless we negotiate something else than
+ X509, the default certificate type is returned to applications.
+ Previously we wouldn't do that for TLS1.3 resumed sessions, and
+ we would return zero (invalid type) instead.
+
+ That addresses issues with applications checking explicitly
+ for X509 certificate type being present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 16 16:13:31 2018 +0100
+
+ tests/tls13-early-data: check if max_early_data_size is advertised
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 16 14:25:49 2018 +0100
+
+ serv: add --maxearlydata option
+
+ Also exercise this in testcompat-tls13-openssl.sh.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Nov 18 05:47:08 2018 +0100
+
+ record: gnutls_record_send_early_data: check the upper limit
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 16 16:12:13 2018 +0100
+
+ tls13/session_ticket: fix "max_early_data_size" extension handling
+
+ session->security_parameters.max_early_data_size is initially set to 0.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 17 19:30:20 2018 +0100
+
+ update documentation on GNUTLS_AUTO_REAUTH and gnutls_record_get_direction [ci skip]
+
+ That clarifiesthe intention, and adds warning of using this flag when
+ multiple threads are involved. Based on suggestion by Michael Catanzaro.
+
+ Relates: #615
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 16 21:16:33 2018 +0100
+
+ .gitlab-ci.yml: run coverage build over fedora
+
+ This will include the TPM subsystem in the coverage report.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Fri Nov 16 10:47:23 2018 -0500
+
+ tests: tpm: Extend test case to not use --register
+
+ Extend the tpmtool test case to also test without the --register
+ parameter.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Wed Nov 14 10:07:08 2018 -0500
+
+ tests: tpm: Add a test case for tpmtool
+
+ This test case exercises tpmtool and uses certtool to create a
+ self-signed certificate with the TPM. It uses swtpm as TPM emulator and
+ configures tcsd to talk to swtpm.
+
+ Extend the Readme.md with the packages needed for TPM support and TPM test
+ support.
+
+ This test case needs to be run as root since tcsd needs to be started
+ as root.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Fri Nov 16 06:48:01 2018 -0500
+
+ .gitlab-ci.yml: copy the log files of minimal.Fedora to the gitlab server
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Thu Nov 15 19:55:02 2018 -0500
+
+ lib: tpm: Fix a memory leak
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 16 03:38:38 2018 +0300
+
+ doc: mention GOST private key unmasking and additional format support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 11:25:17 2018 +0300
+
+ cert-tests: test parsing and decoding of GOST private keys
+
+ Add a test for parsing and decoding GOST private keys in different
+ formats, incuding encrypted keys.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 11:23:37 2018 +0300
+
+ certtool: support --pkcs-cipher none
+
+ If password is specified on command line currently certtool will always
+ output encrypted pkcs8 file. Add `--pkcs-cipher none' allowing one to
+ force certtool to output unencrypted private keys.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 03:02:35 2018 +0300
+
+ nettle/gost: gostdsa: use size_t instead of mp_limb_t
+
+ Use size_t for size variables instead of mp_limb_t (data type rather
+ than size type).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 02:48:05 2018 +0300
+
+ pkcs8: support GOST keys without encapsulation
+
+ Add support for yet another representation of GOST private keys:
+ LE-formatted number encoded into pkcs-8-PrivateKeyInfo.privateKey
+ without any additional encapsulation.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 02:47:39 2018 +0300
+
+ nettle: unmaks GOST private keys if necessary
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 13 02:45:18 2018 +0300
+
+ nettle/gost: support GOST key unmasking
+
+ New Russian reccomendation defines 'key masking' in the form of
+ several concatenated numbers, which must be multiplied modulo Q to get
+ private key.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Thu Nov 15 12:43:01 2018 -0500
+
+ tpmtool: Fix a memory leak related to TPM key list
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 15 16:03:38 2018 +0100
+
+ updated auto-generated-files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 14 13:56:52 2018 +0100
+
+ anti_replay: moved new add function into anti_replay structure
+
+ The new function was not sharing anything with the existing
+ gnutls_db_* backend, and moving it to anti_replay structure
+ is more clean and allows for deviations from the old API
+ conventions (e.g., now we can pass pointers for efficiency
+ and pass the expiration time as part of the call).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 13 22:49:26 2018 +0100
+
+ _gnutls_x509_read_eddsa_pubkey(): sanity check the input values
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 13 09:24:06 2018 +0100
+
+ gnutls_x509_privkey_import_ecc_raw(): fail on invalid sizes
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 11 08:25:56 2018 +0100
+
+ tests: verify whether certificate request levels behave consistently
+
+ This verifies whether the behavior of GNUTLS_CERT_IGNORE, GNUTLS_CERT_REQUEST
+ and GNUTLS_CERT_REQUIRE is consistent accross protocols.
+
+ Relates #615
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 11 08:52:13 2018 +0100
+
+ doc: minor updates in elliptic curve documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 14 13:42:01 2018 +0100
+
+ tests: added a test for detecting duplicate early data
+
+ Resolves #610
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 14 01:43:05 2018 +0300
+
+ tests: add testfile from RFC4134 Section 4.5
+
+ Add test example demonstrating indefinite-length BER encoding of PKCS#7
+ data.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 12 03:34:31 2018 +0300
+
+ pkcs7: allow BER encoding when parsing encapContentInfo.eContent
+
+ CMS specification explicitly allows BER encoding in CMS files. RFC 4134
+ example 4.5 uses BER indefinite encoding.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 14 01:49:08 2018 +0300
+
+ configure.ac: drop obsolete info line
+
+ Since 4b567871 there is no `ac_enable_session_tickets` variable, so
+ let's drop obsolete remnants.
+
+ Closes #616
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Noted-by: Dilyan Palauzov
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 13 10:07:09 2018 +0100
+
+ build: minor cleanup of mech-list.h generation
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 13 10:02:17 2018 +0100
+
+ README-ci.freebsd.md: require autogen
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 12 13:41:19 2018 +0100
+
+ build: remove autogen .bak files from the repository
+
+ While the .bak files are necessary for not requiring autogen on
+ deployment environment, they are not needed for development and may
+ cause conflict when other developers use different version of
+ autogen. This removes those files from the repository and require
+ autogen at make dist time.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 12 15:48:44 2018 +0100
+
+ build: use suffix rules for generating .bak files
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Nov 12 15:48:14 2018 +0100
+
+ build: use AM_MISSING_PROG for autogen
+
+ That makes error message more friendly when autogen is not installed
+ on developing environment.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Mon Nov 12 09:20:44 2018 -0500
+
+ tpm: Fix memory leak in encode_tpmkey_url
+
+ When returning the key URL in encode_tpm_key_url we do not need to allocate
+ a separate buffer for the URL since we return the allocated buffer from
+ _gnutls_buffer_to_datum().
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 15 13:35:43 2018 +0200
+
+ doc: mention 0-RTT
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 21 07:34:07 2018 +0200
+
+ serv: enable anti-replay when early data is used
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 19 17:52:48 2018 +0200
+
+ TLS 1.3: implement anti-replay measure using ClientHello recording
+
+ This implements ClientHello recording outlined in section 8.2 of RFC
+ 8446.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 1 15:37:42 2018 +0100
+
+ db: introduce gnutls_db_set_add_function
+
+ This adds a way to store an entry if it is not found in the database,
+ so that the implementation can provide atomic test-and-set.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 8 17:54:11 2018 +0100
+
+ db: introduce gnutls_db_check_entry_expire_time
+
+ This would be particularly useful when the same database is used to
+ store long-lived TLS 1.2 session data and short-lived TLS 1.3
+ anti-replay entries. Note that the existing gnutls_db_check_entry
+ doesn't fit in this use-case, as it takes gnutls_session_t as the
+ argument.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 22 15:26:07 2018 +0200
+
+ tls13/session_ticket: record timestamp in ticket
+
+ This is needed for implementing freshness checks outlined in 8.3 of
+ RFC 8446.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 8 15:46:42 2018 +0100
+
+ str: suppress compiler warning when time_t is 32-bit
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 22 11:12:02 2018 +0200
+
+ testcompat-tls13-openssl: exercise early data transmission
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Oct 15 11:29:56 2018 +0200
+
+ tests: add tests for early data
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 13:33:13 2018 +0200
+
+ cli: add --earlydata option
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 13:33:00 2018 +0200
+
+ serv: add --earlydata option
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 13:34:21 2018 +0200
+
+ record: introduce new API functions for early data
+
+ This introduces gnutls_record_get_max_early_data_size(),
+ gnutls_record_send_early_data(), and gnutls_record_recv_early_data()
+ functions.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 11:45:59 2018 +0200
+
+ handshake: handle early data
+
+ This plumbers early data handling in the handshake processes, which
+ consists of:
+ - traffic key updates taking into account of client_early_traffic_secret
+ - early data buffering in both server and client
+ - the EndOfEarlyData message handling
+ - making use of max_early_data_size extension in NewSessionTicket
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 28 07:57:34 2018 +0100
+
+ session_pack: record max_early_data_size in session data
+
+ max_early_data_size sent as part of NST should be recorded and
+ restored when the session data is set back on the session.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Sun Oct 28 07:57:57 2018 +0100
+
+ record: fix memleak when rejecting early data
+
+ The "discard" label previously used assumes that the decrypted record
+ is already added to record_recv_buffer. It is not the case when
+ rejecting early data. Release the allocated memory manually and
+ return early.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 17:10:51 2018 +0200
+
+ constate: add epoch_rel argument to _gnutls_epoch_dup
+
+ This is necessary for handling early data. Previously,
+ _gnutls_epoch_dup() copied the parameters from EPOCH_READ_CURRENT,
+ while the client only sets EPOCH_WRITE_CURRENT when sending early
+ data. This allows caller to specify from which epoch the parameters
+ are copied.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 12 11:29:57 2018 +0200
+
+ handshake: refactor early secret derivation
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 5 10:41:23 2018 +0200
+
+ handshake: record transcript hash for ClientHello
+
+ This is necessary to compute client_early_traffic_secret and
+ early_exporter_master_secret in TLS 1.3.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 5 11:13:24 2018 +0200
+
+ ext/pre_shared_key: use predefined macros for secret labels
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Nov 6 09:38:43 2018 +0100
+
+ Unconditionally include nettle/memxor.h
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 10 10:54:32 2018 +0100
+
+ gnutls-cli: use assert to mark impossible path
+
+ This avoids static analyzers from complaining.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 10 07:46:24 2018 +0100
+
+ pkcs12: cleanups, and two memory leak fixes
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 9 07:44:02 2018 +0100
+
+ tls13: use system's openssl for interop testing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 9 20:11:42 2018 +0100
+
+ Added checks to avoid false negatives reported by static analyzers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 6 14:47:41 2018 +0300
+
+ src: update autogenerated .bak files
+
+ Update files to include proper year, version, etc.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 6 14:42:56 2018 +0300
+
+ src: include .bak files in EXTRA_DIST
+
+ Including .bak files in EXTRA_DIST allows us to stop hand-generating
+ these files in distribution. Instead they are directly copied from the
+ source tree.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 6 14:34:18 2018 +0300
+
+ src: update .bak files during -args.c/.h regeneration
+
+ To ease updating of .bak files, update them when regenerating
+ Autogen'erated source files.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 6 12:01:49 2018 +0300
+
+ doc: fix texi generation in out-of-tree builds
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 6 10:52:47 2018 +0300
+
+ src: mark autogen'ed sources as nodist_
+
+ Mark autogenerated sources as not distributable. We are distributing
+ .bak files instead.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 16:37:02 2018 +0300
+
+ Makefile.am: drop manpages regeneration from dist-hook
+
+ There is no need anymore to regenerate tools manpages, they will be
+ generated automatically from doc/manpages/Makefile.am.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 16:22:25 2018 +0300
+
+ manpages: fix manpages distribution
+
+ It seems that dist_man_MANS does not work properly with Automake
+ conditionals. Automake will not distribute files which are conditionally
+ disabled at this make run. As released tarballs include all manpages
+ already, let's include them unconditionally.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 15:02:50 2018 +0300
+
+ manpages: fix tools manpages generation
+
+ Pass additional include path to let autogen find common arguments
+ template.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 14:53:46 2018 +0300
+
+ manpages: un-unroll the loop
+
+ Replace unrolled loop over header files with for-loop to simplify
+ Makefile.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 14:30:53 2018 +0300
+
+ configure.ac: merge autogen/libopts checks
+
+ Move handling of autogen/libopts to a single place. Enforce usage of
+ local libopts if autogen is not found.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 13:12:51 2018 +0300
+
+ doc: fix documentation generation in out-of-tree builds
+
+ gtk-doc will not process gnutls.h.in file, so we need to point it to
+ generated gnutls.h file, found inside builddir.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 5 00:43:55 2018 +0300
+
+ cfg.mk: fix ChangeLog generation on out-of-tree builds
+
+ ChangeLog regeneration does not work for out-of-tree build, so let's fix
+ that.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Nov 4 14:29:11 2018 +0300
+
+ src: args-std.def: substitute variables using configure
+
+ Use standard way (configure script) to substiture variables in
+ args-std.def file, instead of manually replacing them in dist-hook.
+
+ Fixes #567
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 9 20:07:24 2018 +0100
+
+ Initialize output var to avoid false negative from static analyzers
+
+ This was identified by clang analyzer's on _gnutls_x509_dn_to_string
+ and _gnutls_x509_decode_string.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 5 20:51:33 2018 +0100
+
+ .gitlab-ci.yml: move to fedora29 for CI
+
+ This also moves the x86 CI builds to the debian cross infrastructure
+ as we have a more reliable way of generating a 32-bit image.
+
+ Resolves #607
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Stefan Berger <stefanb@linux.ibm.com>
+Date: Fri Nov 2 18:33:32 2018 -0400
+
+ tpmtool: Support --srk-well-known for SRK with 20 zero bytes password
+
+ Implement --srk-well-known for SRK with 20 zero bytes password.
+
+ Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 7 09:56:56 2018 +0100
+
+ testcompat-openssl: do not test DSS or small curves with 1.1.1
+
+ DSA uses 1024-bit parameters, and these together with curves of
+ less than 256 bits are not accepted by debian's openssl.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 7 10:20:32 2018 +0100
+
+ doc/credentials: increased key size in RSA client cert
+
+ This is used by the test suite and recent openssl in debian requires
+ a larger certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 7 10:16:10 2018 +0100
+
+ certtool: allow --update-certificate to replace public key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 7 08:37:23 2018 +0100
+
+ README.md: updated instructions to apply to fedora29
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Thu Oct 4 14:57:47 2018 +0200
+
+ Update docs for session ticket key rotation [ci skip]
+
+ Fix #581.
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Nov 1 13:43:17 2018 +0100
+
+ ext/record_size_limit: handle the extension in TLS 1.2 ServerHello
+
+ Previously it had assumed that TLS 1.2 servers don't send the
+ extension, while actually it can be present in ServerHello.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 30 19:56:47 2018 +0100
+
+ gnutls_priority_init: ignore CTYPE-OPENPGP options
+
+ In GnuTLS 3.6.0 we dropped support for openpgp keys, however
+ the CTYPE-OPENPGP is often seen in applications, sometimes
+ as -CTYPE-OPENPGP to ensure it is not enabled. We simply
+ ignore this priority string when seen, to avoid preventing
+ these applications from running.
+
+ Resolves #593
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 30 19:46:09 2018 +0100
+
+ gnutls_priority_init: fixed indentation according to project rules
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 19 12:04:29 2018 +0200
+
+ gnutls_priority_set: re-organized
+
+ The sanity tests we moved prior to setting these priorities
+ and the %GNUTLS_E_NO_PRIORITIES_WERE_SET error code is returned
+ consistently to indicate that the existing priorities were not
+ overwritten.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 17 14:53:47 2018 +0200
+
+ gnutls_priority_set: do not override the version after handshake is complete
+
+ When an application would re-set priorities prior to a rehandshake
+ we would override the negotiated version with the highest supported,
+ something which may lead to issues. This disables that unnecessary
+ version override. See:
+
+ https://bugzilla.redhat.com/show_bug.cgi?id=1634736
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 30 10:28:20 2018 +0100
+
+ gnutls-serv: use default priorities when none are given
+
+ This makes it in par with gnutls-cli.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 29 01:42:28 2018 +0300
+
+ self-tests: add GOST public key tests
+
+ Test vectors provided in standard are not that usefull (they use
+ unsupported curves with a != -3), so these test vectors were generated
+ by hand.
+
+ Fixes #492
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 29 07:24:01 2018 +0100
+
+ NEWS: added CMAC entries [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Sun Oct 28 12:19:46 2018 -0400
+
+ Add NEWS entry about AES-CMAC
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri Oct 26 16:55:27 2018 -0400
+
+ Add selftests for CMAC
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri Oct 26 13:38:13 2018 -0400
+
+ Vendor in CMAC functionality from Nettle
+
+ If nettle's CMAC is not available, use a vendored in version from master.
+ This is necessary as long as we need to link against 3.4 for ABI
+ compatibility reasons.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Fri Oct 26 13:22:23 2018 -0400
+
+ Add CMAC Support
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 28 15:44:15 2018 +0300
+
+ NEWS: Add entry mentioning fix of S-BOXes for CryptoPro-B,-C,-D variants
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 28 10:13:00 2018 +0300
+
+ self-tests: add GOST symmetric algorithms tests
+
+ Add tests for:
+ - GOST 28147-89 CFB cipher
+ - GOST R 34.11-94 hash function
+ - Streebog-256/-512 hash functions
+ - HMAC using GOST R 34.11-94/Streebog functions
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Oct 28 10:11:21 2018 +0300
+
+ nettle: fix s-boxes selection for rare GOST 28147-89 variants
+
+ gost28147-89 code contained c&p error, which resulted in using S-BOX
+ CryptoPro-A instead of -B, -C, -D. Fix that.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 26 22:50:52 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Oct 24 13:08:45 2018 +0200
+
+ ext/pre_shared_key: don't assume ob_ticket_age < ticket_age_add
+
+ Previously, the server treated the condition as error, while it is
+ possible that ob_ticket_age may have wrapped round by 2^32.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 25 12:32:52 2018 +0200
+
+ tls13/session_ticket: calculate ticket_age in milliseconds
+
+ Previously we calculated ticket age from the current wall clock in
+ seconds, multiplying by 1000. This is conceptually wrong, because
+ ticket age is designed to be in milliseconds.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Oct 26 08:18:01 2018 +0200
+
+ str: add macros to encode/decode struct timespec value
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 25 13:47:13 2018 +0200
+
+ system: provide a means to replace gettime implementation
+
+ While gettime() is extensively used in the code, the library
+ previously hadn't provided a way to replace it for testing. This adds
+ a new internal function _gnutls_global_set_gettime_function and makes
+ use of it through virt-time.h.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed Oct 24 15:45:23 2018 -0400
+
+ Add selftest for CFB8
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 25 12:09:05 2018 +0200
+
+ _gnutls_timespec_cmp: new inline function
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Oct 25 12:02:53 2018 +0200
+
+ tls13/session_ticket: rename tls13_ticket_t type to tls13_ticket_st
+
+ This is consistent with the coding guideline.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 25 08:29:27 2018 +0200
+
+ gnutls-cli: reduce printed session information
+
+ When connecting to a server we were printing a lot of duplicate
+ information that was already part of the "Description" string.
+ No longer print that information unless --verbose is given.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 24 13:05:58 2018 +0200
+
+ gnutls-cli: do not print errors twice
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed Oct 24 13:04:22 2018 -0400
+
+ Vendor in CFB8 functionality from Nettle
+
+ If nettle's CFB8 is not available, use a vendored in version from master.
+ This is necessary as long as we need to link against 3.4 for ABI
+ compatibility reasons.
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Simo Sorce <simo@redhat.com>
+Date: Wed Oct 24 12:14:51 2018 -0400
+
+ Add AES-CFB8 Support
+
+ Signed-off-by: Simo Sorce <simo@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 15 15:59:48 2018 +0200
+
+ p11tool: fix initialization of security officer's PIN
+
+ Previously we would call gnutls_pkcs11_token_set_pin() without an
+ old PIN provided, which will result to the use of C_InitPIN() on the
+ underlying module. The C_InitPIN() in contrast with C_SetPIN() will
+ only work for the user and not for the administrator. As such, we
+ always provide the oldpin for when we change the admin's PIN.
+
+ Resolves #561
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 23 15:20:45 2018 +0200
+
+ fips140: aligned code with documentation
+
+ That is, we introduce the documented but unimplemented macros
+ GNUTLS_FIPS140_SET_LAX_MODE() and GNUTLS_FIPS140_SET_STRICT_MODE().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon Oct 22 10:52:08 2018 +0200
+
+ Simplified check for NULL pointer to reduce code changes.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon Oct 22 10:51:19 2018 +0200
+
+ Unified abbreviation for certificate type priorities in code.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Oct 11 21:25:11 2018 +0200
+
+ Renamed CHECK_AUTH macro to CHECK_AUTH_TYPE to be more clear what it checks.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Oct 11 21:13:45 2018 +0200
+
+ Renamed _gnutls_server_select_cert() to _gnutls_select_server_cert() for consistency reasons with its client couterpart.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Oct 11 21:05:33 2018 +0200
+
+ Renamed certificate_credential_append_crt_list() to certificate_credential_append_keypair().
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Thu Oct 11 21:01:25 2018 +0200
+
+ Renamed _gnutls_auth_info_set() to _gnutls_auth_info_init().
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Wed May 23 10:16:00 2018 +0200
+
+ Renamed fields in priority_st to improve code readability. Fixes #453.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Tue May 22 12:35:31 2018 +0200
+
+ Added NULL pointer check in gnutls_certificate_free_credentials for safety.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon May 21 10:11:28 2018 +0200
+
+ Renamed _gnutls_proc_x509_server_crt to _gnutls_proc_x509_crt.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sat May 19 16:01:01 2018 +0200
+
+ Small fixes for comments and log strings.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Oct 18 11:09:09 2018 +0200
+
+ SKIP tests/global-init-override if weak symbols don't work
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 16 15:06:04 2018 +0200
+
+ tests: eagain-auto-auth: only compiled in systems with cmocka available
+
+ This fixes build issue at MacOSX CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 12 16:36:12 2018 +0200
+
+ tlsfuzzer: updated to latest upstream and enabled new tests
+
+ Resolves: #591
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 12 17:08:15 2018 +0200
+
+ handshake: send missing extension alert
+
+ When a key share extension is not seen under TLS1.3, send
+ the missing extension alert.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 4 08:27:10 2018 +0200
+
+ _gnutls_server_select_cert: return error when no server cert is selected
+
+ When a certificate callback is used and no certificate is provided
+ by it, return an error rather than trying to use it (and crashing)
+ later. Note that this affects only an "illegal" code path when
+ a server would have provided no certificate, something which must
+ not happen on a real-world server.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 1 11:58:15 2018 +0200
+
+ gnutls_init: added flag for automatic re-authentication
+
+ This introduces the GNUTLS_AUTO_REAUTH gnutls_init() flag and makes
+ re-authentication under TLS simpler to enable and use.
+
+ Resolves #571
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 29 14:21:59 2018 +0200
+
+ pkcs11 uris: the URI scheme is case insensitive
+
+ Makes the comparisons of the URI scheme to use c_strcasecmp
+ from gnulib. It also replaces various straw strcasecmp with
+ the gnulib variant. This ensures that comparison will be
+ reliable irrespective of the locale.
+
+ Resolves #590
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 11 21:49:11 2018 +0200
+
+ .gitlab-ci.yml: cross CI requires privileged systems
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Oct 9 12:46:12 2018 +0200
+
+ Fix check for GNU C compiler in eina_cpu.c
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Oct 9 12:34:26 2018 +0200
+
+ Fix gen-mech-list.sh on Solaris / Bourne Shell
+
+ `cmd` is more compatible than $(cmd).
+
+ The shell is "sh (Schily Bourne Shell) version 2013/01/14 a+ (i386-pc-solaris2.9)"
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Oct 5 19:41:15 2018 +0200
+
+ Let bootstrap check for gperf and autopoint
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Oct 8 11:25:23 2018 +0200
+
+ Skip tests/tls13/prf.c if visibility 'protected' doesn't work
+
+ Overriding gnutls_rnd() with visibility 'protected' doesn't always work.
+ E.g. LDFLAGS="-Wl,-Bsymbolic-functions" seems to have priority on
+ Debian derived systems.
+
+ Fixes #584
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 6 16:43:33 2018 +0200
+
+ tests: added unit test for gnutls_session_set_id
+
+ This adds a unit and a negative test which ensures that
+ a client will not be tricked in performing resumption when
+ this function is used.
+
+ Resolves #585
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 4 08:29:41 2018 +0200
+
+ doc: fix use of gnutls_ext_raw_parse callback [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 30 22:05:59 2018 +0200
+
+ gnutls_priority_set: do not override version on handshake
+
+ When handshake is in progress, do not override the default TLS
+ version in the session. This allows gnutls_priority_set to be called
+ in the post_client_hello function without breaking the handshake.
+
+ Resolves #580
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 2 11:57:31 2018 +0200
+
+ encrypt_packet_tls13: added explicit check on iv_size bounds
+
+ Although there are no ciphers defined for TLS1.3 which would overflow
+ the assumed bound, an explicit check is necessary to avoid that code
+ be a liability in future updates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 1 09:18:46 2018 +0200
+
+ privkey_pkcs8: added reference for validation parameters OID [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 1 08:31:16 2018 +0200
+
+ NEWS: corrected typo [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Sep 27 21:11:21 2018 +0200
+
+ Use ASCII version of strcasecmp() in library code
+
+ strcasecmp() has side effects in some locales.
+ What we really need is c_strcasecmp() from Gnulib for comparing
+ ASCII strings.
+
+ Fixes #570
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Sep 27 11:02:33 2018 +0300
+
+ .gitlab-ci.yml: reenable SSLv2 hello support for SSL-3.0.Fedora.x86_64
+
+ Reenable SSLv2 hello support to let several SSL-3.0 tls-fuzzer tests
+ pass.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Sep 27 01:05:09 2018 +0300
+
+ tlsfuzzer: disable SSL3.0 in export-ciphers-rejected test
+
+ These tests will fail with SSL3.0-enabled gnutls-serv unless --ssl3
+ option was passed. We will run these tests anyway from
+ gnutls-nocert-ssl3.json, so disable them here.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Sep 27 00:42:21 2018 +0300
+
+ tlsfuzzer: support running from separate build dir
+
+ Adapt tls-fuzzer-common.sh script to be able to run tests in case
+ srcdir != builddir.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 25 17:00:14 2018 +0300
+
+ .gitlab-ci.yml: reenable full test suite in SSL-3.0/SHA-1 case
+
+ Reenable full test suite run in SSL-3.0/SHA-1 CI test case to let us
+ catch issues in legacy code.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 24 16:07:19 2018 +0300
+
+ tlsfuzzer: add missing script
+
+ Makefile.am refers tls-fuzzer-nocert-ssl3.sh script, which is missing
+ in the source tree. Add it back.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Sep 27 00:35:20 2018 +0300
+
+ tlsfuzzer: move common code to separate file
+
+ Move common code to tls-fuzzer-common.sh to ease further adjustments.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Sep 26 23:34:16 2018 +0300
+
+ tlsfuzzer: use random port for tls-fuzzer-nocert test
+
+ Like the rest of tls-fuzzer tests, pass "-p PORT" to subtests, allowing
+ usage of random port for server.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Sep 26 23:34:16 2018 +0300
+
+ tlsfuzzer: use random port for tls-fuzzer-cert test
+
+ Like the rest of tls-fuzzer tests, pass "-p PORT" to subtests, allowing
+ usage of random port for server.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Sep 26 12:54:37 2018 +0200
+
+ Make tlsproxy/buffer.c compilable by gcc 4.4.7
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 26 09:38:04 2018 +0200
+
+ _gnutls_check_key_purpose: eliminated dead code
+
+ Resolves #573
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 25 13:52:25 2018 +0200
+
+ manpages: do not generate any manpages for openpgp.h
+
+ This API is no longer functional and is only available as stubs
+ for backwards binary compatibility.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 25 13:06:57 2018 +0200
+
+ manpage generation: cleanup
+
+ Recognize parameters of the form unsigned char name[8], and
+ do not print obscure warnings. Furthermore gdoc will fail
+ when a function parameter is not described or when no
+ function is found. This addresses the generation of undetected
+ errors in generated manpages.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 25 12:07:10 2018 +0200
+
+ doc: fixed missing function and enumeration parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 25 14:12:26 2018 +0200
+
+ tests: removed unused file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 25 18:10:12 2018 +0200
+
+ mech-list.h: generate unique entries
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 24 17:33:03 2018 +0200
+
+ released 3.6.4
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 21 16:31:58 2018 +0200
+
+ tests: pkcs12-utf8 depend on bash
+
+ The NetBSD default shell cannot handle the UTF-8 strings we use
+ in that script.
+
+ Resolves #544
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 21 16:20:36 2018 +0200
+
+ bumped versions and updated NEWS file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 21 16:18:23 2018 +0200
+
+ Enable the TLS1.3 protocol by default
+
+ As the protocol has been finalized, and the implementation is
+ stable and interoperable, there is no need to enable it conditionally.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 18 08:36:18 2018 +0200
+
+ gnutls-cli: enable CRL validation on startup
+
+ This also makes the failure in adding CRLs or CAs, a fatal error.
+
+ Resolves #564
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 20 16:44:51 2018 +0200
+
+ Provide a more flexible PKCS#11 search of trust store certificates
+
+ This addresses the problem where the CA certificate doesn't
+ have a subject key identifier whereas the end certificates
+ have an authority key identifier.
+
+ Resolves #569
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 18 08:35:32 2018 +0200
+
+ trust list: added flag to force failure on CRL validation error
+
+ This allows an application to be notified of the addition of invalid
+ CRLs in the trust list.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Sep 18 11:50:43 2018 +0200
+
+ Remove auto-generated src/mech-list.h from repo
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Sep 18 15:35:20 2018 +0200
+
+ Fix issue introduced in 20886264fe
+
+ This makes _gnutls_resolve_priorities() return a string that is always
+ allocated with the gnutls memory functions.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 19 14:15:20 2018 +0200
+
+ session tickets: check timestamp for validity
+
+ We were previously only relying on the client's view of the
+ ticket lifetime for TLS1.3 tickets. This makes sure that we
+ only resume tickets that the server considers valid and consolidates
+ the expiration time checks to _gnutls_check_resumed_params().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 20 10:11:42 2018 +0200
+
+ ECC export/import: updated documentation on EdDSA curves
+
+ This clarifies the format that parameters in the EdDSA curves
+ will be returned, and also ensures that the import/export
+ functions fail on unsupported curves.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 19 15:03:32 2018 +0200
+
+ tests: use virt-time.h in resumption tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Tue Sep 18 09:40:20 2018 +0200
+
+ Added session ticket key rotation with TOTP
+
+ This introduces session ticket key rotation on server side. The
+ key set with gnutls_session_ticket_enable_server() is used as a
+ master key to generate time-based keys for tickets. The rotation
+ relates to the gnutls_db_set_cache_expiration() period.
+
+ Resolves #184
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 18 03:05:51 2018 +0300
+
+ certtool: print GOST public key with MSB first
+
+ OpenSSL and other libraries print MSB first, when printing GOST public
+ keys. Let's return to this convention.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 18 03:05:51 2018 +0300
+
+ x509: print_pubkey: print GOST public key with MSB first
+
+ OpenSSL and other libraries print MSB first, when printing GOST public
+ keys. Let's return to this convention.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 18 00:53:17 2018 +0300
+
+ lib: use little endian when importing/exporting GOST keys
+
+ GOST R 34.10 native format is little endian. It is better for the
+ application code to use native format data to interface library, rather
+ than convert buffers on their own.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Sep 18 00:51:05 2018 +0300
+
+ mpi: add function to dprint mpi in little endianness
+
+ Add little endian counterpart to _gnutls_mpi_dprint and
+ _gnutls_mpi_dprint_le.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 17 12:26:31 2018 +0300
+
+ gnutls.h: correct GOST R number references [ci skip]
+
+ Fix numeric GOST R ids used in documentation, too many numbers:
+ - GOST R 34.11 is digest function
+ - GOST R 34.10-2001 is a digital signature over GOST R 34.11-94 digest
+ - GOST R 34.10-2012 is a digital signature over GOST R 34.11-2012 digest
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Sep 17 10:12:38 2018 +0200
+
+ Update git submodules via ./bootstrap
+
+ Setting $SUBMODULE_NOFETCH to a non-empty value adds
+ --no-fetch to the git command (for CI speedup).
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 17 15:14:12 2018 +0200
+
+ tests: pkcs1-pad: run with SHA-1 enabled or disabled
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 17 12:58:38 2018 +0200
+
+ .gitlab-ci.yml: enable run with SHA-1 enabled
+
+ This adds a CI run with SHA-1 enabled, and corrects issues in the
+ testsuite when that's the case.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 17 09:28:08 2018 +0200
+
+ gnutls_x509_trust_list_add_trust_mem: fix behavior with unaccounted certs
+
+ If gnutls_x509_trust_list_add_cas returns less than clist_size, the additional
+ unaccounted certificates will never be freed.
+
+ Relates #552
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 17 09:12:29 2018 +0200
+
+ gnutls_x509_trust_list_add_cas: corrected return value
+
+ When the flag GNUTLS_TL_USE_IN_TLS is used and add_new_ca_to_rdn_seq
+ the return value did not include the last certificate added to the
+ list. This corrects its return value.
+
+ Relates #552
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 17 09:10:24 2018 +0200
+
+ fixed documentation in trust list functions
+
+ That clarifies and addresses issues in the documentation of
+ gnutls_x509_trust_list_add_crls() and gnutls_x509_trust_list_add_cas()
+
+ Relates #552
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 16 15:54:41 2018 +0200
+
+ tests: added CRL verification tests
+
+ This tests CRL verification with certtool --verify-crl on correct
+ and incorrect cases.
+
+ Relates #564
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 16 15:35:19 2018 +0200
+
+ certtool: updates in documentation in messages for CRL generation
+
+ This fixes the messages printed for the generation of a CRL, and
+ makes the return code of the CRL verification depending on the
+ verification result.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 14 16:32:05 2018 +0200
+
+ Fix variable used in reallocation
+
+ This corrects the variable name used in the sizeof argument
+ for realloc. This does not alter the actual allocation size,
+ but rather it fixes a logic error.
+
+ Relates: #554
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 22 15:25:06 2018 +0200
+
+ .gitignore: updated
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 22 10:08:41 2018 +0200
+
+ dtls: recover when a NewSessionTicket message is lost
+
+ When the server's NewSessionTicket gets lost while the ChangeCipherSpec
+ goes through, the client did not request retransmission by retransmitting
+ his last flight, and the handshake was blocked. This commit addresses
+ the issue and adds a reproducer.
+
+ Resolves #543
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Aug 27 17:44:35 2018 +0200
+
+ tlsfuzzer: remove duplicate tests and sort them alphabetically
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Andreas Schwab <schwab@suse.de>
+Date: Mon Sep 10 17:35:08 2018 +0200
+
+ doc: fix reference to invocation nodes
+
+ Signed-off-by: Andreas Schwab <schwab@suse.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 20 15:17:04 2018 +0200
+
+ priority: be backwards compatible with priority strings starting with NONE
+
+ That is, we allow priority strings which do not enable any groups to
+ work, by disabling TLS1.3. For example
+ 'NONE:+VERS-TLS-ALL:+MAC-ALL:+RSA:+AES-128-GCM:+SIGN-ALL:+COMP-NULL'
+ is still operational, but no TLS1.3 is enabled when specified.
+
+ Resolves: #549
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 24 16:34:14 2018 +0200
+
+ Use gnutls_strdup() instead of strdup() in library code
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 24 16:27:36 2018 +0200
+
+ Remove gnulib work-around '#undef strdup'
+
+ The 'issue' should be fixed already. Even if not, it has to
+ addressed in gnulib.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 21 15:02:56 2018 +0200
+
+ ext/pre_shared_key: use consistent name for regitration entry
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 21 14:54:41 2018 +0200
+
+ ext/pre_shared_key: make ticket age calculation consistent
+
+ Previously we used a pattern like this:
+
+ uint32_t obfuscated_ticket_age, ticket_age_add;
+ time_t ticket_age;
+
+ ticket_age = obfuscated_ticket_age - ticket_age_add;
+ if (ticket_age < 0) {
+ ...
+ }
+
+ This always evaluates to false, because subtraction between unsigned
+ integers yields an unsigned integer. Let's do the comparison before
+ subtraction and also use correct types for representing time: uint32_t
+ for protocol time and time_t for system time.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Aug 17 15:45:20 2018 +0200
+
+ tls13/psk_ext_parser: simplify the iterator interface
+
+ Previously it was unclear whether psk_ext_parser_st is stateful or
+ not. This change introduces the simpler API to iterate over the
+ immutable data (psk_ext_parser_st), following the iterator pattern.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 21 16:18:11 2018 +0200
+
+ gnutls-cli-debug: mention RFC8446 for TLS1.3 and RFC8422 for X25519
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Aug 21 13:10:48 2018 +0200
+
+ Remove --no-git from ./bootstrap [ci skip]
+
+ This removes the --no-git option as bootstrap itself does not use
+ the remote repository for cloning. At least as long $GNULIB_SRCDIR
+ points to a recent enough local gnulib git repo.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 14:02:34 2018 +0200
+
+ handshake: do not negotiate TLS1.3 using the legacy version field
+
+ Previously we could end-up with a TLS1.3 connection if the TLS1.3
+ ID was seen on the wire. We now explicitly fallback to TLS1.2
+ when we see a protocol with TLS1.3 semantics in an SSL2.0 or
+ in the legacy version of the client hello.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 12:57:25 2018 +0200
+
+ handshake: simplified protocol version checking functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 10:50:15 2018 +0200
+
+ tlsfuzzer: modify to use the final code points
+
+ Relates #542
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 20:55:50 2018 +0200
+
+ fuzz: updated traces for final TLS1.3 version
+
+ Resolves #359
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 20:46:21 2018 +0200
+
+ protocols: bumped TLS1.3 version number to RFC8446 value
+
+ This adds support of the final RFC numbers.
+
+ Resolves #542
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Wed Aug 15 18:29:32 2018 +0200
+
+ Implemented RFC7250 certificate type negotiation extensions.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Aug 10 14:06:16 2018 +0200
+
+ ext/record_size_limit: new extension
+
+ This implements the record_size_limit extension as defined in RFC 8449.
+
+ Although it obsoletes the max_record_size extension, for compatibility
+ reasons GnuTLS still sends it on certain occasions. For example, when
+ the new size is representable as the codepoint defined for
+ max_record_size.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 14 16:46:12 2018 +0200
+
+ ext/max_record: remove use of extension private data
+
+ As the extension data is always stored in
+ session->security_parameters.max_record_send_size, it shouldn't be
+ necessary to track it with the private data.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 14:43:30 2018 +0200
+
+ gnutls_session_resumption_requested: fixed behavior under TLS1.3
+
+ This makes gnutls_session_resumption_requested() functional under
+ TLS1.3 and introduces a unit test of the function.
+
+ Resolves #546
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 19 18:59:02 2018 +0200
+
+ .gitlab-ci.yml: use --no-git to bootstrap
+
+ That is, to reduce CI time, and avoid failures due to
+ non-availability of the gnulib git repo.
+
+ Resolves #547
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 14:48:56 2018 +0200
+
+ hello_ext: removed bogus comment
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 17 16:08:37 2018 +0200
+
+ .gitmodules: gnulib submodule is now synced from libidn's mirror
+
+ This mirror is updated hourly and is hosted on gitlab, meaning
+ less dependency on external sites downtime.
+
+ Resolves: #547
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Aug 15 14:20:43 2018 +0200
+
+ Fix two typos (overriden/guarranteed)
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 21:47:53 2018 +0200
+
+ doc: document the non-portability of NONE priority string
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 20:22:48 2018 +0200
+
+ tools: check output of called functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 20:19:55 2018 +0200
+
+ write_oid_and_params: moved nullity check of params earlier
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 9 16:13:50 2018 +0200
+
+ gnutls_session_set_premaster: corrected error checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 9 16:12:36 2018 +0200
+
+ pubkey_verify_hashed_data: apply algorithm checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 9 16:09:21 2018 +0200
+
+ privkey_sign_raw_data: use assert to mark code which always succeeds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 9 16:05:47 2018 +0200
+
+ _gnutls_send_change_cipher_spec: removed unnecessary test
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 13 21:04:56 2018 +0200
+
+ .travis.yml: do not run brew upgrade
+
+ This addresses issue with travis compilation on MacOSX.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 7 16:27:19 2018 +0200
+
+ gnutls_memset: use explicit_bzero
+
+ That is, use the glibc function when available and the second
+ parameter is zero.
+
+ Resolves #230
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 7 09:52:55 2018 +0200
+
+ use a consistent method to mark fall-through in switch cases
+
+ Also document that method in contribution guide.
+
+ Resolves #306
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 7 14:45:07 2018 +0200
+
+ ext/pre_shared_key: prevent crash if no server credentials are set
+
+ Previously, if server is configured without PSK credentials and the
+ client authenticated with PSK, the server crashed with:
+
+ Program received signal SIGSEGV, Segmentation fault.
+ 0x00007ffff7b190ba in server_recv_params (session=0x636fc0, data=0x634e6e "",
+ len=46, pskcred=0x0) at pre_shared_key.c:523
+ 523 prf = pskcred->binder_algo;
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 7 13:21:16 2018 +0200
+
+ tlsfuzzer: update to the latest version
+
+ Also enable test-tls13-ffdhe-sanity.py,
+ test-tls13-session-resumption.py, and
+ test-tls13-unrecognised-groups.py.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 7 12:32:56 2018 +0200
+
+ alert: map GNUTLS_E_NO_COMMON_KEY_SHARE to handshake_failure
+
+ Previously, when server received a ClientHello that does include only
+ groups from unassigned ranges in supported_groups, it aborted the
+ connection with an illegal_parameter.
+
+ Resolves #537
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Aug 7 11:43:32 2018 +0200
+
+ algorithms: add support for FFDHE6144
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 3 22:26:47 2018 +0200
+
+ Corrected the importing of ECDSA public keys
+
+ This seems to be a regression since EdDSA support. The call to
+ _gnutls_x509_get_pk_algorithm() in public key import was unnecessary
+ and in fact it was overriding the available curve with a curve associated
+ with the OID. As the ECDSA OID doesn't include the curve, that had the
+ result of deleting the already read curve.
+
+ Resolves #538
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 3 14:13:14 2018 +0200
+
+ Ensure we are sending the right protocol version on second client hello
+
+ That is, when we respond to a Hello Retry Request as client, we put
+ the TLS1.2 version on the second client hello to send a hello that is
+ as close as possible to the original hello. That effectively separates
+ the handling of TLS1.2 rehandshake and TLS1.3 hello retry request
+ when sending a client hello.
+
+ Resolves #535
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 7 07:30:55 2018 +0200
+
+ doc: improved text on certifications
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 7 07:13:35 2018 +0200
+
+ doc: few improvements over certificate validation text
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 30 21:50:35 2018 +0200
+
+ gnutls-serv: re-introduce the session identifier message
+
+ The message "If your browser supports session resuming, then you should
+ see the same session ID, when you press the reload button", is now printed
+ again even under TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 30 16:48:26 2018 +0200
+
+ resume: keep persistent session identifiers
+
+ With the introduction of session ticket support (TLS1.2) and
+ TLS1.3, session identifiers have no persistency on server or
+ client side. Improve the situation by introducing persistent
+ session identifiers on server side in a backwards compatible
+ way.
+
+ Resolves #484
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jul 19 15:57:59 2018 +0200
+
+ .gitlab-ci.yml: include fuzz/*.log in artifacts
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jul 18 15:56:17 2018 +0200
+
+ tests: tls-fuzzer: enable tests relying on header fragmentation
+
+ Those tests were previously disabled because splitting of handshake
+ messages in a very short (< 4 bytes) fragments is not implemented.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 2 15:44:15 2018 +0200
+
+ record: send unexpected_message upon empty unencrypted records
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 27 06:30:41 2018 +0200
+
+ buffers: handle very short fragmentation of handshake messages
+
+ If the received record doesn't even complete the handshake
+ header (i.e., the record size < 4), keep it in a temporary buffer and
+ let the caller receive more records. Once enough amount of data is
+ received, move the already received records back to record_buffer and
+ proceed to the normal processing.
+
+ Fixes: #272
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 27 06:23:12 2018 +0200
+
+ mbuffers: introduce _mbuffer_head_push_first
+
+ This is similar to _mbuffer_enqueue, but adds an element to the
+ beginning of the buffer.
+
+ This is to make the incomplete header handling case easier.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 27 06:10:37 2018 +0200
+
+ _gnutls_parse_record_buffered_msgs: eliminate local variable usage
+
+ If `remain > 0` is true, `recv_buf[0].length > 0` always holds.
+ Combine those conditions and remove the `remain` utilizing MIN().
+
+ This is to make the incomplete header handling case easier.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jul 27 05:35:02 2018 +0200
+
+ buffers: avoid confusion in fragment length calculation
+
+ Previously, to calculate the fragment length, it added/subtracted one
+ to the ending offset back and forth; that was not easier to read and
+ couldn't handle empty payload messages in TLS.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Aug 2 16:59:27 2018 +0200
+
+ tlsfuzzer: update to the latest version
+
+ Also enable test-tls13-0rtt-garbage.py.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jul 16 11:30:05 2018 +0200
+
+ TLS 1.3: ignore "early_data" extension
+
+ As 0-RTT is still not implemented in GnuTLS, the server responds with
+ 1-RTT, by skipping decryption failure up to max_early_data_size, as
+ suggested in 4.2.10 Early Data Detection.
+
+ Resolves #512
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 3 21:45:14 2018 +0200
+
+ p11tool: print expiration time on certificates
+
+ This is particularly useful when displaying information about a
+ certificate trust store.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 19 15:52:26 2018 +0200
+
+ tls1.3: server returns early on handshake when no cert is provided by client
+
+ Under TLS1.3 the server knows the negotiated keys early, if no client
+ certificate is sent. In that case, the server is not only able to
+ transmit the session ticket immediately after its finished message,
+ but is also able to transmit data, similarly to false start.
+
+ Resolves #481
+ Resolves #457
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 23 15:01:49 2018 +0200
+
+ gnutls-serv: don't close connection properly when handshake is not yet complete
+
+ In the case handshake is not yet complete and we need
+ to terminate, it is because of an issue. As such prefer an
+ unclear termination at this stage. This addresses error detection
+ issues with tlsfuzzer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 2 16:16:27 2018 +0200
+
+ gnutls-cli: corrected input buffer null-termination
+
+ This was a regression in the previous cleanup at
+ f138ff85df69976badce44a5c46157cce091020f included in
+ 3.6.3.
+
+ Resolves #534
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 31 11:37:50 2018 +0200
+
+ certtool: added example of converting to DER in manpage
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jul 27 23:46:50 2018 +0200
+
+ Fix gcc-8 -Wabi warnings
+
+ Fixes #531
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 27 11:58:38 2018 +0200
+
+ ext/key_share: check the validity of server key shares
+
+ That is, when generating the public key based on the server's
+ key share, ensure that the algorithms match completely with
+ the key shares the client initially sent. This was detected
+ by the updated traces for TLS1.3 fuzzying.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 15:37:58 2018 +0200
+
+ gnutls-serv: improve output under TLS1.3
+
+ That is, silence fields no longer applicable under TLS1.3
+ and make sure that newer functions like gnutls_session_get_desc()
+ get used when describing the session.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 15:06:34 2018 +0200
+
+ fuzz: updated traces for latest TLS1.3 draft
+
+ Relates #359
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 12:40:54 2018 +0200
+
+ tests: run tls-fuzzer PSK testsuite
+
+ Resolves #508
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 11:27:23 2018 +0200
+
+ tests: added unit test of handshake with large certificate
+
+ This checks whether handshake message fragmentation and de-fragmentation
+ is functional on server and client.
+
+ Resolves #513
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 11:02:37 2018 +0200
+
+ certtool: eliminated limits in certificate export size
+
+ That allows printing an exporting certificates of size only bounded
+ by avail memory.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 26 10:56:25 2018 +0200
+
+ certtool: eliminate maximum limit in fields read with READ_MULTI_LINE_TOKENIZED()
+
+ This allows to generate a certificate with an extension of arbitrary size.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 25 16:41:38 2018 +0200
+
+ gnutls.h: corrected typo
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 25 14:48:47 2018 +0200
+
+ send_client_hello: don't override version after HRR is received
+
+ When a Hello Retry Request is received, do not set our (transient)
+ version to TLS1.2 on the second client hello. That's because both
+ peers have already negotiated TLS1.3.
+
+ This addresses issue with peers which may send a changecipherspec
+ message at this stage, which is now allowed when our version is
+ set to be TLS1.2. Introduced test suite using openssl and resumption
+ using HRR which reproduces the issue.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 25 13:08:35 2018 +0200
+
+ hello_ext_parse: apply the test for pre-shared key ext being last on client hello
+
+ We were incorrectly insisting on pre-shared key extension being last in
+ both client and server hello. That was incorrect, as only in client hello
+ it is required by TLS1.3 to be last.
+
+ Quoting:
+ The "pre_shared_key" extension MUST be the last extension in the
+ ClientHello (this facilitates implementation as described below).
+ Servers MUST check that it is the last extension and otherwise fail
+ the handshake with an "illegal_parameter" alert.
+
+ Resolves #525
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 24 20:58:10 2018 +0200
+
+ .gitlab-ci.yml: automatically retry failed jobs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 24 16:48:32 2018 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 24 16:38:08 2018 +0200
+
+ allow no certificates to be reported by the gnutls_certificate_retrieve_function callbacks
+
+ In 9829ef9a we introduced a wrapper over the older callback functions
+ which didn't handle this case.
+
+ Resolves #528
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jul 20 20:49:28 2018 +0300
+
+ cert-cred: fix possible segfault when resetting cert retrieval function
+
+ Reset get_cert_callback3 callback to NULL if provided callback is NULL.
+ Otherwise after the certificate request call_legacy_cert_cb1 /
+ call_legacy_cert_cb2 will try to unconditionally call legacy_cert_cb1 /
+ legacy_cert_cb2 callback (set to NULL) leading to segfault.
+
+ Fixes: 9829ef9a3ca06d60472599df7c74ebb9a53f1fe2
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jul 22 20:31:36 2018 +0300
+
+ kx: for uniformity print master secret size
+
+ During keys setup phase debug log will contain sizes of all keys and
+ secrets, except master secret. Dump MS length (48) to log for
+ uniformity.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jul 22 20:31:09 2018 +0300
+
+ constate: dump full key block to log
+
+ Include full key block to the debug log.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jul 22 20:30:04 2018 +0300
+
+ constate: dump MAC keys to debug log
+
+ _gnutls_set_keys() can dump client/server write keys/ivs to debug log,
+ but it skips MAC keys. Add MAC keys to log.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Jul 22 20:25:35 2018 +0300
+
+ constate: drop unused variable in _gnutls_set_keys
+
+ _gnutls_set_keys() creates rrnd as client random + server random, but
+ does not use it (it was used before for export key generation, but was
+ not removed when dropping support for export cipher suites).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Fixes: 8bdb8d53aa5b4c5d04255b6c9b5f2dac8b23d51b
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Jul 21 13:23:42 2018 +0300
+
+ cert auth: simplify certificate selection code
+
+ Merge pubkey_is_compat_with_cs() and select_sign_algorithm() functions
+ to ease extension of certificate selection code.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jul 19 12:50:13 2018 +0200
+
+ Remove trailing dot from hostname input
+
+ Fixes #532
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 17 09:03:38 2018 +0200
+
+ gnutls_x509_privkey_import_ecc_raw: encode parameters on import
+
+ That makes the structure fully usable after import. In _encode_privkey()
+ use the lower-level _gnutls_x509_export_int2() for key encoding as the
+ call to higher gnutls_x509_privkey_export2() could result to an infinite
+ recursion when keys are incomplete.
+
+ Introduced additional tests for PKCS#8 key import and export.
+
+ Resolves: #516
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Jul 19 14:19:07 2018 +0300
+
+ certtool: use gnutls_gost_paramset_get_name
+
+ gost_param_name() predates gnutls_gost_paramset_get_name() and
+ gnutls_gost_paramset_t. Use current API functions instead of hand-coding
+ new functions.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 19 11:24:04 2018 +0200
+
+ gnutls-cli: do not fail if CKA_ID is too long
+
+ Increased the buffer needed to read reasonable-sized CKA_IDs
+ and avoid failure when the CKA_ID is too long.
+
+ Resolves #520
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 19 07:47:40 2018 +0200
+
+ .gitlab-ci.yml: combined abi-check and TLS1.3 check runs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 19 06:06:34 2018 +0200
+
+ tests: handshake-timeout: reverted virt-time.h usage
+
+ The tests nature (waiting on a socket) didn't fit well with the virt-time
+ implementation. Reverted to original real-time wait and improved error
+ detection in child process.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 16 14:04:01 2018 +0200
+
+ gnutls_priority_init: fix err_pos on invalid strings
+
+ When the provided string would be resolved (e.g., due to a @ priority
+ being used), to a different string, then do not attempt to
+ detect the right location of the error. It will not be useful to the caller.
+
+ This addresses the issue of test suite failure when --with-system-priority-file
+ and --with-default-priority-string are provided. It also enhances the test suite
+ with these options being active.
+
+ Resolves #517
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 17 21:55:33 2018 +0200
+
+ examples: tlsproxy: use snprintf instead of strncpy
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 17 08:17:13 2018 +0200
+
+ doc: simplified documentation on threads
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 17 13:53:02 2018 +0200
+
+ examples: tlsproxy: eliminated warnings
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 16 09:10:21 2018 +0200
+
+ .gitlab-ci.yml: updated win32 targets
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 16 08:27:54 2018 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 15 18:38:40 2018 +0200
+
+ gnutls-cli: mark legacy options as deprecated
+
+ This removes the --ranges and --disable-extensions options from
+ the default listing of options. They are disfunctional and may
+ be removed in the future.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 14 17:39:03 2018 +0200
+
+ .travis.yml: update brew and use nettle 3.4
+
+ Resolves #480
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 14 08:39:52 2018 +0200
+
+ .gitlab-ci.yml: Werror build runs with -std=c99
+
+ This ensures that the errors reported will be relevant
+ for the required version of the standard.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 14 17:30:49 2018 +0200
+
+ bumped versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 14 08:27:26 2018 +0200
+
+ _gnutls_resolve_priorities: avoid gnu extension for ?: construct
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 16:11:16 2018 +0200
+
+ NEWS: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 14:23:28 2018 +0200
+
+ nettle/rnd-fips: updated documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 14:01:44 2018 +0200
+
+ gnutls-cli: improve error reporting with -l --priority option
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 11:18:21 2018 +0200
+
+ cipher-listings: use the sed found by configure script and make it portable
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 09:04:42 2018 +0200
+
+ tests: tls-fuzzer: separated SSL3.0 from TLS1.x tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 16:17:02 2018 +0200
+
+ gnutls-cli-debug: do not attempt SSL3.0 negotiation when not enabled
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 15:41:21 2018 +0200
+
+ priorities: ensure that SSL3.0 enablement fails early when disabled
+
+ That is, that a priority string with only SSL3.0 present is discarded as
+ invalid.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 15:14:39 2018 +0200
+
+ The SSL 3.0 protocol is disabled on compile time by default
+
+ It can be re-enabled by specifying --enable-ssl3-support on configure script.
+ This is the first step before removing support for the protocol completely.
+
+ Relates #103
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 08:45:49 2018 +0200
+
+ tests: gnutls-cli-debug.sh: corrected run under FIPS mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 07:10:11 2018 +0200
+
+ doc: minor text updates
+
+ Updated text for gnutls_session_ext_master_secret_status and for
+ GNUTLS_NO_EXTENSIONS flag which is defunc.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 07:08:42 2018 +0200
+
+ gnutls-cli-debug: fix EtM and extended master secret discovery
+
+ In particular do not set the GNUTLS_NO_EXTENSIONS flag by default,
+ and only enable block ciphers for the EtM check.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 13 06:40:08 2018 +0200
+
+ tests: improved unit test of gnutls-cli-debug
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 09:20:57 2018 +0200
+
+ gnutls-cli-debug: generalized cipher tests
+
+ That is, tests now check for either the 128-bit or the 256-bit
+ of the cipher consistently.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 09:19:13 2018 +0200
+
+ gnutls-cli-debug: removed legacy tests no longer applicable
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 12 09:17:11 2018 +0200
+
+ gnutls-cli-debug: detect TLS1.3 support
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 11 21:26:05 2018 +0200
+
+ gnutls-cli-debug: when testing servers enable all ciphers
+
+ Resolves #515
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jul 3 11:33:21 2018 +0200
+
+ doc: update for TLS 1.3
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 09:56:35 2018 +0200
+
+ _gnutls13_recv_async_handshake: process multiple and split handshake messages
+
+ It is permitted to concatenate multiple async handshake messages in a single
+ record message as well as split large messages (NST) into multiple records.
+ Modified _gnutls13_recv_async_handshake() to process them correctly, instead
+ of assuming that they are formatted as one message per record.
+
+ Resolves #510
+ Resolves #504
+
+ Relates #511
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 10:18:23 2018 +0200
+
+ tests: check whether multiple tickets can be sent/received
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 10:11:41 2018 +0200
+
+ gnutls_session_ticket_send: allow sending multiple tickets in one go
+
+ This allows combining the tickets in a single record message when
+ possible.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 4 07:42:44 2018 +0200
+
+ tests: handshake-timeout: use virt_sec_sleep() to avoid long delays in test
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 16:28:28 2018 +0200
+
+ generate_session_ticket: tickets cannot extend the original session time
+
+ That is, on a resumed session the server would not issue new tickets
+ that would have extended the lifetime of the originally issued ticket.
+
+ Resolves #476
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 18:42:01 2018 +0200
+
+ pre_shared_key: do not send extension when no identities are present
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 20:25:40 2018 +0200
+
+ tests: corrected priority strings in session-tickets-ok and other cleanups
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 10:22:04 2018 +0200
+
+ doc: mention session ticket behavior under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 16:29:04 2018 +0200
+
+ generate_session_ticket: use a 4-byte nonce by default
+
+ It is not necessary to use large nonces.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 16:22:04 2018 +0200
+
+ pre_shared_key: use time_t type for ticket_age variable
+
+ This is guarranteed to allow negative values, and also be 32-bits.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 16:19:35 2018 +0200
+
+ generate_session_ticket: fixed comment
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jul 9 18:21:20 2018 +0300
+
+ lib: document digest and paramset in gost key import functions
+
+ Document behaviour of gnutls_pubkey_import_gost_raw,
+ gnutls_privkey_import_gost_raw and gnutls_x509_privkey_import_gost_raw.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jul 9 14:22:34 2018 +0300
+
+ lib/x509: use new function to deduce default GOST paramset
+
+ Use new _gnutls_gost_paramset_default() function to deduce default GOST
+ paramset, instead of hardcoding if/else in several places.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Jul 9 14:02:14 2018 +0300
+
+ lib: remove undefined behaviour when handling GOST paramset
+
+ Initial version of GOST patchset used param < 0 to represent unknown
+ value. Later special enum entry GNUTLS_GOST_PARAMSET_UNKNOWN was
+ introduced. Fix several leftovers comparing params to 0 directly.
+
+ Closes #505.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 9 12:40:59 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 25 10:36:18 2018 +0200
+
+ gnutls_priority_init2,gnutls_set_default_priority_append: introduced
+
+ This allows enhancing the default priority with additional
+ options, allowing an application to introduce stricter (or weaker)
+ settings without requiring it to override all settings.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 7 19:52:04 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 7 19:48:14 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Jul 7 14:20:01 2018 +0200
+
+ configure: Fix progress message for --enable-tls13-support
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 7 10:21:51 2018 +0200
+
+ tests: tls-fuzzer-alpn: operate on random port
+
+ This allows parallel run of the test with other tlsfuzzer tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 08:49:06 2018 +0200
+
+ configure: added option --enable-tls13-support
+
+ The new option enables TLS1.3 draft-28 support unconditionally.
+ Updated the test suite to run when TLS1.3 is enabled by default,
+ and added a CI run with TLS1.3 enabled.
+
+ Resolves #424
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 11:45:31 2018 +0200
+
+ _gnutls_figure_common_ciphersuite: apply rfc7919 requirements only under TLS1.2
+
+ Under TLS1.3 there is no requirement to return insufficient security depending
+ on the FFDHE group negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 09:06:27 2018 +0200
+
+ supported_versions: do not parse in server side when TLS1.3 is disabled
+
+ This allows a server to negotiate older versions using the previous TLS
+ negotiation scheme.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 3 08:31:13 2018 +0200
+
+ protocols: bumped TLS1.3 protocol to draft-28
+
+ Resolves #506
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 4 10:08:06 2018 +0200
+
+ tests: mini-record-timing: avoid warning for too large stack usage
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 11:47:34 2018 +0200
+
+ tlsfuzzer: updated to include RSA and RSA-PSS related tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 08:32:52 2018 +0200
+
+ sign_supports_cert_pk_algorithm: corrected check for RSAE-PSS
+
+ If the signature algorithm sets the `cert_pk` field, ignore the
+ `pk` field completely. Not doing that would make the RSAE signature
+ algorithms with RSA-PSS certificates which is against the intended
+ use of `cert_pk`.
+
+ Resolves #500
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 14:12:48 2018 +0200
+
+ tlsproxy: included but not as submodule
+
+ This allows updating the example when necessary within the repository
+ and reduces the amount of external dependencies for CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 14:12:15 2018 +0200
+
+ tlsproxy: removed submodule
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 21:03:28 2018 +0200
+
+ tests: introduced tests about crypto API failures on illegal use
+
+ This ensures that any mistakes in using the crypto API are propagated
+ to the higher level calls, or result to an abort().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 12:49:55 2018 +0200
+
+ gnutls_aead_cipher_encryptv: eliminate signed/unsigned warnings under x86
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 22:00:09 2018 +0200
+
+ accelerated: error on the cases where the nettle API would have errored
+
+ This ensures that illegal uses of the API would be propagated to
+ the higher levels.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 22:08:16 2018 +0200
+
+ gnutls_cipher_add_auth: propagate error codes
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 11:27:48 2018 +0200
+
+ certtool: properly print an int64_t value
+
+ Also included the gnulib inttype module for portability.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 11:24:16 2018 +0200
+
+ certtool: print information on time_t restrictions on failure
+
+ This informs the user of the tool why dates after 2038 cannot
+ be expressed on systems with a 32-bit time_t.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 30 16:49:53 2018 +0200
+
+ tests: verify that certtool operates as expected with dates after 2038
+
+ That is, whether it works with a time_t of 64-bit size, and fails
+ with a time_t of 32-bit size.
+
+ Resolves #370
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 1 12:39:28 2018 +0200
+
+ tests: check explicitly the size of time_t
+
+ Previously we were disabling the 2038 tests on 32-bit systems,
+ but there can be 32-bit systems with a 64-bit time_t. Ensure
+ that we run the right tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 30 16:48:54 2018 +0200
+
+ tests: better guarding of variable SKIP_DATEFUDGE_CHECK
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 21:31:43 2018 +0200
+
+ tests: ignore PIPE signal on TLS1.3-related tests
+
+ This was inadvertently omitted and that could cause unexpected
+ issues when one of the peers would close the connection earlier
+ than expected.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 15:00:13 2018 +0200
+
+ tests: check for GNUTLS_E_GOT_APPLICATION_DATA on post-handshake auth
+
+ That is, check whether GNUTLS_E_GOT_APPLICATION_DATA is received as
+ documented, and whether post-handshake auth can complete while this
+ is being sent.
+
+ Resolves #490
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 14:38:40 2018 +0200
+
+ post-handshake: return GNUTLS_E_GOT_APPLICATION_DATA as documented to
+
+ Relates #490
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 13:57:11 2018 +0200
+
+ tests: introduced test for post-handshake auth + PSK
+
+ Relates #489
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 14:19:02 2018 +0200
+
+ tls13 handshake: allow certificate messages after handshake
+
+ This allows post-handshake authentication even when PSK
+ is negotiated.
+
+ Resolves #489
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 13:41:13 2018 +0200
+
+ gnutls_session_get_flags: introduced GNUTLS_SFLAGS_POST_HANDSHAKE_AUTH
+
+ This allows a server application to detect whether the client
+ would support post handshake authentication or not without initiating
+ via gnutls_reauth().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 2 08:10:45 2018 +0200
+
+ gnutls-serv: make --disable-client-cert and --require-client-cert options incompatible
+
+ That is refuse to run when both options are specified.
+
+ Resolves #502
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 29 22:40:27 2018 +0200
+
+ tests: verify whether GNUTLS_TLS_VERSION_MAX is negotiated on default mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jun 29 10:33:18 2018 +0200
+
+ Fixes + cleanups for .gitlab-ci.yml
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 21:46:24 2018 +0200
+
+ p11tool: remove duplicate branch
+
+ The GNUTLS_PKCS11_OBJ_ATTR_MATCH and GNUTLS_PKCS11_OBJ_ATTR_ALL
+ attributes are the same, so there is no need to handle them
+ separately.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jun 26 12:50:30 2018 +0200
+
+ Add strdup-posix gnulib module
+
+ Some files in gl/tests won't build in environments without
+ strdup(), e.g. MinGW on Debian. The gnulib docs advise to
+ explicitly add the module.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 21 11:29:19 2018 +0200
+
+ testcompat-tls13-openssl: fix openssl interactions
+
+ * Do not require certificate validation on tests where no certificate is sent
+ * Rekey test performs data transfer after re-key
+
+ This introduces a dependency on the expect package for testing, and
+ updates openssl to address an issue in post-handshake auth interop
+ testing.
+
+ Resolves #488
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 22 14:14:07 2018 +0200
+
+ gnutls-serv: when post-handshake auth is asked; require a certificate
+
+ This allows testing post-handshake authentication using gnutls-serv.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 21 15:05:40 2018 +0200
+
+ key update: corrected generation of keys
+
+ Resolves #485
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 21 08:46:04 2018 +0200
+
+ gnutls-cli: wait for all server data prior to closing connection
+
+ This cleans-up the existing code which was disfunctional and
+ allows detecting errors which happen after we transmit data
+ to the server.
+
+ Relates #485
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 13:34:16 2018 +0200
+
+ .gitignore: added new test executables
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 27 13:27:39 2018 +0200
+
+ tests: eliminated compiler warnings
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 26 16:02:45 2018 +0300
+
+ Update .gitignore files according to bootstrap
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 26 15:22:49 2018 +0300
+
+ src: fix regenerating autogen files if builddir = srcdir
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Rolf Eike Beer <eike@sf-mail.de>
+Date: Tue Jun 26 15:18:36 2018 +0200
+
+ convert from milliseconds to timespec without loop
+
+ Signed-off-by: Rolf Eike Beer <eike@sf-mail.de>
+
+Author: Rolf Eike Beer <eike@sf-mail.de>
+Date: Tue Jun 26 15:02:51 2018 +0200
+
+ use timespec_sub_ms() instead of open coding it
+
+ Signed-off-by: Rolf Eike Beer <eike@sf-mail.de>
+
+Author: Rolf Eike Beer <eike@sf-mail.de>
+Date: Tue Jun 26 14:59:54 2018 +0200
+
+ avoid overflow when substracting timespecs if rdtsc is not available
+
+ This may still overflow on platforms where unsigned long is 32 bit (e.g. 32 bit
+ Un*x, any Windows) when the delta is more than 4 seconds.
+
+ Signed-off-by: Rolf Eike Beer <eike@sf-mail.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 26 11:38:58 2018 +0300
+
+ lib/nettle/gost: support building with mini-nettle/mini-gmp
+
+ Do not depend directly on gmp.h.
+
+ Closes: #497
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Rolf Eike Beer <eike@sf-mail.de>
+Date: Tue Jun 26 09:39:19 2018 +0200
+
+ avoid rounding errors and overflows when substracting timespecs
+
+ The current Unix time will cause overflows if multiplied with 1000, which could
+ lead to rounding errors afterwards. Do the substractions first so all numbers
+ stay small enough to fit into unsigned ints.
+
+ Signed-off-by: Rolf Eike Beer <eike@sf-mail.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 25 12:30:55 2018 +0200
+
+ wrap_nettle_pk_generate_keys: retry on provable key generation
+
+ This resolves issue with occasional failures under RSA key generation
+ in FIPS140-2 mode.
+
+ Resolves #283
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jun 23 15:11:17 2018 +0200
+
+ Let ./bootstrap sync from translationproject.org
+
+ This makes manual updating of the translations obsolete.
+ From now on, builds and tarballs will always have the latest translations
+ included.
+
+ We should not forget to inform translationproject.org to update the
+ translations before a release. How to do that is described at
+ https://translationproject.org/html/maintainers.html (6. Announcing).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 26 02:38:51 2018 +0200
+
+ gnutls_session_get_desc: fixed desc printing of custom groups
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 25 10:06:25 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 21:46:15 2018 +0200
+
+ aarch64: use getauxval() if available to discover cpu caps
+
+ This improves CPU detection by avoiding the parsing of
+ of a human-readable file and allows operation under debian
+ multilib qemu setup.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 21:50:15 2018 +0200
+
+ .gitlab-ci.yml: no need for submodule update on cross-builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 13:14:03 2018 +0200
+
+ .gitlab-ci.yml: use qemu for aarch64 testing
+
+ This eliminates the need (and costs) to maintain a separate baremetal
+ system.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 08:27:00 2018 +0200
+
+ .gitlab-ci.yml: corrected typo
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 08:06:55 2018 +0200
+
+ .gitlab-ci.yml: skip submodule initialization when not necessary
+
+ This prevents unnecessary download of submodules on CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 06:51:14 2018 +0200
+
+ .gitlab-ci.yml: updated x86 CI builds with better datefudge detection
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 24 06:58:37 2018 +0200
+
+ .gitlab-ci.yml: debian stretch build replaced by buster
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 23 19:38:26 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 23 19:35:13 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 15 13:38:44 2018 +0300
+
+ tests: add PKCS#12 test script for GOST 28147-89-encrypted files
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Jun 15 13:06:41 2018 +0300
+
+ certtool: honour --hash option when generating PKCS#12 files
+
+ Use algorithm specified with --hash option when generating MAC for
+ PKCS#12 file, allowing user to select algorithms other than SHA-1.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Sep 24 10:31:39 2017 +0300
+
+ tests: expand pkcs7 test to also check GOST files
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 22:51:19 2017 +0300
+
+ test: test GOST keys import/export
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 21:40:34 2017 +0300
+
+ certtool: ask if certificate will be used for data encryption
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 21:37:18 2017 +0300
+
+ tests: add common gost certificates for tests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 6 03:57:24 2016 +0300
+
+ Support key matching with GOST keys
+
+ GOST keys do not support signing non-GOST hashes, so use correct digest
+ algorithm when verifying that GOST public and private keys match.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Nov 26 04:51:41 2016 +0300
+
+ Add generated GOST credentials for tests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 21 20:58:00 2016 +0300
+
+ Use GOST R 34.11-94 when generating key for PKCS data to be encrypted with GOST 28147-89
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 21 20:52:43 2016 +0300
+
+ certtool: support generating GOST-encrypted PKCS#8/12 files
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Nov 18 00:23:54 2016 +0300
+
+ Add gost certificates to chainverify tests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Nov 17 10:47:16 2016 +0300
+
+ Expand x509 sign/verify test with GOST algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Nov 17 10:22:11 2016 +0300
+
+ oids: expand to include GOST digests/signatures
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Aug 29 17:44:10 2017 +0300
+
+ tests: privkey-keygen: adapt to support GOST algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Oct 24 20:56:46 2016 +0300
+
+ Support GOST private keys generation
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 18:01:20 2016 +0300
+
+ certtool: support dumping GOST private key information
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 17:38:57 2016 +0300
+
+ Add several DN entry definitions used by qualified GOST signatures
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Aug 28 14:34:33 2017 +0300
+
+ certool: export GOST privkeys only in PKCS#8 format
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 9 14:19:58 2016 +0300
+
+ Add support for PKCS12 files using GOST MAC
+
+ Local PKCS12-based standard derives from RFC 7292 (PKCS #12) in using
+ PBKDF2 to generate MAC key rather than using PKCS12 scheme.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 9 14:02:56 2016 +0300
+
+ Add support for PBES2/PBKDF2 using GOST algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Jan 28 06:01:01 2017 +0300
+
+ Support PKCS#12 key derivation with GOST digests
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 17:56:04 2016 +0300
+
+ Add support for importing/exporting GOST private keys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 18 12:54:12 2017 +0300
+
+ Support importing/exporting X.509 GOST public keys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:43:35 2016 +0300
+
+ Add ASN.1 definitions for GOST keys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:07:36 2016 +0300
+
+ nettle: add support for GOST 34.10 public keys
+
+ There is no support for GOST public keys derivation, as it is used only
+ for TLS or PKCS#7 with encrypted content.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 17:05:38 2016 +0300
+
+ Add few functions to support basic operations with GOST public keys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:02:30 2016 +0300
+
+ Add declarations for GOST R 34.10 signatures
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 03:55:10 2016 +0300
+
+ Define GOST R 34.10 curves
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:00:21 2016 +0300
+
+ Add declarations to support GOST public keys
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 29 05:28:17 2016 +0300
+
+ Add support for I/O of little-endian MPI
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Nov 29 05:30:10 2016 +0300
+
+ nettle: add support for unsigned LE MPIs
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:05:41 2016 +0300
+
+ nettle: add support for GOST 34.11 hash functions
+
+ Add support for GOST R 34.11-94 and Streebog (256/512) functions.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:05:07 2016 +0300
+
+ nettle: support GOST28147-89 in CFB mode
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 27 03:18:32 2016 +0300
+
+ Add declarations for GOST 28147-89 cipher in CFB mode
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 03:57:17 2016 +0300
+
+ Add declarations for GOST R 34.11 (-94 and -2012) digest algorithms
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Aug 29 15:12:53 2017 +0300
+
+ Import GOST-supporting part from Nettle pending patches
+
+ Nettle upstream takes significant time to accept GOST-related patches.
+ As per Nikos' suggestion, push relevant parts to GnuTLS, so that they
+ can be tested in wild at the same time supporting GOST ciphersuite code.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sun Sep 17 20:57:52 2017 +0300
+
+ .gitlab-ci.yml: disable gost in minimal build
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Oct 26 22:34:17 2016 +0300
+
+ Add configure argument to disable GOST support
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 12 10:16:10 2018 +0200
+
+ _gnutls_parse_hello_extensions: enforce that pre-shared-key extension is last
+
+ This is a requirement in draft-ietf-tls-tls13-28 4.2.11 section:
+ The "pre_shared_key" extension MUST be the last extension in the
+ ClientHello (this facilitates implementation as described below).
+ Servers MUST check that it is the last extension and otherwise fail
+ the handshake with an "illegal_parameter" alert.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 12 10:01:22 2018 +0200
+
+ tests: check whether we send the pre-shared key extension after dumbfw
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 12 09:35:16 2018 +0200
+
+ tests: corrected typo in comment
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 8 10:48:32 2018 +0200
+
+ extensions: corrected order of pre-shared-key and dumbfw
+
+ The pre-shared-key MUST always be last under TLS1.3 while the
+ dumbfw extension should be last in order to do proper evaluation
+ of extension size (gnutls requirement). As such the protocol
+ requirement takes precedence.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jun 19 13:21:44 2018 +0200
+
+ Fix test code for -Werror
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 19 14:59:33 2018 +0200
+
+ tests: updated supplemental tests for TLS1.3
+
+ This includes tests that verify that TLS1.3 is not negotiated
+ when supplemental data are set in client and/or server side.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 19 16:03:52 2018 +0200
+
+ gnutls_supplemental_register: disable TLS 1.3 globally
+
+ This allows using the registered supplemental data handlers, since
+ these are not used under TLS 1.3.
+
+ Resolves #479
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 19 14:42:13 2018 +0200
+
+ gnutls_session_supplemental_register: disable TLS1.3 when set
+
+ This allows using the registered supplemental data handlers, since
+ these are not used under TLS 1.3.
+
+ Resolves #479
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jun 19 12:02:13 2018 +0200
+
+ Remove oss-fuzz copora from tarball
+
+ The size of the corpora is huge and not needed for normal builds.
+
+ This patch also fixes test run issues on Windows.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 20 13:20:27 2018 +0200
+
+ gnutls-cli: introduce the rekey1 inline command
+
+ That allows performing a rekey locally and with the
+ peer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 11:33:34 2018 +0200
+
+ document new behavior on safe padding removal
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 11:22:36 2018 +0200
+
+ record: fail with invalid request when attempting to send no pad and no data
+
+ Previously we were returning an internal error which seems to be incorrect
+ in that case.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 11:15:56 2018 +0200
+
+ tests: enhance padding check
+
+ This introduces tests for zero-data transfers with padding as well
+ as padding and de-padding with safe padding flag set.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 11:03:40 2018 +0200
+
+ gnutls-cli: added CCM run under TLS1.2 in benchmark mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 11:00:39 2018 +0200
+
+ cipher: made TLS1.3 safe padding check optional
+
+ This patch introduces the gnutls_init() flag GNUTLS_SAFE_PADDING_CHECK
+ which makes the TLS1.3 safe padding check optional. That way applications
+ which do not utilize the TLS1.3 padding do not get penalized by the performance
+ drop in TLS1.3 packet processing. This addresses a regression in TLS1.3
+ packet processing performance.
+
+ Resolves: #466
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 19 13:16:13 2018 +0200
+
+ gnutls_session_get_id: document restrictions
+
+ This documents the fact that a TLS session ID cannot be relied
+ to be unique or to even have a meaningful value.
+
+ Resolves #484
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 19 13:08:27 2018 +0200
+
+ tests: verify that resumed session ID matches original
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 19 18:23:14 2018 +0300
+
+ Makefile.am: move autogen files update to src/Makefile.am
+
+ Move autogen'ed files update to src/Makefile.am to simplify code and
+ support out-of-tree builds.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 19 18:20:18 2018 +0300
+
+ Makefile.am: files-update: support out-of-tree builds
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Jun 19 11:26:09 2018 +0300
+
+ symbol-check: fix typo to make it work for out-of-tree builds
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 16 15:46:25 2018 +0200
+
+ aarch64: update elf files to correspond to the macosx version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 10 14:08:54 2018 +0200
+
+ macosx: include aarch64 asm files
+
+ Relates #475
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 16 15:27:02 2018 +0200
+
+ Makefile.am: abi-check: fetch fresh tags
+
+ This addresses the issue of failed abi-check CI runs on
+ forked repositories.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 18 15:10:32 2018 +0200
+
+ drbg-aes: removed the continuous DRBG checks
+
+ These are no longer necessary for FIPS140-2 compliance.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Jun 15 19:39:22 2018 +0200
+
+ Fix usage of 'autoreconf'
+
+ 'autoreconf' created a different configure script than ./bootstrap.
+ The result was a broken wchar.h that failed to compile.
+
+ The work-around was 'autoreconf -I gl/m4' which is not what a developer
+ expects. This patch moves gl/m4/* to m4/ which is the default include dir
+ for autoreconf.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Thu Jun 14 12:53:42 2018 +0300
+
+ configure: Check for clock_gettime and fmemopen using a proper test
+
+ Don't use AC_CHECK_FUNCS for these functions, but actually test by
+ including the real header that defines the functions. This allows
+ the macOS version selection work as intended, making the references
+ to these functions weak if targeting a version of macOS where these
+ functions aren't available. Thanks to -no_weak_imports, these weak
+ references end up in failed linker tests, marking the functions as
+ unavailable.
+
+ This fixes issue #142.
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Thu Jun 14 12:52:03 2018 +0300
+
+ configure: Include sys/random.h before checking for getentropy on macOS
+
+ This function is available since macOS 10.12, but it's in
+ sys/random.h on macOS, contrary to the other platforms supporting
+ it where it is present in unistd.h.
+
+ If we don't include the right header that declares the function
+ and its availability, the configure check would succeed even if
+ targeting older versions of macOS that lacks the function.
+
+ Also include the same header in the source file that actually
+ uses getentropy.
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Thu Jun 14 12:36:10 2018 +0300
+
+ configure: Pass -no_weak_imports to the linker, if supported
+
+ This avoids linking to functions that aren't available in the
+ lowest targeted macOS version.
+
+ If the proper header declaring a function is included, and
+ gnutls is built with -mmacosx-version-min or the
+ MACOSX_DEPLOYMENT_TARGET environment variable is set, each
+ reference to a function that doesn't exist in the minimum
+ targeted version will be made a weak reference, so that loading
+ the binary still works, but the function pointer will resolve
+ to NULL if running on a version of the platform that lacks it.
+
+ Since this project doesn't do such runtime checks for functions
+ it expects to have available, we should instead add this linker
+ option to fail on the weak references. This allows autoconf to
+ work as intended, detecting that these functions aren't usable.
+
+ This flag appeared in Xcode 8, so check for its availability
+ before using it. (Xcode 8 and the 10.12 SDK is coincidentally
+ the release where most relevant new functions appeared, so with
+ older Xcode versions, the modern platform functions we might want
+ to avoid don't exist.)
+
+ See issue #142.
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Thu Jun 14 13:47:41 2018 +0300
+
+ configure: Remove a duplicate check for fmemopen
+
+ The duplicate was added in 5bb8a18b without any specific reasoning
+ as to why.
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 13 17:50:20 2018 +0200
+
+ tlsfuzzer: update to the latest version
+
+ Also enable test-tls13-hrr.py.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 13 17:47:50 2018 +0200
+
+ _gnutls13_handshake_server: send CCS immediately after HRR
+
+ In the TLS 1.3 middlebox compatibility mode, CCS follows the first
+ handshake message sent from the server, that is either SH or HRR.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 14 13:43:30 2018 +0200
+
+ _gnutls13_handshake_server: corrected transition when post_handshake callback is set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jun 13 17:43:32 2018 +0200
+
+ _gnutls_send_change_cipher_spec: don't cache under TLS 1.3
+
+ Under TLS 1.3, when the server sent HRR, CCS may be followed by
+ receiving ClientHello. In that case, the messsage shouldn't be
+ cached.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 10 11:42:10 2018 +0200
+
+ abi-check skip session::set_transport_vec_push_function
+
+ This prevents an abi-compliance checker error when run under
+ gcc8 (though this error is not there under any other gcc).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 27 15:13:47 2018 +0200
+
+ corrected check for iovec types in libc
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 2 22:23:29 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 2 22:15:58 2018 +0200
+
+ gnutls-cli: benchmark for TLS1.3 and TLS1.2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 2 21:37:00 2018 +0200
+
+ cipher: use gnutls_aead_cipher_encryptv
+
+ This eliminates the need of a memory allocation during each
+ packet encryption when no padding is done.
+
+ Relates #458
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 2 21:25:10 2018 +0200
+
+ gnutls_aead_cipher_encryptv: introduced
+
+ This API allows encryption using a scatter input, by also
+ taking advantage of ciphers which are optimized for such input.
+ That is particularly useful under TLS1.3 since its encryption is
+ based on encryption of scattered data (data+pad).
+
+ Resolves #458
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 2 21:23:41 2018 +0200
+
+ MAX_CIPHER_BLOCK_SIZE: increased to 64-bytes for CHACHA20
+
+ This was not necessary since that value was only used by block
+ (in TLS sense) ciphers, but that definition could also be used
+ for the CHACHA20.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 14 14:51:23 2018 +0200
+
+ configure: reduce warnings about implicit-fallthrough [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 14 13:22:03 2018 +0200
+
+ gnutls_alert_send_appropriate: fix type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 14 13:18:54 2018 +0200
+
+ README-ci.freebsd.md: updated for new build method with gnulib [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jun 6 09:45:32 2018 +0200
+
+ Use $(MAKE) instead of make
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jun 5 17:06:05 2018 +0200
+
+ distclean temp. test files for 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jun 5 10:58:10 2018 +0200
+
+ Add DISTCLEANFILES to src/Makefile.am to fix 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jun 4 16:15:07 2018 +0200
+
+ Fix creation of ChangeLog for 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jun 4 11:56:57 2018 +0200
+
+ Fix 'compare-makefile' make target for 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jun 4 11:33:18 2018 +0200
+
+ Fix 'compare-exported' make target for 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu May 31 13:20:51 2018 +0200
+
+ Fix distcheck issues
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon May 21 16:25:20 2018 +0200
+
+ Fix gcc 8 warnings
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat May 19 13:24:58 2018 +0200
+
+ Fix CI testing -Werror
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat May 19 10:19:32 2018 +0200
+
+ Skip sc_prohibit_always_true_header_tests
+
+ We can't simply remove the checks for HAVE_SYS_SOCKET_H.
+ If we do, we have to make checks on real WIN32, which
+ is currently not an option.
+ So we skip sc_prohibit_always_true_header_tests.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat May 19 09:37:24 2018 +0200
+
+ Fix sc_prohibit_always-defined_macros
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 18 23:23:26 2018 +0200
+
+ Avoid certain gnulib tests
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 18 23:10:16 2018 +0200
+
+ Update GTK-DOC check in configure.ac
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jun 6 09:19:45 2018 +0200
+
+ Use ./bootstrap in .gitlab-ci.yml
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 18 20:31:31 2018 +0200
+
+ Add bootstrap + bootstrap.conf
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri May 18 20:06:16 2018 +0200
+
+ Add gnulib submodule
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Jun 13 12:12:18 2018 +0300
+
+ nettle: require Nettle library >= 3.4
+
+ Nettle version 3.4 was released more than a half year ago, require it to
+ compile GnuTLS library. It allows us to remove bundled code that was
+ merged into that release.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 12 13:01:17 2018 +0200
+
+ .gitlab-ci.yml: fix artifact paths for TLS1.3/interop
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 12 09:12:07 2018 +0200
+
+ tlsfuzzer-tls13: use a random port for testing
+
+ That eliminates the need for locking and allows parallel runs.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 8 13:13:27 2018 +0200
+
+ tlsfuzzer: update to the latest version
+
+ Also enable the TLS 1.3 tests.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 11 12:08:18 2018 +0200
+
+ buffers: remove redundant assignment
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Jun 11 10:51:16 2018 +0200
+
+ record: use correct alert type upon receiving empty Alert
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 8 15:55:06 2018 +0200
+
+ record: improve empty message handling in TLS 1.3
+
+ Previously, _gnutls_recv_in_buffers() silently discarded empty
+ messages because such messages are used as a countermeasure to
+ vulnerabilities in the CBC mode. In TLS 1.3, however, there are only
+ AEAD ciphers and such logic is meaningless. Moreover, in the protocol
+ it is suggested to send "unexpected_message" alert when receiving
+ empty messages in certain occasions. This change moves the empty
+ message handling to record_add_to_buffers().
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 8 12:51:40 2018 +0200
+
+ record: fix padding removal when the payload is zero-length
+
+ Previoysly if TLSInnerPlaintext.content is zero-length, the loop
+ couldn't detect ContentType following the content.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 5 10:37:58 2018 +0200
+
+ priorities: introduced %FORCE_ETM
+
+ This introduces a priority string option to force encrypt-then-mac
+ during negotiation, to prevent negotiating the legacy CBC ciphersuites.
+
+ Resolves #472
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 6 09:25:20 2018 +0200
+
+ priorities: hmac-sha256 ciphersuites were removed from defaults
+
+ These ciphersuites are deprecated since the introduction of AEAD
+ ciphersuites, and are only necessary for compatibility with older
+ servers. Since older servers already support hmac-sha1 there is
+ no reason to keep these ciphersuites enabled by default, as they
+ increase our attack surface.
+
+ Relates #456
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 7 09:56:49 2018 +0200
+
+ cbc_mac_verify: require minimum padding under SSL3.0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 7 09:54:50 2018 +0200
+
+ cipher: separated CBC w/o EtM handling
+
+ This would allow to further modify for more invasive work-arounds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 4 17:57:52 2018 +0200
+
+ dummy_wait: always hash the same amount of blocks that would have been on minimum pad
+
+ This improves protection against lucky13-type of attacks when
+ encrypt-then-mac is not in use.
+
+ Resolves #456
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 21 09:04:55 2018 +0200
+
+ cbc-record-check.sh: introduced
+
+ That enhances the existing CBC check and adds sha384, uses PSK
+ to reduce handshake time, and other updates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 18 15:43:36 2018 +0200
+
+ dummy_wait: correctly account the length field in SHA384 HMAC
+
+ The existing lucky13 attack count-measures did not work correctly for
+ SHA384 HMAC.
+
+ The overall impact of that should not be significant as SHA384 is prioritized
+ lower than SHA256 or SHA1 and thus it is not typically negotiated, unless a
+ client prioritizes a SHA384 MAC, or a server only supports SHA384, and in both
+ cases the vulnerability is only present if Encrypt-then-MAC (RFC7366) is unsupported
+ by the peer.
+
+ Resolves #455
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jun 7 12:11:30 2018 +0200
+
+ Fix warnings seen on OpenCSW Solaris 10
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 8 08:56:23 2018 +0200
+
+ gnutls_session_get_data2: harmonize documentation with practice
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed Jun 6 12:45:13 2018 +0200
+
+ Fix variable overflow in TLS1.3 session ticket code
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 1 15:04:49 2018 +0200
+
+ tls13/session_ticket: don't send ticket when no common KE modes
+
+ When the server had received psk_key_exchange_modes extension which
+ doesn't have any overlap with the server configuration, omit to send
+ NewSessionTicket.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jun 5 14:08:26 2018 +0200
+
+ ext/psk_ke_modes: always send extension unless disabled in config
+
+ With the psk_key_exchange_modes extension, clients can restrict the
+ key exchange modes for use with resumption and in that case the server
+ shouldn't send NewSessionTicket. This patch makes use of it to avoid
+ receiving useless tickets, by sending the psk_key_exchange_modes
+ extension unless PSK is completely disabled.
+
+ A couple of tests need to be adjusted: tls13/prf to take into account
+ of the psk_key_exchange_modes extension sent, and tls13/no-psk-exts to
+ not treat the presence of the extension as error.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed May 23 22:26:20 2018 +0200
+
+ Add --enable-doc to DISTCHECK_CONFIGURE_FLAGS
+
+ Make sure that 'make distcheck' works even if
+ './configure --disable-doc' has been used in the project dir.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed May 23 22:24:05 2018 +0200
+
+ Fix tests 'ocsp-must-staple-connection' and 'ocsp-tls-connection'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Wed May 23 22:22:27 2018 +0200
+
+ Fix tests/cert-tests/template-test for 'make distcheck'
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 1 09:54:41 2018 +0200
+
+ ext/pre_shared_key: make PSK identity parsing robuster
+
+ Previously, to determine whether a PSK identity is a ticket or a PSK
+ username, it relied on PskIdentity.obfuscated_ticket_age, which
+ "SHOULD" be 0 if the identity is a PSK username.
+
+ This patch instead checks the key name of the ticket first and then
+ check the constraints of the PSK username. That way, it can
+ distinguish tickets and PSK usernames in a more realible manner.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Jun 1 10:01:08 2018 +0200
+
+ _gnutls_decrypt_session_ticket: fail early on key name mismatch
+
+ If the key name of the ticket doesn't match, we don't need to parse
+ the entire ticket.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Tue May 29 15:53:45 2018 +0200
+
+ Renamed extension supported ECC to supported groups. Fixes #451.
+ Split combined ECC extensions into different files.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu May 24 12:45:32 2018 +0200
+
+ Fix more warnings in tests/
+
+ To not introduce larger code changes, these bugs are mostly
+ fixed by #pragma understood by gcc and clang.
+ A check for the minimal gcc/clang version prevents warnings about
+ unknown pragmas with other or older compilers.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu May 24 09:49:34 2018 +0200
+
+ Fix warnings in test suite
+
+ Fixes:
+ tls-ext-register.c:238:11: warning: unused variable 'i' [-Wunused-variable]
+ record-retvals.c:118:14: warning: unused variable 'vers' [-Wunused-variable]
+ record-retvals.c:347:1: warning: label 'next' defined but not used [-Wunused-label]
+ alerts.c:71:14: warning: unused variable 'vers' [-Wunused-variable]
+ alerts.c:71:11: warning: unused variable 'i' [-Wunused-variable]
+ alerts.c:160:11: warning: unused variable 'i' [-Wunused-variable]
+ send-client-cert.c:176:6: warning: no previous prototype for 'start' [-Wmissing-prototypes]
+ tls-session-supplemental.c:186:6: warning: unused variable 'optval' [-Wunused-variable]
+ tls-session-supplemental.c:184:7: warning: unused variable 'topbuf' [-Wunused-variable]
+ tls-session-supplemental.c:183:6: warning: unused variable 'err' [-Wunused-variable]
+ x509self.c:211:6: warning: unused variable 'optval' [-Wunused-variable]
+ x509self.c:208:7: warning: unused variable 'topbuf' [-Wunused-variable]
+ x509self.c:207:6: warning: unused variable 'err' [-Wunused-variable]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 22 09:14:45 2018 +0200
+
+ tests: resume: check whether PSK username matches on resumption
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 22 09:04:32 2018 +0200
+
+ resumption: reduce session parameters stored under TLS1.3
+
+ That is, do not store extensions or security parameters which
+ depend on extension negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 16:35:32 2018 +0200
+
+ session_ticket: use random nonces
+
+ Avoid using any time values in plain as this could allow association
+ of clients.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 16:03:23 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 14:14:55 2018 +0200
+
+ doc: mention changes under TLS 1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 11:22:24 2018 +0200
+
+ tests: added main use-case test for gnutls_session_ticket_send()
+
+ It verifies whether a server can use gnutls_session_ticket_send()
+ to send a ticket after re-authentication, and whether a client
+ can receive that ticket and re-authenticate with it, while
+ its certificate is made available to server.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 11:21:55 2018 +0200
+
+ handshake: do not include async messages into transcript
+
+ This prevents the session tickets to affect re-authentication
+ or other operations that require the transcript.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 10:27:00 2018 +0200
+
+ gnutls_session_ticket_send: new function
+
+ Introduced in order for a server to be able to send an arbitrary
+ amount of tickets, at any time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 15 10:10:20 2018 +0200
+
+ handshake: store session parameters in TLS1.3 ticket
+
+ This allows a TLS1.3 server to obtain certificate or other
+ information from the client on a resumed session.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 14 16:05:27 2018 +0200
+
+ handshake: TLS1.3 async messages trigger the handshake hook
+
+ That is, the callback set with gnutls_handshake_set_hook_function() is
+ now called even on the async handshake messages received under TLS1.3,
+ such as key update, etc.
+
+ Resolves #441
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 14 14:33:15 2018 +0200
+
+ tests: check various parameters on resumption
+
+ That is, check gnutls_session_is_resumed() is functional on server
+ side, whether PRF is respected on resumption, whether gnutls_certificate_get_peers()
+ and gnutls_certificate_get_ours() operate as expected, and whether session
+ resumption fails with tickets after expiration time has passed.
+
+ In addition improve function documentation by documenting the current
+ semantics for the functions above.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Apr 17 13:32:18 2018 +0200
+
+ tests: exercise TLS 1.3 session resumption
+
+ This requires a few changes to the resume.c test: because
+ NewSessionTicket is a post-handshake message,
+ gnutls_session_get_data2() needs to be called after sending the first
+ application data. Also, when GNUTLS_E_AGAIN, gnutls_record_recv()
+ needs to retry.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 30 14:27:52 2018 +0200
+
+ gnutls-cli: ignore E_AGAIN to accommodate async handshake message
+
+ When an async handshake message has arrived while no application data
+ is available, gnutls_record_recv() returns GNUTLS_E_AGAIN and the loop
+ in socket_recv() blocks. Since socket_recv() is guarded by select(),
+ it should be safe to ignore GNUTLS_E_AGAIN.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 14 09:01:59 2018 +0200
+
+ gnutls_auth_get_type: simplified
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Mon Apr 16 17:13:47 2018 +0200
+
+ TLS 1.3: Introduced TLS 1.3 session resumption
+
+ This introduces session resumption under TLS 1.3. For that,
+ it enables the psk_ke_modes extension when we enable session
+ tickets. It enables sending session tickets in addition to
+ PSK usernames. The detection of resumption vs pure PSK is done by
+ comparing the indexes sent with the index received by the server.
+
+ TLS 1.3 session tickets are always sent to the peer unless the
+ GNUTLS_NO_TICKETS is specified.
+
+ Resolves #290
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 10 14:25:12 2018 +0200
+
+ psk_ke_modes: introduce psk_ke_modes_is_required() and update doc
+
+ This adds a helper function to be extended when session resumption
+ is added, and clarifies why we send a prioritized list on ke modes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Thu Apr 12 17:58:47 2018 +0200
+
+ session tickets: expose {encrypt,decrypt}_ticket as internal API
+
+ To reuse the same ticket construction in any TLS versions, expose the
+ private functions in ext/session_ticket.c.
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu May 3 09:39:15 2018 +0200
+
+ ext/pre_shared_key: fix binder calculation when HRR is sent
+
+ In that case, ClientHello1 and HelloRetryRequest are included in the
+ PSK binder computation, not only the truncated ClientHello2.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Mon Apr 16 17:22:19 2018 +0200
+
+ handshake: record transcript offset of client Finished
+
+ This is for deriving resumption_master_secret, whose value is
+ calculated over ClientHello...client Finished.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu May 24 15:24:17 2018 +0200
+
+ Fix testdane by removing www.kumari.net
+
+ danetool --check www.kumari.net:
+ Verification: Verification failed. The certificate differs.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Tue May 22 11:22:42 2018 +0200
+
+ Fixed some spelling issues. [ci skip]
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon May 21 21:58:55 2018 +0200
+
+ Added extra extension flag to docs.
+ Added description of default pack and unpack functions.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Mon May 21 09:44:16 2018 +0200
+
+ Removed section about Heartbleed.
+ Referenced new functions _gnutls_hello_ext_set_datum / _gnutls_hello_ext_get_datum for manipulation extension data.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sun May 20 10:23:36 2018 +0200
+
+ Fixed typo and incorrect function references.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Sat May 19 22:22:29 2018 +0200
+
+ Updated documentation on Hello extensions.
+
+ Signed-off-by: Tom Vrancken <dev@tomvrancken.nl>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 19 11:30:35 2018 +0200
+
+ pkcs11: consistent/clear naming of find obj callbacks and structs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 18 11:04:34 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 18 09:19:16 2018 +0200
+
+ gnutls_pkcs11_token_get_ptr, gnutls_pkcs11_obj_get_ptr: introduced
+
+ This allows an application to open a PKCS#11 token using a URI,
+ and use it directly, bypassing gnutls. That is useful to take
+ advantage of PKCS#11 functionality not wrapped by gnutls but
+ still use PKCS#11 URIs to identify the token.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 19 12:47:16 2018 +0200
+
+ CONTRIBUTING.md: document why gnulib is kept separate [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 18:52:41 2018 +0200
+
+ certtool: split long prompt for serial
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 13:00:43 2018 +0200
+
+ doc: add note about CRL numbers to man page
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 12:35:39 2018 +0200
+
+ certtool: ask again until serial/crl number is valid
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 11:39:53 2018 +0200
+
+ tests: remove check for broken datefudge
+
+ This check is not necessary with Fedora 28 build image
+ currently used for CI as it contains datefudge 1.22
+ as well.
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 10:43:26 2018 +0200
+
+ certtool: remove extra function
+
+ I did not notice strip_nl previously.
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Fri May 18 10:31:30 2018 +0200
+
+ tests: add negative tests for certtool crl numbers
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Sun May 13 23:28:33 2018 +0200
+
+ doc: add NEWS about serial and CRL numbers
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Sun May 13 23:04:29 2018 +0200
+
+ doc: add hex format to example template
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Martin Sucha <anty.sk+git@gmail.com>
+Date: Thu May 17 12:31:01 2018 +0200
+
+ certtool: use larger serial and CRL numbers
+
+ Serial/CRL numbers can be up to 20 octets in length
+ as per RFC 5280, so it should be possible to use
+ such numbers as input to certtool. certtool
+ only allowed to specify 63-bit numbers in
+ template file or interactively (even though
+ it generated larger numbers in batch mode
+ by default).
+
+ This patch allows large numbers to be specified
+ as a hexadecimal string. Parsing of decimal numbers
+ larger than native integers would require adding
+ dependency on libgmp directly to certtool or
+ extending the API exposed by GnuTLS library with parsing
+ functions. Since most tools (including GnuTLS) display
+ serial numbers in hexadecimal, it is not worth the
+ trouble to support large decimal numbers.
+
+ Default values are unified between batch mode and
+ interactive input and their size is extended.
+
+ CA/Browser forum recommends CAs to include at least
+ 64 bits of random data in the certificate serial
+ numbers in Baseline Requirements[1] section 7.1, but
+ gnutls adds only 32 bits. Some other
+ implementations generate default serial numbers
+ with more entropy as well, here is the current state
+ as of May 2018:
+
+ +----------------+-------------------------------+
+ | Implementation | Random bits in default serial |
+ +----------------+-------------------------------+
+ | OpenSSL [2] | 159 |
+ | CFSSL [3] | 159 |
+ | wolfSSL [4] | 128 |
+ | GnuTLS | 32 |
+ | Mbed TLS [5] | 0 (defaults to 1) |
+ +----------------+-------------------------------+
+
+ The 20 octet field size can fit numbers up to 159 bits
+ since the most significant bit must be zero as numbers
+ in DER encoding are in two's complement and the serial
+ and CRL numbers must be positive.
+
+ Default serial numbers are extended to full 159 bits
+ allowed by the field size and are completely random,
+ which matches other implementations.
+
+ CRL numbers have the same size requirements, but also
+ need to be monotonic (RFC 5280, section 5.2.3). That's
+ why timestamp is used in them. The timestamp portion
+ is extended from 31 bits to 39 bits as 31 bits will
+ overflow in year 2038. The rest of the available space
+ up to 159 bits allowed in the 20 octet limit is filled
+ with random bits.
+
+ Since the new CRL numbers are larger, the requirement for them
+ to be monotonically increasing is preserved when upgrading to a
+ newer version. This does not hold the other way around though,
+ so after using a newer version of certtool to generate a CRL
+ with default number and publishing it, it's not possible
+ to use older version anymore to generate subsequent CRLs.
+ Unfortunately, there is no easy workaround for users of older
+ certtool, since it is not possible to specify CRL numbers
+ greater than 63 bits manually prior to this change.
+ Users intending to downgrade to older version later are advised
+ to specify the CRL numbers in new version of certtool
+ manually with values they are smaller than what would get
+ generated by default in the old version.
+
+ grep does not recognize CRLF line endings generated
+ in tests using MinGW, so we need to convert those to
+ LF endings for $ in the regex to match test output
+ correctly.
+
+ datefudge 1.21 that is present in Fedora 26
+ image trims the timestamp to 32 bits. That bug was
+ fixed in datefudge 1.22 available in the Debian image,
+ so we check if datefudge behaves correctly
+ and skip the test that uses more than 32 bits if
+ datefudge is broken.
+
+ [1] https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.4.2.pdf
+ [2] https://github.com/openssl/openssl/blob/6ebb49f3f9c9333611192561979bb799fa1eb76d/apps/apps.c#L1513
+ [3] https://github.com/cloudflare/cfssl/blob/5d63dbd981b5c408effbb58c442d54761ff94fbd/signer/local/local.go#L295
+ [4] https://github.com/wolfSSL/wolfssl/blob/d60b16c5b8c19cc61db4a5c3f5e085a7a158cd28/wolfcrypt/src/asn.c#L9791
+ [5] https://github.com/ARMmbed/mbedtls/blob/84a1107818aaddfd2abe4c5a3478cf84ab2e26b4/programs/x509/cert_write.c#L81
+
+ Signed-off-by: Martin Sucha <anty.sk+git@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 09:52:32 2018 +0200
+
+ handshake: do not send TLS extensions under DTLS and vice versa
+
+ That is, introduce the notion of TLS-only and DTLS-only extensions,
+ providing a framework to prevent sending extensions which are registered
+ for example for TLS 1.3, under DTLS and vice versa.
+
+ Resolves #440
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 11:51:41 2018 +0200
+
+ gnutls_ext_raw_parse: introduced GNUTLS_EXT_RAW_FLAG_DTLS_CLIENT_HELLO
+
+ This allows parsing extensions from a DTLS client hello.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 16 15:32:35 2018 +0200
+
+ tests: fix serv location in testcompat-main-openssl
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun May 13 14:39:14 2018 +0200
+
+ tests/suite: add missing file to dist
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun May 13 14:33:17 2018 +0200
+
+ Allow running of test against installed gnutls-serv
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 4 14:55:21 2018 +0200
+
+ gnutls_certificate_set_retrieve_function3: updated documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 2 14:30:24 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 29 15:16:35 2018 +0200
+
+ pcert: added functionality to retrieve lists
+
+ That introduces gnutls_pcert_list_import_x509_file() and
+ gnutls_x509_crt_list_import_url().
+
+ Resolves #373
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 12 10:10:28 2018 +0200
+
+ tests: sanity-cpp: fixes for win32
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 12 09:51:59 2018 +0200
+
+ .gitlab-ci.yml: bumped version of cache due to addition of CXXFLAGS
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 12 09:04:28 2018 +0200
+
+ tests: fix failures in cxx example
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 12 08:47:15 2018 +0200
+
+ cxx: bring few modern functions, and allow to get the raw session
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Philippe Widmer <pw@earthwave.ch>
+Date: Thu May 10 16:44:58 2018 +0200
+
+ New constructors for classes client_session() and server_session() provide passing flags. Closes #438.
+
+ Signed-off-by: Philippe Widmer <pw@earthwave.ch>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 10 13:38:32 2018 +0200
+
+ tests: mini-record-timing: updated to work under newer gnutls [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 10 05:49:07 2018 +0200
+
+ tests: key_update: improved error checking and increased timeout
+
+ That is to avoid reaching the maximum number of key updates per second.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 22:31:39 2018 +0200
+
+ .gitlab-ci.yml: moved fedora CI builds to F28
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 23:21:16 2018 +0200
+
+ tests: testcompat-openssl: disable DSS ciphersuites under SSL3.0
+
+ Previously if openssl wouldn't support DSS, we would only disable
+ DSS under TLS1.0 or later, not under SSL 3.0. This fixes interoperability
+ with Fedora28 openssl.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 08:12:12 2018 +0200
+
+ Makefile.am: optimized the abi-check configure step
+
+ Also ensured that the same build flags are applied in both builds
+ for ABI checking.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 23:15:06 2018 +0200
+
+ several updates to address issues found by clang static analyzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 22:51:26 2018 +0200
+
+ nettle: fix casts which result to warnings in newer gcc
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 21:58:30 2018 +0200
+
+ tests: updated for GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER from handshake
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 21:49:16 2018 +0200
+
+ handshake: use GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER consistently
+
+ Also treat GNUTLS_E_ILLEGAL_PARAMETER as a synonym if returned during
+ a connection.
+
+ Relates #442
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 21:42:44 2018 +0200
+
+ CONTRIBUTING.md: documented status of C++ library [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 10:50:30 2018 +0200
+
+ tests: cookie: fixed exit condition [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 15:39:30 2018 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 7 08:17:09 2018 +0200
+
+ .gitlab-ci.yml: fixes in win32 builds
+
+ Relates #439
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 4 08:39:30 2018 +0200
+
+ certtool: honor --ask-pass when loading a private key
+
+ This also improves the password prompt when the password requested
+ is not for a smart card.
+
+ Resolves: #436
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Michael Weiser <michael.weiser@gmx.de>
+Date: Fri Apr 27 15:35:30 2018 +0200
+
+ .gitlab-ci.yml: Disable full test suite for cross builds
+
+ Disable the full test suite for cross CI builds to speed them up.
+
+ Signed-off-by: Michael Weiser <michael.weiser@gmx.de>
+
+Author: Michael Weiser <michael.weiser@gmx.de>
+Date: Wed Apr 25 16:54:27 2018 +0200
+
+ .gitlab-ci.yml: Expire all build log artifacts
+
+ Signed-off-by: Michael Weiser <michael.weiser@gmx.de>
+
+Author: Michael Weiser <michael.weiser@gmx.de>
+Date: Wed Mar 28 22:47:01 2018 +0200
+
+ Use configured CC for pkg-config test
+
+ Using the configured compiler aids in running the test suite under qemu
+ or in a multlib scenario.
+
+ Signed-off-by: Michael Weiser <michael.weiser@gmx.de>
+
+Author: Michael Weiser <michael.weiser@gmx.de>
+Date: Mon Mar 19 19:02:12 2018 +0100
+
+ Add Debian-based qemu cross CI targets
+
+ Signed-off-by: Michael Weiser <michael.weiser@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 22:38:56 2018 +0200
+
+ updated-auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 22:17:15 2018 +0200
+
+ fuzzer: added fresh TLS1.3 server trace
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 21:59:13 2018 +0200
+
+ gnutls-serv: all skipping DTLS cookie request
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 5 21:45:56 2018 +0200
+
+ gnutls-cli: corrected data written by server trace
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 3 11:53:51 2018 +0200
+
+ tests: post handshake auth: test more combinations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 3 11:48:46 2018 +0200
+
+ post_handshake_auth: send extension irrespective of certificates being present
+
+ The feature does not necessarily require certificates to be present
+ and an empty cert can be presented. Furthermore, the certificates
+ can be set later on the credentials structure.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 3 13:48:52 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 8 18:38:47 2018 +0200
+
+ tests: added interop tests with openssl under TLS1.3
+
+ This adds interoperability tests for:
+ * PSK with elliptic curve DHE
+ * RSA,RSA-PSS,secp256r1,ed25519 server certificate
+ * RSA,RSA-PSS,secp256r1,ed25519 client certificate
+ * X25519,SECP256R1 key share exchange
+ * key share with HRR
+
+ Relates #328
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 10:07:32 2018 +0200
+
+ doc: clarified re-handshake details under TLS1.2 server
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 09:09:41 2018 +0200
+
+ tls13/certificate_request: corrected check of duplicate signature algorithms
+
+ Made the check local when parsing a certificate request, as we may
+ receive multiple requests when post-handshake authentication is
+ in place. Furthermore check whether this extension has been received
+ as this is a mandatory one. In addition handle a memory leak when
+ multiple peer certificates are set.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 08:41:22 2018 +0200
+
+ gnutls_reauth: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 21:35:52 2018 +0200
+
+ gnutls-cli: enhanced tool for TLS1.3 options
+
+ This patch allows a client to enable post-handshake
+ authentication, perform re-key and restrict the sent key shares.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 14:51:15 2018 +0200
+
+ tls13/certificate: send empty certificate instead of skipping
+
+ According to TLS1.3 spec:
+ The server's certificate_list MUST always be non-empty. A client
+ will send an empty certificate_list if it does not have an
+ appropriate certificate to send in response to the server's
+ authentication request.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 13:47:57 2018 +0200
+
+ _gnutls_figure_common_ciphersuite: ignore certificate check if PSK is negotiated
+
+ That is, if we are performing PSK under TLS1.3, don't bother
+ checking whether the certificate is compatible with the ciphersuite;
+ there isn't any.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 10:53:51 2018 +0200
+
+ tls13/certificate_verify: corrected context in signatures in client side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 10:47:59 2018 +0200
+
+ _gnutls13_handshake_sign_data: avoid unnecessary copy
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 09:01:28 2018 +0200
+
+ handshake: cleanup in TLS1.3 initial secret calculation
+
+ That eliminates duplicate code in server hello parsing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 08:06:14 2018 +0200
+
+ psk: compute binder which is compatible with draft-ietf-tls-tls13
+
+ Previously the computed binder values was not compatible with any
+ TLS1.3 draft, and was not interoperating with openssl or tlslite.
+
+ Resolves #427
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 4 08:06:35 2018 +0200
+
+ CONTRIBUTING.md: added text on CI [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 3 14:19:34 2018 +0200
+
+ tests: fallback scsv: check proper fallback under TLS 1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 3 15:13:13 2018 +0200
+
+ encrypt_packet_tls13: made size check safer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 28 11:14:34 2018 +0200
+
+ pkcs11: mark private key objects as sensitive by default
+
+ That is, to prevent accidentally creating objects which can
+ be exported.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 15:02:53 2018 +0200
+
+ tests: check the behavior of TLS1.2 key exchange methods under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 15:11:28 2018 +0200
+
+ psk: mark psk_ke_modes as invalid when ignored
+
+ TLS1.3 handles the receiving of pre-shared keys extension as
+ invalid when the psk_ke_modes extension is not received as well.
+ As such, when we ignore the psk_ke_modes for some reason (e.g.,
+ no credentials) we need to indicate that it was received. We
+ use the invalid mode flag for that reason, allowing the handshake
+ to fail later for the right reason (e.g., no credentials error rather
+ than illegal extension).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 15:01:48 2018 +0200
+
+ priority: handle RSA-PSK ciphersuites similar to SRP
+
+ That is, when specified disable TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Apr 28 14:14:30 2018 +0200
+
+ Add another sni related test
+
+ As --sni-hostname does not imply --verify-hostname a hostname mismatch
+ still triggers an error.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 14:00:15 2018 +0200
+
+ tests: sni-hostname was updated to support TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 29 13:44:04 2018 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Apr 28 14:11:27 2018 +0200
+
+ doc: Add crossreference/warning
+
+ Add pointer to --verify-hostname to --sni-hostname description.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 23 13:58:22 2018 +0200
+
+ gnutls-cli: added option to specify the verification hostname
+
+ This enables testing various scenarios, by allowing to specify the
+ hostname to be used for certificate validation when connecting to
+ a remote host (e.g., localhost but with a certificate for example.com).
+
+ Resolves #344
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 26 09:06:00 2018 +0200
+
+ doc: fixes for better latex pdf generation [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 24 08:36:06 2018 +0200
+
+ retrieve_pin: refuse to retrieve PIN from URI more than one time
+
+ That is, prevent re-using a static PIN if it has already been
+ known to be wrong. Introduced tests of that behavior.
+
+ Resolves #425
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 24 16:42:10 2018 +0200
+
+ doc: updated OCSP documentation [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 22 16:02:08 2018 +0200
+
+ gnutls.h.in: corrected typo [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 20 08:42:27 2018 +0200
+
+ fuzz: corrected TLS1.3 enablement [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 17 10:59:25 2018 +0200
+
+ _gnutls_epoch_new: allow re-allocation epoch next epoch
+
+ On certain cases when re-handshake is interrupted by application
+ data, _gnutls_epoch_new() will be called twice. Make sure that
+ this does not lead to an error. We also rename the function to
+ clarify its purpose _gnutls_epoch_setup_next().
+
+ Resolves #426
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 17 09:52:01 2018 +0200
+
+ tests: added reproducers for receiving app data when rehandshake is expected
+
+ Relates: #426
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 17 09:31:12 2018 +0200
+
+ tests: eliminated exit_code variable used in few tests
+
+ It was a legacy variable for error printing that was never
+ used uniformly.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 17 09:24:29 2018 +0200
+
+ tests: eagain: moved to cmocka and enhanced for TLS1.3
+
+ That also makes macros from eagain-common.h functioning under cmocka.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 16 09:51:11 2018 +0200
+
+ tests: tls12-rehandshake-cert*: run multiple rehandshake tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 17 07:45:54 2018 +0200
+
+ tls13/finished: addressed memory leak in receiving finished packet
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7518
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 16 15:35:33 2018 +0200
+
+ priority: document the reasons for the order of supported groups [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 16 15:14:01 2018 +0200
+
+ handshake: described the epoch reference counting [ci skip]
+
+ It is used only in DTLS where multiple handshake states may be
+ active.
+
+ Resolves #421
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 16 09:51:11 2018 +0200
+
+ tests: tls12-rehandshake-cert-3: run multiple rehandshake tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 11 14:35:26 2018 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 11 08:34:15 2018 +0200
+
+ ANON,SRP,NULL ciphersuites: when set do not negotiate TLS1.3 or later
+
+ The reason is that these ciphersuites cannot be negotiated using TLS1.3.
+ There is a different strategy followed for these.
+
+ * NULL ciphersuites: they are not something normally enabled and used
+ for debugging purposes mostly. When set both in client and server side
+ only TLS1.2 can be used.
+
+ * SRP ciphersuites: they are used on client side when the client is actually
+ performing a username-password authentication with SRP. On server side we
+ can have indeed a server support SRP and non-SRP. In that case we limit
+ both on TLS1.2. That an unfortunate restriction, but is not a regression
+ and IMHO these servers would most likely be phased out as very few would
+ want to stick to TLS1.2 connections for SRP; or we may have an SRP update
+ for TLS1.3 which could lift that limitation in the future.
+
+ * ANON ciphersuites: they are used in certain client/server setups where very
+ basic level of security is required, and in opportunistic encryption scenarios.
+ There is a difference in the handling of these cases. In the case of Anon-only
+ server/clients they provide the session with anonymous credentials structure; in
+ the case of opportunistic encryption they provide both certificate and anonymous
+ credentials. Thus we allow the protocol (TLS1.3) be in the priorities, but if we
+ see no certificate or PSK credentials we disable TLS1.3 negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 7 21:42:57 2018 +0200
+
+ ext/pre_shared_key: cleanups in error handling
+
+ This addresses a memory leak found via oss-fuzz. It also
+ sets the right index on the selected PSK, and returns the
+ right server error code on incorrect key file.
+
+ Addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7465
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 7 21:27:27 2018 +0200
+
+ ext/psk_ke_modes: corrected data access
+
+ That also improves the if-checks.
+
+ Issue and reproducer discovered via oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7470
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 7 21:06:53 2018 +0200
+
+ fuzz: added client and server traces for TLS 1.3 draft-26 [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 7 06:20:05 2018 +0200
+
+ doc: corrected space-tab issues in examples
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 6 20:51:39 2018 +0200
+
+ constate: fixed key generation for TLS1.3
+
+ This amends 62ea232f180b980a0d4b6462c468706db6cc4700, and
+ removes invalid NULL checks, as well as corrects the key
+ set for server side.
+
+ This is verified against openssl master, but does not include
+ automated test suite; it will be tested as part of #328
+
+ Resolves #419
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 4 14:51:08 2018 +0200
+
+ doc: re-organized and modernized examples
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 4 13:47:36 2018 +0200
+
+ doc: updated for TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 6 13:36:11 2018 +0200
+
+ fuzz: added PSK traces with TLS1.3
+
+ Relates: #359
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 4 15:28:37 2018 +0200
+
+ psk: save the username on auth info struct under TLS1.3
+
+ Add the necessary tests to verify that gnutls_psk_server_get_username()
+ reports the right username under TLS1.2 and TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 22 10:02:36 2018 +0100
+
+ tests: enhanced test suite for TLS1.3 and PSK
+
+ That includes tests with unknown usernames and connections with wrong key
+ and updates to fastopen.sh to use certificate auth, making it applicable
+ under TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 29 09:51:32 2018 +0200
+
+ priority: added GROUP-DH-ALL and GROUP-EC-ALL
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 3 13:10:30 2018 +0200
+
+ dumbfw: account for extension data padding
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 5 09:04:47 2018 +0200
+
+ Simplified the _gnutls13_psk_ext_parser interface and added unit tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Ander Juaristi <a@juaristi.eus>
+Date: Thu Mar 22 08:59:56 2018 +0100
+
+ Added support for out-of-band Pre-shared keys under TLS1.3
+
+ That adds support for pre-shared keys with and without Diffie-Hellman
+ key exchange. That's a modified version of initial Ander's patch.
+
+ Resolves #414
+ Resolves #125
+
+ Signed-off-by: Ander Juaristi <a@juaristi.eus>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 6 10:36:18 2018 +0200
+
+ certtool: key-type desc was moved along the privkey functionality [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 4 13:47:25 2018 +0200
+
+ gnutls_record_can_use_length_hiding: corrected return type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 4 16:54:15 2018 +0200
+
+ encrypt_packet_tls13: reverted to original API
+
+ That allows more uniformity across encrypt/decrypt, and
+ across different protocol handling.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 25 20:08:26 2018 +0200
+
+ nettle: corrected typo in version check for compatibility mode with 3.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 11:11:52 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 09:45:44 2018 +0100
+
+ protocols: bumped TLS1.3 protocol to draft -26
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 09:23:05 2018 +0100
+
+ record: added AAD data when encrypting or decrypting
+
+ This is a requirement of draft-ietf-tls-tls13-25
+
+ Resolves #409
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 12 17:10:42 2018 +0100
+
+ priorities: disable any key exchange methods if there is no TLS1.2 or earlier
+
+ That is, because TLS1.2 has specific requirements in the ordering of
+ curves/groups if certain ciphersuites (ECDHE/DHE) are present, and
+ by being able to eliminate them early we simplify the negotiation
+ for TLS1.3-only clients/servers.
+
+ Relates #378
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 9 12:12:56 2018 +0100
+
+ _gnutls_supported_ecc_recv_params: take into account precedence
+
+ That is, when %SERVER_PRECEDENCE is given in the priority string make
+ sure that the negotiated curve of DH group respects the server's priorities.
+ That's very relevant under TLS1.3 as ciphersuite negotiation itself, where
+ %SERVER_PRECEDENCE applied, does contain only the cipher algorithm and MAC
+ unlike TLS1.2 which included key exchange as well.
+
+ Resolves #378
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 12 10:37:00 2018 +0100
+
+ supported_versions: cannot be used to negotiate pre-TLS1.3
+
+ This is a requirement of draft-ietf-tls-tls13-26
+
+ Resolves #410
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 23 20:45:40 2018 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 23 07:04:37 2018 +0100
+
+ doc: mention gnutls_privkey_import_ext4 in upgrade from 3.5.x
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 23 07:02:23 2018 +0100
+
+ doc: added since field in gnutls_record_send2() description
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 23 06:47:55 2018 +0100
+
+ Makefile.am: reduce automake warnings and corrected version
+
+ That is, avoid using the := syntax, set the right version variable
+ and use a hidden file for abi-check cache stamp.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 18 15:46:36 2018 +0100
+
+ The abi-check target was updated to check against the last tag
+
+ As abi-dumper and abi-compliance-checker tools are not reliable when
+ run across different systems, we now compare the previous tag ABI with the
+ current compiled library. That is in contrast with the previous behavior
+ of storing the output files of abi-dumper, which can become obsolete on
+ a CI update.
+
+ That also moves the ABI check only on the CI, and not in the 'make dist' rule
+ as it takes significant time to run.
+
+ This relates to an issue reported against libidn2's use of abi-compliance-checker
+ but it affects gnutls as they share similar code:
+ https://gitlab.com/libidn/libidn2/issues/42
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 20 07:15:13 2018 +0100
+
+ nettle/pk: include nettle/version.h
+
+ That enables the nettle version macros to operate.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 14:42:38 2018 +0100
+
+ tests: avoid duplicate runs of tests when not necessary
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 18:31:40 2018 +0100
+
+ tests: moved invalid-cert reproducer into fuzz/ reproducers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 18:29:23 2018 +0100
+
+ tests: testpkcs11.sh was moved to the main tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 18:24:10 2018 +0100
+
+ tests: long-crl.sh was moved to main suite
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 15:22:14 2018 +0100
+
+ tests: suite: dropped ocsp-coverage and cert-coverage
+
+ These tests are duplicates of fuzz/gnutls_ocsp_resp/req_parser_fuzzer
+ and gnutls_x509_parser_fuzzer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 15:11:38 2018 +0100
+
+ tests: testsrn.sh was removed as duplicate of safe-renegotation/ tests
+
+ Also safe-renegotiation tests were made TLS1.2-only as they do not
+ apply to TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 15:07:14 2018 +0100
+
+ tests: pkcs7-cat: moved to main suite
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 15:46:16 2018 +0100
+
+ tests: updated for TLS1.3 inclusion
+
+ This moves the test to use a specific version or test multiple
+ TLS versions if applicable.
+
+ Resolves #413
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 19 09:00:23 2018 +0100
+
+ tests: mini-record-retvals was split into return vals checking and alerts checking
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 13:47:46 2018 +0100
+
+ tests: client-fast-open: updated for TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 13:43:47 2018 +0100
+
+ tests: removed unused test
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 13 13:41:19 2018 +0100
+
+ tests: auto-verify: update for TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 10 19:08:08 2018 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 8 16:21:20 2018 +0100
+
+ tlsfuzzer: updated to the latest version
+
+ Also enabled the RSA-PSS tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 8 16:00:34 2018 +0100
+
+ alert: send the appropriate alert on GNUTLS_E_ERROR_IN_FINISHED_PACKET
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 8 14:54:55 2018 +0100
+
+ Bumped TLS1.3 draft version to -23
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 8 13:57:05 2018 +0100
+
+ Hello retry request matches server hello
+
+ That also distinguishes between them by using the special random value,
+ and implements the version check as in draft-ietf-tls-tls13-24.
+
+ Resolves #391 #390 #392
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 7 12:52:46 2018 +0100
+
+ tests: added negative tests for RSA-PSS key exchange
+
+ Relates #400
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 6 15:09:50 2018 +0100
+
+ signatures: distinguish RSA-PSS signatures with RSA PKCS#1 1.5 certificates from "pure"
+
+ This change enhances signature algorithms to have a private key algorithm
+ parameter. That is, to allow signature algorithms operating with a private
+ key of type X while the public key is of type Y. That is useful for the
+ RSA-PSS signatures which are of two types; one which is seen from servers
+ having PKCS#1 1.5 certificates, the other with RSA-PSS certificates, while
+ both utilize RSA-PSS private keys.
+
+ This is a draft-ietf-tls-tls13-23 change.
+
+ Resolves #400
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 28 12:41:40 2018 +0100
+
+ Server hello format follows TLS1.2 format
+
+ Also version negotiation was moved to supported_versions extension,
+ and session ID is set by client following appendix D.4.
+
+ This is a draft-ietf-tls-tls13-22 change.
+
+ Resolves #393, #389, #397
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 28 11:38:53 2018 +0100
+
+ Renumbered the key share extension to 51
+
+ This is a draft-ietf-tls-tls13-23 change.
+
+ Resolves #398
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 22 16:12:55 2018 +0100
+
+ record: ignore any ChangeCipherSpec messages under TLS1.3 handshake
+
+ Also send ChangeCipherSpec messages under TLS1.3 handshake.
+
+ This is a draft-ietf-tls-tls13-22 change.
+
+ Resolves #395
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 22 14:42:43 2018 +0100
+
+ record: send 0x0303 under TLS1.3
+
+ This is a draft-ietf-tls-tls13-22 change.
+
+ Resolves #396
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 8 12:03:39 2018 +0100
+
+ cryptodev: fix prototype of cryptodev_mac_fast [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 7 16:14:51 2018 +0100
+
+ cryptodev: added missing macro [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 5 15:42:14 2018 +0100
+
+ tests: added unit tests of gnutls_x509_crt_export
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 23:21:34 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 23:09:11 2018 +0100
+
+ gnutls_x509_crt_export2: avoid re-encoding
+
+ That prevents possible re-encoding issues in libtasn1 or ambiguously
+ formatted DER data, from affecting verbatim usage of certificates.
+
+ Relates #403
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 17:48:01 2018 +0100
+
+ tests: added reproducer with DER re-encoding error on client side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 4 19:07:29 2018 +0100
+
+ cfg.mk: update-po rule uses commit -s
+
+ This makes it produce a commit message which can be sent to
+ the repo (Signed-off-by is mandatory).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 4 19:01:41 2018 +0100
+
+ Sync with TP.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 4 19:01:23 2018 +0100
+
+ CONTRIBUTING.md: added more info about gnulib
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Mar 3 18:42:20 2018 +0100
+
+ Improve fuzzer coverage report creation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 23:40:43 2018 +0100
+
+ pkcs11: set the modulus bits on RSA keys
+
+ That value is necessary when using RSA-PSS keys.
+
+ Relates #402
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 14:51:31 2018 +0100
+
+ gnutls_privkey_import_ext4: enhanced with GNUTLS_PRIVKEY_INFO_PK_ALGO_BITS flag
+
+ That flag is utilized by the information function to obtain the
+ value of the parameters (e.g., modulus). That information is necessary
+ to safely handle RSA-PSS keys.
+
+ For RSA-PSS keys this is a regression since 3.6.0 where this API was
+ introduced, but as this change is necessary and 3.6.x is not yet marked
+ as stable, it should be acceptable.
+
+ Relates #402
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 11:18:12 2018 +0100
+
+ _gnutls_find_rsa_pss_salt_size: add a validity check for salt size
+
+ That is, in order to reject invalid parameters.
+
+ Resolves #402
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 2 09:38:55 2018 +0100
+
+ tests: eliminated destructive tests
+
+ That adds a dependency to p11-kit 0.23.10 for the test suite.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 1 16:38:29 2018 +0100
+
+ configure: simplified nettle version check
+
+ Relates #401
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Łukasz Stelmach <stlman@poczta.fm>
+Date: Tue Feb 27 15:44:55 2018 +0100
+
+ gnutls-cli: do not ask any questions with --strict-tofu
+
+ Signed-off-by: Łukasz Stelmach <stlman@poczta.fm>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Feb 27 22:04:10 2018 +0100
+
+ Update oss-fuzz corpora
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 22 11:43:53 2018 +0100
+
+ drbg-aes: use the new nettle APIs for AES
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 22 11:29:08 2018 +0100
+
+ accelerated: padlock: use the new nettle APIs
+
+ Also remove any ifdefs for nettle (it is not conditionally compiled in),
+ and do not register accelerators for AES-192-CBC. That cipher is widely
+ ignored to bother.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 26 11:46:09 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 26 11:44:56 2018 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 23 09:55:50 2018 +0100
+
+ gnutls_ext_raw_parse: introduced function
+
+ That function can be combined with callbacks like
+ gnutls_handshake_set_hook_function() for applications to
+ be able to process messages when necessary.
+
+ Resolves #382
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 21 11:46:08 2018 +0100
+
+ fuzz: added TLS1.3 client and server traces [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 21 11:21:36 2018 +0100
+
+ fuzz: enable fuzzer target in afl examples and add missing script [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 21 11:20:31 2018 +0100
+
+ fuzz: fixes in README file [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 20:11:57 2018 +0100
+
+ updated Since version in new function entries as well as map file versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 17:17:45 2018 +0100
+
+ fuzz: enable TLS1.3 in server and client fuzzers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 15:10:00 2018 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 15:02:36 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Jan 23 16:39:36 2018 +0100
+
+ record: new gnutls_record_send2 function
+
+ This adds a new function gnutls_record_send2() which takes an extra
+ argument to specify the padding size of the record.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Feb 8 13:24:46 2018 +0100
+
+ _gnutls_record_overhead: count content type octet in plaintext
+
+ In TLS 1.3, TLSInnerPlaintext has the 'type' field followed by the
+ padding. Exclude it from the overhead calculation.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 3 14:14:56 2018 +0100
+
+ tests: check extended record padding work with TLS 1.3
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 21 17:02:22 2017 +0100
+
+ range: make length hiding always usable under TLS 1.3
+
+ This patch reintroduce the extended record padding mode removed in
+ commit 7df219f0. Under TLS 1.3, the padding mode can be implemented
+ in the record protocol.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Jan 3 14:10:22 2018 +0100
+
+ tests: re-enable mini-record-range test
+
+ This test was previously disabled as part of NEW_PADDING extension
+ removal (commit 7df219f0). Even though the extension is not usable,
+ gnutls_record_send_range() should work with the standard TLS block
+ cipher padding.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Dec 21 15:53:30 2017 +0100
+
+ doc: fix mention of gnutls_record_send_range()
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 27 16:38:14 2018 +0100
+
+ po: lib/x509/ocsp.c added to translatable files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 4 17:32:58 2018 +0100
+
+ tests: corrected various typos
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 4 17:26:54 2018 +0100
+
+ doc: use 3.6.xx to be consistent with other version references
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 2 12:44:15 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 13 10:11:57 2017 +0100
+
+ doc: getfuncs.pl: distinguish between different typedef types
+
+ That allows to properly distinguish a struct from a one liner
+ typedef.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 13 08:00:38 2017 +0100
+
+ check_ocsp_response: print OCSP response actual error on debug log
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 12 14:55:29 2017 +0100
+
+ x509/cert: reorganized
+
+ Split functionality related to certificate credentials and
+ session certificate handling in cert-cred.c and cert-session.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 29 16:19:56 2017 +0100
+
+ tests: added unit test for gnutls_ocsp_resp_list_import2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 10:35:53 2017 +0200
+
+ doc: updated
+
+ * document the new behavior of gnutls_certificate_set_ocsp_status_request_file
+ * updated text on OCSP stapled responses
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 16:31:02 2017 +0100
+
+ tests: added ocsptool sanity check program
+
+ This checks its functionality in loading and exporting PEM
+ and DER structures.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 16 16:05:15 2017 +0200
+
+ tests: enhanced OCSP tests
+
+ * Run tests under TLS1.2 and TLS1.3
+ * Verify whether multiple OCSP responses are received in client
+ side, under TLS1.3.
+ * Verify that OCSP status responses can be sent by
+ client under TLS1.3
+ * Verify operation of gnutls_certificate_retrieve_function3
+ * Verify operation when multiple OCSP responses by file are set
+
+ Resolves #307
+ Resolves #291
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 12 08:47:00 2017 +0100
+
+ cert auth: use a single callback to call for OCSP
+
+ That is, when selecting the certificate to use, point to
+ the callback to use as well (whether it being the global or
+ a specific) one, for OCSP.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 22 10:32:04 2017 +0100
+
+ ocsp: introduced gnutls_certificate_get_ocsp_expiration()
+
+ This is a function to allow obtaining the validity of the OCSP responses
+ already set in the credential structures.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 8 13:45:24 2017 +0100
+
+ ocsp: enhanced the OCSP response loading APIs
+
+ Introduced gnutls_certificate_set_ocsp_status_request_file2() and
+ gnutls_certificate_set_ocsp_status_request_mem(). These functions
+ behave as the equivalent certificate loading functions and pre-load
+ the OCSP response provided as a file, either in DER or in PEM form.
+
+ In addition, ensure that if the server is provided a problematic OCSP
+ response, or the OCSP response is not renewed before it is invalid, we
+ will not provide it to the clients.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 11:26:55 2017 +0200
+
+ gnutls-serv: allow loading multiple OCSP responses
+
+ That is, allow specifying multiple 'ocsp-response' options on
+ command line. In addition introduce the option 'ignore-ocsp-response-errors'
+ which will set the GNUTLS_CERTIFICATE_SKIP_OCSP_RESPONSE_CHECK flag
+ prior to importing the response.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 10:32:20 2017 +0200
+
+ cert: introduced flag GNUTLS_CERTIFICATE_SKIP_OCSP_RESPONSE_CHECK
+
+ This allows reverting the new semantics of checking the loaded
+ OCSP response against the certificates present and return
+ to the 3.5.x semantics.
+
+ That option is also useful for debugging as it allows setting
+ an arbitrary response and checking gnutls' client behavior with that.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 7 16:16:55 2017 +0100
+
+ gnutls_certificate_set_ocsp_status_request_file: match input response to certificates
+
+ That is, iterate through the certificate chain to figure to which
+ certificate the response corresponds to, and assign it to it.
+ That allows for applications to re-use this function to set
+ multiple responses when available.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 6 13:51:52 2017 +0100
+
+ ocsp: moved non-extension related functions to ocsp-api.c
+
+ That keeps ext/status_response.c clear of items that are
+ not related with the extension handling.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 17 09:59:53 2017 +0200
+
+ gnutls_ocsp_status_request_get2: allow operation under TLS1.3 for server side
+
+ Under TLS1.3 it is possible for both client and server to send the
+ status request extension in certificate message.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 17 08:32:09 2017 +0200
+
+ select_sign_algorithm: check KX type only on pre-TLS1.3
+
+ That, when selecting a certificate under TLS1.3, considers
+ the negotiated signature algorithms for compatibility with the
+ certificate to be selected.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 6 13:45:21 2017 +0100
+
+ rename _gnutls_selected_certs_set -> selected_certs_set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 6 13:32:28 2017 +0100
+
+ ocsp: send all the OCSP responses under TLS1.3
+
+ That is, any responses set by the caller application (directly
+ or via a callback), will be sent to the peer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 6 13:18:16 2017 +0100
+
+ introduced gnutls_certificate_retrieve_function3
+
+ That allows a certificate callback to provide OCSP responses in addition
+ to certificates. That also introduces a flags option which currently
+ accepts GNUTLS_CERT_RETR_DEINIT_ALL which allows the callback to
+ specify whether the provided data should be deinitialized.
+
+ To simplify the certificate callback code, all previous (now legacy)
+ callbacks are implemented as wrappers over the new callback function.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 29 14:27:44 2017 +0100
+
+ gnutls_ocsp_resp_list_import2: introduced
+
+ That is, introduced function to to import multiple OCSP PEM
+ responses into a list.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 16:20:48 2017 +0100
+
+ ocsptool: import and export OCSP responses in PEM format
+
+ That also modifies the 'request-info' and 'response-info' commands
+ to check the 'outfile' parameter and if set, to store the corresponding
+ structure into that file. Currently for OCSP requests there is no
+ printing of PEM data.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 14:59:31 2017 +0100
+
+ ocsp: introduced gnutls_ocsp_resp_import2 and gnutls_ocsp_resp_export2
+
+ These allow importing and exporting an OCSP response to PEM format,
+ in addition to DER.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 13 09:36:38 2017 +0200
+
+ _gnutls_x509_cert_verify_peers: verify all received OCSP responses
+
+ That is, when verifying the server's certificate, take into account
+ all present OCSP responses.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 13 09:31:58 2017 +0200
+
+ gnutls_ocsp_status_request_get2: added function
+
+ The function extends gnutls_ocsp_status_request_get() to
+ retrieve more than a single responses.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 10 10:21:19 2017 +0200
+
+ tls13/certificate: parse OCSP status response and save responses in auth info struct
+
+ That provides support of OCSP status response under TLS 1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 10 11:14:19 2017 +0200
+
+ ext/status_request: allow more than a single OCSP response to be received
+
+ That change allows for arbitrary number of OCSP responses
+ which is required in TLS1.3. The received list is now stored
+ in auth structure, and thus packed with it on resumption data.
+ The status response extension data, are now only used on server
+ side, when temporarily storing the OCSP response to send.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 10 09:59:17 2017 +0200
+
+ _gnutls_copy_certificate_auth_info: simplified and avoid multiple allocations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 19 16:16:29 2017 +0100
+
+ tests: updated to account for HMAC-SHA384 and CAMELLIA removal
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 19 16:00:45 2017 +0100
+
+ priorities: provide a more consistent "story" for default cipher settings
+
+ Current settings in NORMAL priorities which were affected:
+ * Enabled ciphers:
+ - AES-GCM
+ - CHACHA20-POLY1305
+ - AES-CCM
+ - AES-CBC
+
+ * Enabled signature algorithms:
+ - RSA-SHA256
+ - RSA-PSS-SHA256
+ - ECDSA-SHA256 / ECDSA-SECP256R1-SHA256
+ - EDDSA-ED25519
+ - RSA-SHA384
+ - RSA-PSS-SHA384
+ - ECDSA-SHA384 / ECDSA-SECP384R1-SHA384
+ - RSA-SHA512
+ - RSA-PSS-SHA512
+ - ECDSA-SHA512 / ECDSA-SECP521R1-SHA512
+ - RSA-SHA1
+ - ECDSA-SHA1
+
+ Removed:
+ * Ciphersuites utilizing HMAC-SHA384. That MAC is only used on "legacy"
+ type of ciphersuites, and doesn't provide any advantage over HMAC-SHA256.
+ * Ciphersuites utilizing CAMELLIA were removed. TLS1.3 doesn't define any
+ CAMELLIA ciphersuites, and thus provide consistent defaults across
+ protocols.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 17 09:27:36 2017 +0200
+
+ certificate request: corrected parsing of signature algorithms
+
+ That fixes an issue in TLS 1.3 certificate request message parsing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 4 18:22:54 2017 +0100
+
+ tlsfuzzer: updated to latest master
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 9 11:23:24 2017 +0100
+
+ doc: documented hsk_flags "lifetime" and its reset
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 13:13:31 2017 +0100
+
+ session state: TLS1.2 and TLS1.3 state is stored as union
+
+ That is, to reduce memory usage as these protocol cannot be used
+ in parallel.
+
+ Relates: #281
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 13:08:02 2017 +0100
+
+ session state: organized key exchange keys into structures
+
+ That is, with the view of separating the data needed for
+ TLS1.2 and earlier and TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 7 16:52:21 2017 +0100
+
+ record state: avoid memory allocations for stored keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 7 16:25:31 2017 +0100
+
+ handshake: ffdhe flags merged with handshake flags
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 7 16:09:12 2017 +0100
+
+ handshake: false start flag merged with hsk_flags
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 7 15:36:01 2017 +0100
+
+ handshake: use hsk_flags in TLS1.2 and TLS1.3
+
+ The flags provide a more transparent view of the received
+ and expected messages.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 5 09:01:56 2017 +0100
+
+ doc: added text on TLS1.3 rekey and reauthentication
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 4 17:45:11 2017 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 2 15:30:43 2017 +0100
+
+ tests: re-enabled post-handshake auth tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 2 15:19:10 2017 +0100
+
+ handshake: added support for post-handshake authentication
+
+ That is:
+ * introduced a gnutls_init() flag for clients to enable post-handshake
+ authentication
+ * introduced gnutls_reauth() function, to be called by servers to request
+ authentication, and by clients to perform authentication
+
+ Resolves #562
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 11:12:14 2017 +0100
+
+ gnutls_record_set_state: use const for seq_number
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 16:56:12 2017 +0100
+
+ tests: added test suite on key limits
+
+ This checks whether key update occurs for the expected ciphersuites.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 16:52:58 2017 +0100
+
+ gnutls_record_get_state: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 16:01:29 2017 +0100
+
+ Introduce key usage limits under TLS1.3
+
+ That introduces a transparent key update for sending key after
+ the safety limit is reached.
+
+ Resolves #130
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 13:08:18 2017 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 30 08:59:17 2017 +0100
+
+ tests: removed unused variables and introduced temporal vars in macros
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 30 08:51:06 2017 +0100
+
+ tests: check gnutls_rehandshake() and gnutls_handshake() under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 28 12:38:52 2017 +0200
+
+ gnutls_*handshake: wrap gnutls_session_key_update under TLS 1.3
+
+ The semantics of the gnutls_handshake() and gnutls_rehandshake() functions
+ were tied to TLS 1.2 and earlier behavior. This patch attempts to merge
+ the two different semantics as follows:
+
+ TLS1.2:
+ * gnutls_rehandshake: sends a hello request message (asks the peer for a re-handshake)
+ in server side; invalid to be called in client side.
+
+ * gnutls_handshake: performs a re-handshake in either client or server side;
+ in server side it is expected to be called after
+ gnutls_rehandshake().
+
+ TLS1.3:
+ * gnutls_rehandshake: in server side sends a key update and asks the peer to re-key
+ as well; remains invalid to be called in client side.
+
+ * gnutls_handshake: sends a key update and asks the peer to re-key as well;
+ in client side; is a no-op when called in server side.
+
+ Relates #131
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 19 16:45:18 2017 +0200
+
+ tests: added unit tests with TLS1.3 key update
+
+ Relates #131
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 19 16:27:30 2017 +0200
+
+ handshake: introduced gnutls_session_key_update()
+
+ This function allows updating keys of the session and notifying
+ the peer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 19 14:52:03 2017 +0200
+
+ handshake: added TLS1.3 passive key update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Nov 29 11:18:40 2017 +0100
+
+ keylogfile: write TLS 1.3 secrets
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 28 18:28:19 2017 +0100
+
+ _gnutls_nss_keylog_write: define new internal API
+
+ This patch turns the write_nss_key_log function to an internal
+ API (with a different name) so that it can be called from other places
+ implementing TLS 1.3 key scheduling.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 11:27:12 2017 +0100
+
+ tls-fuzzer: enabled the large hello checks
+
+ These were previously not working because tls-fuzzer was not TLS1.3-ready.
+ This is addressed at the current update, and as such we enable them.
+
+ That commit also enables the SNI resumption tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 29 16:21:45 2017 +0100
+
+ hkdf: refer to nettle's hkdf.h when available
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 29 14:04:30 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 11:07:40 2017 +0100
+
+ gnutls_prf_rfc5705: apply the context limits only under TLS1.2 or earlier
+
+ These limits do not exist under TLS1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 11:04:59 2017 +0100
+
+ gnutls_prf_raw: fail under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 09:10:24 2017 +0100
+
+ tests: included behavioral test of gnutls_prf under TLS1.3
+
+ Resolves #330
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 09:03:31 2017 +0100
+
+ gnutls_prf: prevent usage under TLS1.3
+
+ Only allow its use when it is documented to have the same output
+ as gnutls_rfc5705() and in that case make it a wrapper to it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 24 11:07:20 2017 +0100
+
+ gnutls_prf_rfc5705: calculate exporter using HKDF if TLS 1.3
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 24 10:55:43 2017 +0100
+
+ handshake-tls13: derive and store exporter_master_secret
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Nov 24 10:34:26 2017 +0100
+
+ _tls13_derive_secret: define secret argument
+
+ TLS 1.3 exporters need to derive a secret from exporter_master_secret
+ or early_exporter_master_secret, not the handshake or application
+ secret stored in temp_secret. Add a new argument @secret to
+ _tls13_derive_secret to specify any secret.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 11:45:25 2017 +0100
+
+ session state: combined srp and dh prime bits variables
+
+ They were being used for the same purpose, and SRP as well as
+ DH, do not overlap to require two different variables.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 11:41:59 2017 +0100
+
+ session state: mark mod_auth_st_int as constant
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 11:39:53 2017 +0100
+
+ dtls: cookie is stored dynamically when needed rather than in pre-allocated size
+
+ That reduces the number of bytes used in cases where DTLS is not in use or
+ we are in server-side.
+
+ Relates #281
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 10 09:54:13 2017 +0200
+
+ removed legacy/unused rsa-related structures/functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Sep 23 21:43:45 2017 +0300
+
+ lib: simplify adding groups according to prioritites
+
+ There is little point, remembering if EC or DHE came first and then
+ adding necessary groups checking that flag. Instead just add groups at
+ the time first EC or DHE ciphersuite is met.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 4 09:21:06 2017 +0200
+
+ tests: added unit test for RDNs in cert callback
+
+ This verifies whether the RDNs received at the callbacks under
+ TLS1.2 and TLS1.3 have the expected values (corresponding to the
+ certificates used).
+
+ Resolves #297
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 15:59:14 2017 +0200
+
+ gnutls_auth*_get_type: use gnutls_kx_get to retrieve key exchange
+
+ That allows the functions to operate under TLS 1.3 which have
+ no key exchange as part of the ciphersuite.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 15:28:07 2017 +0200
+
+ tests: check certificate callbacks under TLS 1.2 and 1.3
+
+ Resolves #278
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 14:56:15 2017 +0200
+
+ tests: added unit tests for client certificate under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 14:21:33 2017 +0200
+
+ handshake: handle the certificate authorities extension
+
+ That is, when sending or receiving the certificate request message.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 13:59:39 2017 +0200
+
+ handshake: added support for client certificates
+
+ That is, receive and parse a certificate request, certificate
+ verify, as well as certificate in server side.
+
+ That way, client certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 11:48:28 2017 +0200
+
+ handshake: return GNUTLS_E_NO_CERTIFICATE_FOUND when no certificate is found in TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 11:43:45 2017 +0200
+
+ handshake: send certificate request when requested
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 6 11:00:16 2017 +0200
+
+ tests: added check for client hello random value after HRR
+
+ That way we ensure that we follow the tls1.3 draft which requires
+ the second client hello to be identical to the initial one.
+
+ Resolves #299
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 6 11:16:17 2017 +0200
+
+ handshake: treat reply to HRR as a reply to hello verify request
+
+ That is, re-use the client random value on the client hello which
+ is a reply to a hello retry request.
+
+ Relates #299
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 6 10:18:33 2017 +0200
+
+ tests: added key share behavioral test
+
+ This verifies whether the gnutls_init() flags GNUTLS_KEY_SHARE_TOP,
+ GNUTLS_KEY_SHARE_TOP2, GNUTLS_KEY_SHARE_TOP3 behave as advertized.
+
+ Resolves #284
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 6 09:05:20 2017 +0200
+
+ key share: added flags to gnutls_init() to modify its default behavior
+
+ That way the application can adjust the range of keys generated
+ during client hello attempting to guess the server's algorithm.
+
+ Applications are intentionally not given the option to select the
+ algorithm in the key share, but rather chose from the prioritized
+ list of groups, to avoid a disconnect between the prioritized
+ groups, and the key share sent.
+
+ Relates #284
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 2 15:40:24 2017 +0100
+
+ handshake: initialize buffer prior to use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 4 10:55:48 2017 +0200
+
+ tests: added tests for TLS1.2- rollback detection
+
+ That is, tests which check
+ * whether the server's generated values under TLS1.2- match the expected
+ * whether the client would fail on negotiation if the rollback values are detected
+
+ Resolves #293
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 4 10:33:11 2017 +0200
+
+ _gnutls_set_server_random: corrected TLS1.2 and TLS1.1 rollback detection
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 11:08:04 2017 +0200
+
+ extensions: renamed _gnutls_hello_ext_*sdata to _gnutls_hello_ext_*priv
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 09:35:52 2017 +0200
+
+ server_name: use the new API for ext data setting
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 08:58:59 2017 +0200
+
+ extensions: enhanced extension lib with pack and unpack functions
+
+ That allows the functionality to be used for the majority of extensions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 08:41:51 2017 +0200
+
+ tests: check the correct handling of cookie extension in client side
+
+ Resolves #218
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 3 08:39:58 2017 +0200
+
+ extensions: allow receiving and sending extensions which were not advertised by client side
+
+ That is needed due to the special treatment of the cookie extension,
+ which is sent by the server in HRR even if it was not advertised by
+ the client.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 16:41:09 2017 +0200
+
+ extensions: optimized gid_to_ext_entry() map on known extensions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 16:23:10 2017 +0200
+
+ extensions: avoid double loop when parsing received extensions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 15:40:36 2017 +0200
+
+ extensions: avoid looping to discover location of saved data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 15:16:04 2017 +0200
+
+ handshake: added support for reading and sending cookie extension
+
+ That introduces an internal API to associate data to an extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 13 08:45:09 2017 +0100
+
+ doc: document the GNUTLS_E_NO_COMMON_KEY_SHARE usage
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 11:58:25 2017 +0200
+
+ tests: added unit test for hello retry request support
+
+ Resolves #285
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 14:24:54 2017 +0200
+
+ tests: rehandshake tests were restricted to TLS1.2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 14:11:34 2017 +0200
+
+ handshake: reduce assert printouts in common cases
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 10:10:48 2017 +0200
+
+ handshake: accept hello retry request in client side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 09:08:59 2017 +0200
+
+ buf: _gnutls_buffer_pop_data made easier to use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 09:01:41 2017 +0200
+
+ handshake: simplified version parsing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 16:40:43 2017 +0200
+
+ handshake: send hello retry request when no key share matches
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 12:54:38 2017 +0200
+
+ ext: do not advertize post handshake authentication
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 29 08:21:54 2017 +0200
+
+ tests: check TLS1.3 record layer packet modification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 28 07:50:42 2017 +0200
+
+ handshake: split set_client_random to gen and set
+
+ This aligns with set_server_random() and gen_server_random().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 28 07:47:40 2017 +0200
+
+ handshake: only attempt to detect downgrade attacks if TLS1.3 is supported
+
+ Otherwise, connections under TLS 1.2 may fail, even if client never enabled
+ TLS 1.3 support.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 15:10:07 2017 +0200
+
+ nettle/pk: explicitly mark intentional fallthrough in switch cases
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 22 16:59:31 2017 +0200
+
+ key share: removed duplicate message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 08:20:10 2017 +0200
+
+ tests: fix warning in rng-sigint.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 08:58:26 2017 +0200
+
+ tests: improved tls-session-supplemental
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 26 16:44:39 2017 +0200
+
+ kx: moved to new buffer API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 26 15:38:58 2017 +0200
+
+ handshake: moved to the new mbuffer API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 26 12:54:18 2017 +0200
+
+ handshake: use the new buffer type in TLS 1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 26 11:57:18 2017 +0200
+
+ handshake: new helper functions to use gnutls_buffer_st to generate mbuffers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 26 10:29:15 2017 +0200
+
+ tlsfuzzer: disable non TLS1.3-ready tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 16:28:38 2017 +0200
+
+ tests: added tests for TLS1.3 record generation / parsing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 09:47:52 2017 +0200
+
+ tests: introduced basic TLS1.3 key exchange test suite
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 16:26:45 2017 +0200
+
+ record: adjusted overhead calculation for TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 14:49:23 2017 +0200
+
+ priority: include groups into priority when having a TLS1.3-only session
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 09:46:32 2017 +0200
+
+ priority: do include all the version's signature semantics
+
+ This resolves issue, which prevented handling certain types
+ of TLS1.3-only signatures, depending on the order of enabled
+ protocols.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 09:32:25 2017 +0200
+
+ ext/key_share: corrected release of MPI parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 09:28:45 2017 +0200
+
+ ext/signature: explicitly prevent RSA/DSA and SHA1 signatures on TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 22 16:55:36 2017 +0200
+
+ hello ext: reduce verbosity
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 22 11:10:56 2017 +0200
+
+ constate.h: removed non-existing function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 22 10:55:43 2017 +0200
+
+ record: any alert is fatal under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 18 14:49:24 2017 +0200
+
+ extensions: introduced functions to obtain currently parsed message
+
+ This allows the extension handling code to operate differently
+ on different messages.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 09:30:39 2017 +0200
+
+ supported_versions: print the received versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 12:58:51 2017 +0200
+
+ handshake: introduced server side handshake [2/2]
+
+ That is, send server certificate verify and receive
+ certificate and certificate verify messages. In addition
+ introduced flags to mark the expected, or sent messages.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 10:21:26 2017 +0200
+
+ cs: select certificate under TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 09:53:47 2017 +0200
+
+ handshake: introduced server side handshake [1/2]
+
+ That is, send certificate request and certificate in server side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 09:50:10 2017 +0200
+
+ ciphersuites: introduce a maximum supported TLS/DTLS version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 21 09:41:37 2017 +0200
+
+ handshake: properly set the default record version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 16:07:39 2017 +0200
+
+ handshake: send encrypted extensions handshake message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 13:54:25 2017 +0200
+
+ handshake: parse new session ticket message
+
+ That does not include extension handling.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 15:33:16 2017 +0200
+
+ str: added _gnutls_buffer_pop_prefix24 and _gnutls_buffer_pop_prefix8
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 15:07:04 2017 +0200
+
+ str: use assert to mark impossible cases
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 15:21:16 2017 +0200
+
+ str: allow creating a read-only buffer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 13:43:14 2017 +0200
+
+ gnutls_session_get_desc: more descriptive name for TLS1.3 ciphersuites
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 09:11:37 2017 +0200
+
+ handshake: generate application keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 08:30:52 2017 +0200
+
+ constate: added _gnutls_epoch_dup
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 07:59:21 2017 +0200
+
+ constate: indentation fixes
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 10:22:36 2017 +0200
+
+ handshake: added basic support for TLS 1.3 handshake in client side
+
+ That does not include support for client certificates as it
+ requires extension handling improvements in order for extensions
+ to be context sensitive (now they cannot distinguish whether the
+ parsing routine is called during client hello or certificate request
+ reading)
+
+ This does not include proper parsing of extensions present in
+ the certificate message.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 13 14:19:12 2017 +0200
+
+ handshake: added parsing of encrypted extensions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 10:44:43 2017 +0200
+
+ crypto-api: introduce internal version of AEAD API
+
+ This allows to initialize the TLS 1.3 connection state without
+ additional allocations as required by the external API.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 11 15:16:51 2017 +0200
+
+ record: added TLS 1.3 record parsing and key derivation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 13:48:13 2017 +0200
+
+ handshake: introduced TLS 1.3 handshake client state machine outline
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:56:28 2017 +0200
+
+ extensions: separate the hello extensions from others
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:51:10 2017 +0200
+
+ hello_ext.h: removed non-existant function definition
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:48:30 2017 +0200
+
+ extensions: files renamed to hello_ext
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:46:55 2017 +0200
+
+ extensions: renamed hello extension handling functions appropriately
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:40:54 2017 +0200
+
+ extensions: simplified semantics of store and check functions
+
+ That is, _gnutls_extension_list_check was made a boolean function,
+ and both were renamed to more appropriate names such as,
+ _gnutls_hello_ext_is_present, _gnutls_hello_ext_save.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 11:30:12 2017 +0200
+
+ extension: renamed functions to reflect purpose
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 10:05:53 2017 +0200
+
+ extensions: use the low-level extension parsing code for hello parsing
+
+ That's a step towards unification of TLS-type extension handling
+ for TLS 1.3.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 20 09:46:34 2017 +0200
+
+ extv: introduced a low-level extension parsing code
+
+ This will simplify the parsing and handling of extensions throughout
+ the TLS 1.3 message contents.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 19 12:58:56 2017 +0200
+
+ extensions: simplified the extension tracking
+
+ Instead of keep a list of the received TLS extension IDs, use the bits
+ in a variable to mark the received extensions. That reduces the
+ overall memory usage due to extension tracking.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 19 12:48:14 2017 +0200
+
+ extensions: use an internal extension ID independent of the TLS id
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 14:46:13 2017 +0200
+
+ str: rename _gnutls_buffer_pop_prefix to _gnutls_buffer_pop_prefix32
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 14:45:20 2017 +0200
+
+ str: rename _gnutls_buffer_pop_datum_prefix to _gnutls_buffer_pop_datum_prefix32
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 14:10:14 2017 +0200
+
+ security params: store PRF when packing session
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 14:03:43 2017 +0200
+
+ handshake: simplify by storing a pointer to PRF mac entry
+
+ That way, we avoid multiple function calls to obtain information
+ such as hash size, and other MAC properties.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 12:13:09 2017 +0200
+
+ ext/signature: improved TLS 1.3 signature algorithm negotiation
+
+ That is, we introduce a simpler way to handle multiple versions
+ of a single signature algorithm.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 11:21:51 2017 +0200
+
+ str: added helper functions to read prefixed data with 8 or 16-bit headers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 09:44:58 2017 +0200
+
+ ecc: do not warn on receiving extension on client side
+
+ This extension can be received used under TLS 1.3 on the client side.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 14 14:30:07 2017 +0200
+
+ Added TLS 1.3 HKDF key derivation functionality
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 12 10:30:59 2017 +0200
+
+ extensions: include extension number in debugging message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 12 10:12:41 2017 +0200
+
+ tests: check behavior on the extension hello flags
+
+ That is, verify whether the various combinations of
+ GNUTLS_EXT_FLAG_CLIENT_HELLO,
+ GNUTLS_EXT_FLAG_TLS12_SERVER_HELLO,
+ GNUTLS_EXT_FLAG_TLS13_SERVER_HELLO
+ work as expected with regards to sending and receiving
+ extensions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 10:26:44 2017 +0200
+
+ extensions: apply extension msg type restrictions
+
+ That is, on the extension parsing functions ensure that
+ no extension which are not valid for the currently
+ received message are parsed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 10:13:07 2017 +0200
+
+ extensions: mark the message validity of each supported extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 09:50:58 2017 +0200
+
+ extensions: type renamed to id for clarity
+
+ We were previously using the variable named 'type' to indicate the
+ extension ID. With TLS 1.3, extensions are also given an applicability
+ type (which message the extension applies to), and thus renamed the
+ variable for clarity.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 12 08:03:59 2017 +0200
+
+ tests: guile: don't use VERS-TLS-ALL
+
+ That is, avoid enabling experimental protocols.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 12 08:00:00 2017 +0200
+
+ .gitlab-ci.yml: abi-coverage: include guile logs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 14 09:20:25 2017 +0200
+
+ nettle: added HKDF functions
+
+ They are being included conditionally depending on the RSA-PSS feature
+ (RSA-PSS and HKDF are expected to be introduced at the same version).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 15:54:40 2017 +0200
+
+ gnutls-cli-debug: use explicit TLS versions rather than TLS-ALL
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 15:37:04 2017 +0200
+
+ _gnutls_server_select_suite: don't set auth callbacks for TLS 1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 11:00:27 2017 +0200
+
+ supported_versions: print negotiated protocol
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 15:35:21 2017 +0200
+
+ Negotiate draft-TLS1.3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 14:14:58 2017 +0200
+
+ handshake: added the TLS 1.3 ciphersuites
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 11:45:39 2017 +0200
+
+ handshake: print negotiated version after its negotiation (for TLS1.3)
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 11 11:33:31 2017 +0200
+
+ tests: fix TLS version to 1.2 for tests which used VERS-TLS-ALL
+
+ This allows the test suite to run, even when TLS1.3 is still
+ experimental.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 09:34:05 2017 +0200
+
+ Added support for key share extension
+
+ This enables TLS 1.3 key exchange based on the key share extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 09:23:53 2017 +0200
+
+ handshake: always accept TLS 1.2 in client hello if we have later protocols enabled
+
+ That is because after TLS 1.3 there is no negotiation of the version using
+ the Client Hello field, but with an extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 08:23:01 2017 +0200
+
+ require nettle 3.3 or later
+
+ This will simplify handling of the x25519 key exchange.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 09:10:11 2017 +0200
+
+ str: added function to append fixed-size MPI
+
+ This is used in TLS 1.3 which introduces a new MPI over-the-wire
+ format.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 11:57:26 2017 +0200
+
+ tests: resumption tests were restricted to TLS 1.2
+
+ TLS 1.3 implements resumption is a different way, so we should
+ introduce new resumption tests once that support is in place.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 11:52:07 2017 +0200
+
+ ext/post_handshake: restrict the use of this extension to TLS 1.3 or later
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 11:46:29 2017 +0200
+
+ handshake: optimizations and enhancements in session version handling
+
+ This introduces the following new functions:
+ const version_entry_st *_gnutls_legacy_version_max(gnutls_session_t session);
+ const version_entry_st *_gnutls_version_max(gnutls_session_t session);
+
+ which replace their previous counterparts.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 11:21:24 2017 +0200
+
+ tests: check for post-handshake extension in TLS 1.2-only sessions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 11:14:56 2017 +0200
+
+ tests: added unit tests for post-handshake-auth extension
+
+ These test whether this extension is seen under TLS 1.3 in client
+ hello, and whether it is not present in server hello.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 10:33:18 2017 +0200
+
+ handshake: send client and server hellos according to TLS 1.3
+
+ That is, when TLS 1.3 is negotiated the compression algorithms and
+ session ID fields are no longer sent.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 09:44:28 2017 +0200
+
+ Added support for post handshake auth extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 13:40:19 2017 +0200
+
+ tests: updated for new behavior of disabling protocols on missing signature algorithms
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 13:38:39 2017 +0200
+
+ tests: verify that no signature algorithms with (D)TLS 1.2 will cause an error
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 13:33:46 2017 +0200
+
+ priorities: when no signature algorithms eliminate (D)TLS 1.2 or later
+
+ If an application intentionally disables all signature algorithms, ensure
+ that we can operate by eliminating protocol options which require these
+ signature algorithms to be set.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 13:16:10 2017 +0200
+
+ tests: safer use of gnutls_bye in _test_cli_serv()
+
+ In addition make sure we check gnutls_priority_set() for errors.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 09:40:46 2017 +0200
+
+ tests: added checks for special signature algorithms
+
+ This tests the behavior when signature algorithms only available
+ under TLS1.3 are present in a TLS 1.2 session.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 09:38:26 2017 +0200
+
+ tests: verify that +SIGN-ECDSA-SECP256R1-SHA256 has no effect when combined with TLS1.2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 08:56:18 2017 +0200
+
+ tests: added signature tests for ECDSA-SECP256R1-SHA256
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 09:19:16 2017 +0200
+
+ priority: do not include signature algorithms that apply to different TLS version
+
+ That is, when a signature algorithm that is only applicable
+ to specific TLS protocol semantics (e.g., ECDSA-SECP256R1-SHA256)
+ is enabled, under TLS 1.2, it will result to no code points being
+ added. That prevents connection errors due to "wrong" code
+ points being added that do not correspond to a usable signature
+ algorithm under the protocol.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 14:07:43 2017 +0200
+
+ tests: updated for the new behavior of handshake
+
+ Previously at handshake we would negotiate a ciphersuite and certificate
+ and later figure out a signature algorithm. Now we negotiate all at once,
+ so we no longer reach situations where mid-way of handshake we figure we
+ have no signature algorithm to use. Update the test cases relying on that
+ behavior to account the new one.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 11:09:51 2017 +0200
+
+ pubkey: enforce TLS 1.3 signature restrictions on verification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 16:43:51 2017 +0200
+
+ ext/signature: added TLS 1.3 signature algorithm negotiation
+
+ That patch adds the signature algorithms:
+ - GNUTLS_SIGN_ECDSA_SECP256R1_SHA256
+ - GNUTLS_SIGN_ECDSA_SECP384R1_SHA384
+ - GNUTLS_SIGN_ECDSA_SECP521R1_SHA512
+
+ and enables them for the default TLS priority strings.
+ In addition it allows negotiating signature algorithms sharing
+ the same TLS IDs, but which have different semantics between TLS
+ versions (e.g., 6,4 maps to GNUTLS_SIGN_ECDSA_SHA512 under TLS 1.2
+ but to GNUTLS_SIGN_ECDSA_SECP521R1_SHA512 under TLS 1.3).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 15:20:00 2017 +0200
+
+ tests: added unit test for TLS 1.3 version negotiation
+
+ This checks whether the Client Hello and Server Hello packets
+ contain the expected values.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 14:17:40 2017 +0200
+
+ handshake: added support for negotiating version using extension
+
+ That is, introduced the TLS 1.3 supported_versions extension. It is currently
+ only being used if negotiating TLS 1.3 or later.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 13:30:46 2017 +0200
+
+ handshake: legacy version negotiation is not used for TLS 1.3
+
+ That is, ensure that the functions used for TLS 1.2 and earlier
+ negotiation cannot be used with TLS 1.3. That is because TLS 1.3
+ is negotiated using a TLS extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 11:57:22 2017 +0200
+
+ Added TLS 1.3 Hello message random generation
+
+ That is, added check for TLS 1.3 random value requirements in client side,
+ and generation according to TLS 1.3 requirements for server and
+ client side.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 14:57:55 2018 +0100
+
+ Revert "priority: disable the enabled by default RSA-PSS signature algorithms"
+
+ This reverts commit ef44477127952c13e93d7ea88f7b549bf36602f5.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 10 11:13:57 2018 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 22 11:52:19 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 30 07:41:26 2018 +0100
+
+ tests: check gnutls_fips140_set_mode operation per thread
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 15:49:42 2018 +0100
+
+ tests: added unit test of gnutls_fips140_set_mode
+
+ Also ensure that 512-bit keys cannot be generated
+ in FIPS140-2 mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 22 11:40:42 2018 +0100
+
+ tests: gnutls_hmac_fast: explicitly enable MD5 use under FIPS140-2 mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 21 12:38:29 2017 +0100
+
+ tests: gc.c -> gnutls_hmac_fast.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 22 09:15:03 2018 +0100
+
+ doc: documented gnutls_fips140_set_mode and gnutls_fips_mode_t
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 15:07:00 2018 +0100
+
+ fips140: added function for applications to switch the FIPS140-2 mode
+
+ That would allow FIPS140-2 compliant applications to use forbidden
+ algorithms by switching to a lax FIPS140-2 mode.
+
+ Resolves #352
+ Resolves #353
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 14:01:17 2018 +0100
+
+ fips140: enforcement of allowed ciphers moved to crypto-api.c and cipher_int.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 20 15:36:59 2017 +0100
+
+ fips140: enforcement of hash and MACs use moved to crypto-api.c and hash_int.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 19 08:38:35 2018 +0100
+
+ tests: srp: increased timeout to 40secs [ci skip]
+
+ Since we increased the maximum parameters to 8k, ensure
+ that slower systems have enough time to complete the handshake.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 18 20:58:07 2018 +0100
+
+ doc: updates NEWS entry for 3.6.2 adding ABI changes [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 16 08:54:26 2018 +0100
+
+ latex: introduced functionWarning macro
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 16 08:27:56 2018 +0100
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 13 16:34:09 2018 +0100
+
+ tests: check whether gnutls_credentials_set() can be set in an hsk hook
+
+ This is useful when these are set during the handshake process
+ on the handshake hook before client hello is parsed.
+
+ Relates #382
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 13 16:47:16 2018 +0100
+
+ doc: documented how to set the credentials late in certain vhost scenarios
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 13 16:21:52 2018 +0100
+
+ doc: updated text on gnutls_handshake_set_hook_function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 13 11:12:09 2018 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 12 11:18:06 2018 +0100
+
+ priority: disable the enabled by default RSA-PSS signature algorithms
+
+ They have been modified in the latest (yet unsupported) TLS 1.3
+ drafts, so prevent causes interoperability failures by keeping them
+ on.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 12 09:20:17 2018 +0100
+
+ tests: cipher-openssl-compat: extend to include CCM tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Michael Catanzaro <mcatanzaro@igalia.com>
+Date: Fri Feb 9 10:22:24 2018 -0600
+
+ Improve documentation of gnutls_x509_trust_list_iter_get_ca [ci skip]
+
+ The documentation is confusing because it implies that
+ gnutls_x509_trust_list_iter_deinit() should be called after using this
+ function, but in fact it is generally not necessary.
+
+ Also, there was a typo here ("usin").
+
+ Signed-off-by: Michael Catanzaro <mcatanzaro@igalia.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 7 18:59:39 2018 +0100
+
+ .gitlab-ci.yml: run the fuzz testsuite under various CPU capabilities
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 7 09:24:18 2018 +0100
+
+ accelerated: make explicit key size check to all accelerated ciphers
+
+ That is, do not rely on checks done on asm level, as they vary and
+ may change over updates. Also handle consistently invalid key sizes
+ by returning an error, and eliminate calls to abort().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Vitezslav Cizek <vcizek@suse.com>
+Date: Tue Feb 6 16:46:31 2018 +0100
+
+ accelerated: check keysize in SSSE3 cipher setkey
+
+ aes_ssse3_cipher_setkey() accepted any key size,
+ which could lead to invalid memory access.
+
+ Such as with the oss-fuzz corpora file
+ fuzz/gnutls_pkcs8_key_parser_fuzzer.in/da59d34eacdf50a0019a457fb7c4916be48c99a5
+
+ Signed-off-by: Vitezslav Cizek <vcizek@suse.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 8 14:32:42 2018 +0100
+
+ p11tool: updated documentation [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 7 11:34:36 2018 +0100
+
+ nettle: use the nettle_get_secp API when available
+
+ Resolves #380
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 6 09:46:41 2017 +0100
+
+ nettle base64_encode_raw: use cast to avoid warnings
+
+ Nettle switched prototypes for base64_encode_raw() as follows:
+ -base64_encode_raw(uint8_t *dst, size_t length, const uint8_t *src);
+ +base64_encode_raw(char *dst, size_t length, const uint8_t *src);
+
+ That means we need to cast fist param to void if we want to avoid
+ warnings on different platforms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 6 14:40:59 2018 +0100
+
+ accelerated: x86-common: do not use _xgetbv() with clang
+
+ Resolves #372
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 6 14:37:42 2018 +0100
+
+ configure: treat solaris as ELF system
+
+ Resolves #376
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 6 04:03:45 2018 +0100
+
+ tests: repeat cipher test with multiple keys and nonces
+
+ In addition include chacha20-poly1305 into the tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 6 03:59:17 2018 +0100
+
+ accelerated: aarch64: fix GCM counter increment
+
+ Ensure that we restrict the GCM counter to the 4 bytes assigned to it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 6 04:39:39 2018 +0100
+
+ accelerated: fix use of SSSE3 vpaes_encrypt
+
+ Previously we assumed that the nettle GCM internal functions
+ will use the provided ECB function for single block encryption.
+ Newer versions no longer operate that way. Ensure that we
+ are compatible with them.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 5 20:25:23 2018 +0100
+
+ accelerated: fix use of aesni_ecb_encrypt()
+
+ Previously we assumed that the nettle GCM internal functions
+ will use the provided ECB function for single block encryption.
+ Newer versions no longer operate that way. Ensure that we
+ are compatible with them.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 2 15:49:48 2018 +0100
+
+ serv: increase cache size used for resumption
+
+ That allows sessions with longer parameters to be able
+ to be resumed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 2 11:09:22 2018 +0100
+
+ CONTRIBUTING.md: check the issue closing as part of review [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 2 10:35:11 2018 +0100
+
+ gnutls-cli: no longer print certificate types or compression methods
+
+ We don't support any other compression methods than the null compression,
+ nor any other certificate types.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Jay Foad <jay.foad@gmail.com>
+Date: Sat Jan 27 09:13:17 2018 +0100
+
+ Inline version macros into its users.
+
+ This fixes a problem in _gnutls_version_is_supported() where we want to
+ use preprocessing directives in the loop body. Doing this within a macro
+ argument is undefined behaviour according to the C standard, and not
+ supported by the system compiler on AIX.
+
+ Signed-off-by: Jay Foad <jay.foad@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 26 15:49:53 2018 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 26 15:48:52 2018 +0100
+
+ certtool: deprecated the --certificate-pubkey option
+
+ That option is duplicate since --pubkey-info can provide the same
+ information.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 26 15:44:21 2018 +0100
+
+ certtool: avoid duplicate deinitialization on --certificate-pubkey
+
+ Resolves #368
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 12:25:10 2018 +0100
+
+ dh: document why BER decoding rules are allows
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 12:19:12 2018 +0100
+
+ pubkey: use the strict DER decoder for SubjectPublicKeyInfo
+
+ Although there is no explicit RFC mentioning the SubjectPublicKeyInfo
+ encoding, this structure is a subset of the X.509 certificate's structure
+ and as such it is expected to be in DER form.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 21 11:36:20 2018 +0100
+
+ pk: document need for the generic BER decoder
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 19:26:12 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 19:25:36 2018 +0100
+
+ tests: check whether deletion of a certificate object works
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 19:15:46 2018 +0100
+
+ p11tool: corrected issue preventing the deletion of objects in batch mode
+
+ Previously initialization of PIN callbacks would only happen during listing
+ of objects, which happened only in non-batch mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 19:10:52 2018 +0100
+
+ p11tool: corrected type affecting use of --only-urls
+
+ It would enable batch mode accidentally.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 19 11:42:02 2018 +0100
+
+ tests: pkcs11/tls-neg-pkcs11-key: updated for softhsm with PKCS#11 support
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 22 09:06:25 2018 +0100
+
+ added sub-section on selecting the right return value [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 17:35:54 2018 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 17 08:38:13 2018 +0100
+
+ examples: use gnutls_certificate_set_x509_system_trust
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 12 16:14:23 2018 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 12 13:23:03 2018 +0100
+
+ tests: privkey-verify-broken: addressed uninitialized var use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 10 15:41:50 2018 +0100
+
+ tests: check whether get_mtu() functions relate to the set values
+
+ That is, verify that gnutls_dtls_set_data_mtu() value would be
+ reflected into gnutls_dtls_get_data_mtu(), as well as the
+ gnutls_dtls_set_mtu() to gnutls_dtls_get_mtu().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 10 15:35:36 2018 +0100
+
+ tests: added unit test for _gnutls_record_overhead()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 12 09:01:54 2018 +0100
+
+ DTLS: improved data MTU calculation under CBC ciphersuites
+
+ The data MTU calculation under CBC ciphersuites takes into
+ account that the overhead of these ciphersuites is constant (IV +
+ hash + 1 byte padding), though the capacity varies due to the padding
+ block. That is, on 16-byte padding block, one padding byte is the
+ overhead but the rest 15 bytes are accounted for data MTU.
+
+ That also has the side effect that setting a data MTU using
+ gnutls_dtls_set_data_mtu(), is not definite, and the actual
+ MTU may be larger for these ciphersuites --i.e., the
+ return value of gnutls_dtls_get_data_mtu().
+
+ Resolves #360
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 10 10:58:30 2018 +0100
+
+ fuzz: added reproducer for leak in gnutls_x509_crl_list_import
+
+ That was detected by oss-fuzz in:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4930
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 10 10:56:28 2018 +0100
+
+ gnutls_x509_crt_list_import: eliminated memory leak
+
+ That leak would be triggered if GNUTLS_X509_CRT_LIST_IMPORT_FAIL_IF_EXCEED
+ flag was used and the input data would exceed the maximum limit.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 9 11:31:45 2018 +0100
+
+ libtasn1: updated to latest libtasn1 master branch
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 3 16:41:36 2018 +0100
+
+ gnutls_pkcs12_key_parser_fuzzer.in: added reproducer for oss-fuzz #4890
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 7 09:55:37 2018 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 3 16:27:03 2018 +0100
+
+ doc: updated copyright year for manual
+
+ That eliminates the 'make syntax-check' error.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 30 20:12:36 2017 +0100
+
+ tests: added reproducer for self-signed verification error
+
+ Relates #347
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 30 19:57:08 2017 +0100
+
+ x509/verify: when verifying against a self signed certificate ignore issuer
+
+ That is, ignore issuer when checking the issuer's parameters strength. That
+ resolves the issue of marking self-signed certificates as with insecure
+ parameters during verification.
+
+ Resolves #347
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 20 08:16:29 2017 +0100
+
+ gnutls_pk_self_test: include ECDSA tests on GNUTLS_PK_EC
+
+ Previously when a request for a specific self check on GNUTLS_PK_EC
+ was done, only ECDH tests would be run. This change includes the ECDSA
+ tests as well (GNUTLS_PK_EC and GNUTLS_PK_ECDSA are an alias to each other).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 19 16:40:59 2017 +0100
+
+ tests: hash-large: increase parallelism to allow fast run in CI
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 8 11:14:58 2017 +0100
+
+ doc: reference gnutls_prf_rfc5705 instead of gnutls_prf
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 3 11:34:32 2017 +0100
+
+ tests: utils.h: forbid compilation with NDEBUG
+
+ This allows to rely on the assert() macro being functional on
+ the test suite.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 3 10:49:12 2017 +0100
+
+ tests: p11-kit-load.sh: verify that all modules are loaded after a private key operation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 30 15:08:22 2017 +0100
+
+ tests: enhanced pkcs11/list-tokens
+
+ This not only creates a trust list with the system certificates, but
+ also attempts to verify a certificate, increasing the number of calls
+ to PKCS#11 verification API (and thus ensuring there are no calls
+ which may trigger the load of other modules).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 30 14:31:07 2017 +0100
+
+ pkcs11 verification: always use the GNUTLS_PKCS11_OBJ_FLAG_PRESENT_IN_TRUSTED_MODULE
+
+ That is, make sure that all our calls to PKCS#11 subsystem for verification
+ will only trigger the trust module initialization, and not the generic
+ PKCS#11 initialization.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 30 14:28:46 2017 +0100
+
+ pkcs11: simplify trusted module loading state
+
+ That is always utilize the same flags (GNUTLS_PKCS11_OBJ_FLAG_PRESENT_IN_TRUSTED_MODULE)
+ to determine whether to initialize trusted modules only or
+ proceed with general initialization.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 30 12:52:57 2017 +0100
+
+ _gnutls_pkcs11_check_init: improved transition between states
+
+ The init_level_t for PKCS#11 modules, was incorrectly handled as a
+ linear state transition, causing few cases in the transition to be
+ incorrectly handled. Define precisely the state transitions and
+ enforce them in _gnutls_pkcs11_check_init.
+
+ That addresses a regression introduced by the previous state handling
+ addition, which made impossible to switch from the trusted state to
+ the all modules.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 30 11:44:14 2017 +0100
+
+ tests: corrected destructive/p11-kit-load.sh error checking
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Dec 1 11:13:29 2017 +0100
+
+ gnutls-serv: fix double-free on inactivity timeout
+
+ Previously, gnutls-serv --echo segfaulted when closing client
+ connection after inactivity timeout. Here is the valgrind output:
+
+ ==20246== Invalid free() / delete / delete[] / realloc()
+ ==20246== at 0x4C2FD18: free (vg_replace_malloc.c:530)
+ ==20246== by 0x405310: listener_free (serv.c:154)
+ ==20246== by 0x408B57: tcp_server (serv.c:1568)
+ ==20246== by 0x407DA6: main (serv.c:1231)
+ ==20246== Address 0x6ed4fe0 is 0 bytes inside a block of size 3 free'd
+ ==20246== at 0x4C2FD18: free (vg_replace_malloc.c:530)
+ ==20246== by 0x408A1D: tcp_server (serv.c:1548)
+ ==20246== by 0x407DA6: main (serv.c:1231)
+ ==20246== Block was alloc'd at
+ ==20246== at 0x4C2EB6B: malloc (vg_replace_malloc.c:299)
+ ==20246== by 0x6A64489: strdup (in /usr/lib64/libc-2.25.so)
+ ==20246== by 0x407310: get_response (serv.c:948)
+ ==20246== by 0x408840: tcp_server (serv.c:1492)
+ ==20246== by 0x407DA6: main (serv.c:1231)
+ ==20246==
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 28 15:45:59 2017 +0100
+
+ .dir-locals.el: new file
+
+ This forces Emacs to use the Linux kernel coding style for all C code.
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Nov 28 15:45:54 2017 +0100
+
+ build: remove m4 files pulled in by autopoint
+
+ Having these files in the git repository causes unnecessary changes
+ after "make bootstrap".
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 29 17:16:41 2017 +0100
+
+ gnutls_aead_cipher_init: corrected potential memory leak
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 28 14:28:46 2017 +0100
+
+ doc: provided basic documentation of the FIPS140-2 mode [ci skip]
+
+ Resolves #332
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 09:42:26 2017 +0100
+
+ tests: verify whether group remains the same after resumption
+
+ Resolves #331
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 27 09:31:52 2017 +0100
+
+ _gnutls_set_resumed_parameters: restore the group from resumed parameters
+
+ That allows resumed sessions to have the original group information such as
+ curve used for key exchange or FFDHE parameters.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 08:19:01 2017 +0200
+
+ tests: removed unnecessary assert
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 10 14:23:20 2017 +0200
+
+ tests: delete temporary files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 11:47:22 2017 +0100
+
+ session state: use the right type for send_cert_req variable
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 24 08:17:40 2017 +0100
+
+ tests: client-fastopen: introduce child signal handler and delay prior to starting
+
+ This addresses a hang issue on freebsd builds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 22 17:36:30 2017 +0100
+
+ psktool: allow up to 512-byte keys
+
+ This aligns the psktool --help output with the psktool operation.
+
+ Suggested by Jack Lloyd.
+
+ Resolves #327
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 20:26:43 2017 +0100
+
+ getfuncs-map.pl: added gnutls_srp_8192_group* symbols to ignore list
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 19:24:29 2017 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 19:17:01 2017 +0100
+
+ srptool: --create-conf no longer includes 1024-bit parameters
+
+ In addition it includes the 8192-bit parameters, and
+ the default params used for a new user are the 2k ones.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 13:23:21 2017 +0100
+
+ tests: updated SRP checks
+
+ Test 1024, 1536, 2048, 3072, 4096 and 8192 bit parameters.
+ In addition, verify that parameters not in the SRP spec are
+ rejected by a gnutls client.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 21 13:05:12 2017 +0100
+
+ .gitlab-ci.yml: move destructive tests after trust store tests
+
+ That is, to ensure they are only run after the trust store
+ is complete and that it doesn't affect its output.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 14:43:21 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 14:34:20 2017 +0100
+
+ tests: include the 8192-bit SRP prime into param checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 14:33:33 2017 +0100
+
+ srp: added the 8192-bit prime
+
+ As we now reject any primes not in the SRP spec, we include
+ that parameter to ensure we can handle clients within the
+ spec but with large parameters.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 14:10:02 2017 +0100
+
+ srp: reject any parameters not in the SRP draft
+
+ This implements the SHOULD requirement from RFC5054, i.e., to
+ only accept group parameters that come from a trusted source,
+ such as those listed in Appendix A.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 14:07:12 2017 +0100
+
+ fuzz: srp-client: decreased acceptable prime bits to 1024 [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 9 09:47:10 2017 +0100
+
+ tests: combined key and cert tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 9 09:40:23 2017 +0100
+
+ tests: windows subdir is only included on windows builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 16:32:48 2017 +0100
+
+ tests: dtls subdir was merged into main tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 20 13:49:55 2017 +0100
+
+ fuzz: srp-client: restrict prime bits to 1537 [ci skip]
+
+ That avoids timeouts in the oss-fuzz infrastructure:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3277
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 19 16:39:16 2017 +0100
+
+ doc: corrected typo
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 16 16:57:29 2017 +0100
+
+ doc: better detect acronym keyword on latex output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 16 16:53:46 2017 +0100
+
+ doc: latex: resolve all citation issues
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 16 16:43:21 2017 +0100
+
+ doc: citations translate into references in texinfo
+
+ That makes the citations to be links in the generated html manual.
+
+ Resolves: #321
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 13 11:03:35 2017 +0100
+
+ p11tool: renamed pkcs11_set_pin() to allow static linking
+
+ Resolves #322
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 15 11:47:31 2017 +0100
+
+ cfg.mk: do not include reproducer files into syntax checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 15 10:31:00 2017 +0100
+
+ gnutls_x509_ext_import_proxy: corrected memory leak
+
+ Also added reproducer for the memory leak found.
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3159
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 13:56:56 2017 +0100
+
+ tools: do not access unused variables
+
+ This avoids warnings by static analyzers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 8 10:51:51 2017 +0100
+
+ .gitlab-ci.yml: disabled gcc warnings on CI builds and use dash
+
+ That should decrease the time spent in configure. Based on suggestions
+ by Tim Ruehsen.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 5 20:46:47 2017 +0100
+
+ .gitlab-ci.yml: use configure cache file and ccache
+
+ That reduces the total time spent per build by caching configure
+ checks, and compilation artifacts.
+
+ Also that patch set no longer uploads coverage files as artifacts.
+ These files are not generally useful, and removing that "feature"
+ will reduce CI running time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 4 17:18:23 2017 +0100
+
+ doc: corrected typo [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 3 15:10:03 2017 +0100
+
+ tests: list-tokens: not only list but also verify whether module is operational
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 3 15:03:35 2017 +0100
+
+ pkcs11: refuse to load modules with duplicate information
+
+ That is, when ck_info matches, we soft fail loading the module.
+ That is, because in several cases the pointers got by p11-kit
+ may differ for the same modules.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 3 14:33:24 2017 +0100
+
+ tests: enhanced PKCS#11 loading test
+
+ Test whether implicit initialization in trusted module (e.g.,
+ via verification), would result to proper initialization of additional
+ modules once a PCKS#11 function is called.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 30 13:51:33 2017 +0100
+
+ tests: added PKCS#11 module loading test
+
+ This checks:
+ 1. Whether all modules are loaded from p11-kit when
+ no explicit gnutls_pkcs11_init() is called and
+ pkcs11 calls are accessed.
+ 2. Whether only the trusted modules are loaded from
+ p11-kit and no other PKCS#11 calls than PKCS#11
+ cert validation is performed.
+ 3. Whether the trusted modules are loaded when
+ gnutls_pkcs11_init() is called with manual
+ flag.
+
+ Resolves #315
+ Resolves #316
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 30 11:29:38 2017 +0100
+
+ pkcs11: allow loading trusted modules when pkcs11 was initialized in manual mode
+
+ When a PKCS#11 trust module is used in the system, but gnutls_pkcs11_init()
+ is explicitly called with GNUTLS_PKCS11_FLAG_MANUAL flag, then the PKCS#11
+ trust store was not loaded, and thus prevent any certificate validation.
+
+ This change allows initializing the trust modules only even if generic
+ PKCS#11 support is disabled by the application.
+
+ Relates #316
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 30 09:57:09 2017 +0100
+
+ pkcs11: introduce multiple levels of loading
+
+ That allows to load the PKCS#11 trusted modules (on systems which use them)
+ without loading all the potentially present PKCS#11 modules.
+
+ Relates #315
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 31 09:18:15 2017 +0100
+
+ CONTRIBUTING.md: added a short text on reviewing code [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Roberto Newmon <robertonewmon@fake-box.com>
+Date: Sun Oct 29 08:30:02 2017 +0000
+
+ Fix non-null warning
+
+ Help the compiler understand the control flow in the MATCH_FUNC and
+ INVALID_MATCH_FUNC macros.
+
+ Because we are using macros, the compiler is not able to correlate the
+ replaced values of the macro variables to each other yielding non-null
+ warnings. Introduce a C variable to mimic the macro variable helping
+ the compiler understanding the control flow.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 15:17:22 2017 +0200
+
+ tests: test whether PKCS#11 generation works without login
+
+ Resolves #147
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 15:10:03 2017 +0200
+
+ p11tool: attempt to auto-login when the token requires it
+
+ In operations like generation or writing objects, run as if --login
+ was given if the token is marked to require login.
+
+ Relates #147
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 15:01:53 2017 +0200
+
+ p11tool: print PKCS#11 token flags in --list-tokens
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 14:53:37 2017 +0200
+
+ pkcs11: forward token flags to applications
+
+ That is, gnutls_pkcs11_token_get_flags() will not return the
+ most common/useful PKCS#11 token flags, in addition to trusted and HW
+ flags.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 09:44:37 2017 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 21 02:18:07 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 19 10:14:33 2017 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Thomas Klute <thomas2.klute@uni-dortmund.de>
+Date: Wed Oct 18 19:50:57 2017 +0200
+
+ gnutls_server_name_set: Clarify meaning of the name_length parameter [ci skip]
+
+ Signed-off-by: Thomas Klute <thomas2.klute@uni-dortmund.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 15:57:53 2017 +0200
+
+ doc: mention SHA224 removal in upgrade guide
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 15:55:57 2017 +0200
+
+ bumped version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 10:18:33 2017 +0200
+
+ gnutls-serv: print the right error code on OCSP request setting
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 18 13:42:21 2017 +0200
+
+ ocsptool: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 16 11:41:36 2017 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 27 13:25:02 2017 +0200
+
+ cmp_hsk_types: fixed check for SSLv2 hello
+
+ Previously, if SSLv2 hello support was disabled, the check for
+ the expected TLS message was incorrect.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 7 10:06:09 2017 +0200
+
+ doc: improve documentation on provable private keys
+
+ Resolves #301
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 7 09:44:54 2017 +0200
+
+ doc: enhanced text on PKCS#7 and public keys
+
+ Resolves #302
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 1 12:20:18 2017 +0200
+
+ tests: check whether key IDs with SHA512 are corrected calculated
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 1 12:18:54 2017 +0200
+
+ certtool: allow using SHA512 for key IDs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 1 12:17:26 2017 +0200
+
+ _gnutls_get_key_id: introduce flag GNUTLS_KEYID_USE_SHA512
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 1 12:14:11 2017 +0200
+
+ tests: check fingerprint generation with SHA512
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 1 12:12:25 2017 +0200
+
+ certtool: allow using --fingerprint with sha384 or sha512
+
+ Resolves #295
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Wed Sep 27 19:21:59 2017 +0200
+
+ Modernize gtk-doc support
+
+ Update gtk-doc.make, m4/gtk-doc.m4 and doc/reference/Makefile.am from
+ gtk-doc git head (that is 1.26 +
+ c08cc78562c59082fc83b55b58747177510b7a70).
+ Disable gtkdoc-check.
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Rowan Thorpe <rowan@rowanthorpe.com>
+Date: Wed Sep 27 21:41:43 2017 +0300
+
+ Fix autoreconf invocation to actually run autopoint
+
+ Signed-off-by: Rowan Thorpe <rowan@rowanthorpe.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 25 16:57:31 2017 +0200
+
+ CONTRIBUTING.md: added some text on introducing new APIs [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 24 10:52:08 2017 +0200
+
+ tests: re-purposed client_dsa_key test to match new behavior of the library
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 24 10:47:05 2017 +0200
+
+ tests: update TLS 1.2 tests to account for RSA-PSS client signatures
+
+ On commit de4f55b4dcf4bbe8f788e1f8f5bd59cd596f7d36:
+ "signature: on client side, refuse to negotiate non-enabled signature schemes"
+
+ the behavior of allowing a client to utilize disabled for the session
+ signatures, and thus the negotiated signatures now match the ones
+ in the session's priority string.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 08:37:50 2017 +0200
+
+ signature: on client side, refuse to negotiate non-enabled signature schemes
+
+ That amends/reverts commit 6aa8c390b08a25b18c0799fbd42bd0eec703fae4:
+ "On client side allow signing with the signature algorithm of our cert"
+
+ Previously, when we initially disabled DSA, we allowed client certificates
+ which can do DSA-SHA1 to be utilized to ease migration from these certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 09:53:01 2017 +0200
+
+ _gnutls_epoch_gc: ensure there are no stray epochs after gc
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 09:29:30 2017 +0200
+
+ constate: simplified allocation of epochs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 08:26:22 2017 +0200
+
+ _gnutls_epoch_get(): simplified use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 24 17:42:01 2017 +0200
+
+ gnutls_x509_crt/q_set_spki: always initialize the spki structure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:17:21 2017 +0200
+
+ gnutls-cli: always initialize the inline commands struct
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:13:31 2017 +0200
+
+ gnutls-cli-debug: eliminated memory leaks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:11:27 2017 +0200
+
+ ocsptool: eliminate memory leaks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:09:00 2017 +0200
+
+ certtool: use assert to protect var access
+
+ The code correctly uses the variables, but the assert ensures
+ that static analyzers follow the intended paths too.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:06:53 2017 +0200
+
+ srptool: removed unused variables
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:06:24 2017 +0200
+
+ psktool: remove unused variables
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:05:18 2017 +0200
+
+ gnutls-cli: fix memory leak
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 11:04:21 2017 +0200
+
+ tools: eliminated dead assignments
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 10:59:58 2017 +0200
+
+ ocsptool: check chain size on verification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 19 11:08:19 2017 +0200
+
+ .gitlab-ci.yml: use static analyzer and Werror build in src
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 08:29:17 2017 +0200
+
+ tests: enhanced resumption checks with same and different SNI
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 08:19:21 2017 +0200
+
+ server name: refuse to resume a session which server name doesn't match
+
+ That is, follow the RFC6066 requirement that server:
+ "MUST NOT accept the request to resume the session if the
+ server_name extension contains a different name."
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 23 10:47:15 2017 +0200
+
+ gnutls-cli: eliminate few memory leaks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Thomas Klute <thomas2.klute@uni-dortmund.de>
+Date: Thu Sep 21 11:00:33 2017 +0200
+
+ tests: New test for SNI parsing during cache-based session resumption
+
+ Signed-off-by: Thomas Klute <thomas2.klute@uni-dortmund.de>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Thomas Klute <thomas2.klute@uni-dortmund.de>
+Date: Thu Sep 21 10:45:05 2017 +0200
+
+ Ensure the SNI extension is parsed during cache-based resumption
+
+ This patch changes the parse_type of the SNI extension to
+ GNUTLS_EXT_MANDATORY to ensure it is parsed during every handshake.
+
+ With SNI previously classified as GNUTLS_EXT_APPLICATION, GnuTLS
+ servers ignored the SNI extension when resuming a TLS session from
+ cache, because "application" level extensions are skipped during
+ resumption. As a result, gnutls_server_name_get() always returned
+ GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE when called on the resumed
+ session, breaking virtual server systems.
+
+ According to RFC 6066, Section 3 the SNI extension must be parsed on
+ session resumption if implemented at all:
+
+ "A server that implements this extension MUST NOT accept the request
+ to resume the session if the server_name extension contains a
+ different name."
+
+ This change allows applications using GnuTLS to match SNI data on
+ resumed sessions.
+
+ Signed-off-by: Thomas Klute <thomas2.klute@uni-dortmund.de>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 18 17:06:15 2017 +0300
+
+ tests: explicitly check for gnutls.pc in pkgconfig.sh
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 18 13:33:53 2017 +0300
+
+ test: use proper library name in pkgconfig.sh error message
+
+ If there is a -R flag in p11-kit-1.pc file, pkgconfig.sh test will still
+ reference libidn2.pc, rather than proper source of the message. Also
+ move the test for library flags before updating PKG_CONFIG_PATH.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Sep 18 13:32:40 2017 +0300
+
+ tests: use libidn2 in pkgconfig.sh
+
+ Since abe6a12b9766219163f99d7807a0b07fbe5f590c GnuTLS does not support
+ libidn1. Switch pkgconfig.sh test to use libidn2.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Sep 19 20:36:22 2017 +0200
+
+ parse-datetime: Fix buffer overflow
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 18 15:35:32 2017 +0200
+
+ tlsfuzzer: document the reason of failure of few fragmentation tests
+
+ It seems that gnutls does not accept records carrying handshake messages
+ that contain less bytes than necessary to recover the handshake header.
+ The TLS protocol allows that option, and other implementations seem to
+ accept that fragmentation.
+
+ Relates #272
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 16 18:21:36 2017 +0200
+
+ parse_handshake_header: removed duplicate check
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 16 14:03:54 2017 +0200
+
+ ecdh: return more appropriate error code on empty packet
+
+ This makes tlsfuzzer's test-x25519 detect the right error
+ code on empty message. Previously this issue was masked by our
+ refusal to accept 1-byte sized fragments.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 16:34:02 2017 +0200
+
+ parse_handshake_header: allow 1-byte sized fragments
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 15 16:21:02 2017 +0200
+
+ tests: added reproducer for DTLS infinite loop
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Sep 18 20:55:25 2017 +0200
+
+ pkcs11/get_key_algo_type(): Always initialize bits variable
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Sep 18 20:53:23 2017 +0200
+
+ tests/base64-raw: Remove unused variable
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Sep 18 15:54:19 2017 +0200
+
+ gnutls.h: Remove redundant function declarations
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 14 11:56:27 2017 +0200
+
+ x509: removed debugging code [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 13:58:58 2017 +0200
+
+ tests: modified the MD5 signature algorithm negotiation tests
+
+ Since GnuTLS can no longer negotiate MD5, we utilize a byte stream
+ of a connection which advertises MD5, and we make sure we detect the
+ right error code for the rejection of MD5 signature.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 08:42:10 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 08:36:01 2017 +0200
+
+ tlsfuzzer: no longer include tests involving SHA224 signatures
+
+ We no longer support them.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 15:04:32 2017 +0200
+
+ algorithms/sign: removed TLS identifiers for legacy algorithms
+
+ That is, for the MD5-using algorithms, as well as for the DSA2
+ signature algorithms that were never really used with TLS 1.2.
+
+ Kept DSA-SHA1 in order to be used by TLS 1.2 and legacy applications.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 15:02:47 2017 +0200
+
+ algorithms/sign: legacy signature algorithms were moved toward the end of the list
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 14:58:17 2017 +0200
+
+ algorithms/sign: no longer enable SHA224 hash in signatures
+
+ TLS 1.3 requires that SHA224 MUST NOT be used, and given the
+ fact that SHA224 was never widespread used in TLS 1.2, there
+ is no reason to keep these algorithms at all.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 8 16:19:38 2017 +0200
+
+ tlsfuzzer: added large client hello tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 8 15:16:55 2017 +0200
+
+ win32: removed no longer used subdir
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 8 14:01:09 2017 +0200
+
+ .gitlab-ci.yml: added warning cppcheck checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 16:54:24 2017 +0200
+
+ .gitlab-ci.yml: removed initialization step
+
+ That is, combine syntax-check with the static analyzers run. That
+ provides more parallelism per build and reduces the overall time
+ spent on a successful run.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 16:20:01 2017 +0200
+
+ doc: added README on FreeBSD CI setup
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 16:21:44 2017 +0200
+
+ .gitlab-ci.yml: added FreeBSD build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 17:05:57 2017 +0200
+
+ tests: ip-utils: added include for FreeBSD compilation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 14:12:20 2017 +0200
+
+ .gitlab-ci.yml: enable more cppcheck tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 8 12:15:47 2017 +0200
+
+ tests: updated tlsfuzzer to reduce rsa-pss failures
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 15:51:57 2017 +0200
+
+ crq: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:31:30 2017 +0200
+
+ tests: added unit test for gnutls_x509_crq_sign
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:11:06 2017 +0200
+
+ tests: added verification checks into crl_apis
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:10:20 2017 +0200
+
+ gnutls_x509_crl_verify: check next update field for presence
+
+ If not present do not attempt to utilize its value.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:33:24 2017 +0200
+
+ tests: added verification check into crt_apis
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:30:13 2017 +0200
+
+ tests: added unit test for gnutls_x509_crt_sign
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:24:41 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:23:28 2017 +0200
+
+ gnutls_x509_crq_sign: undeprecate
+
+ After the updates of the function semantics, it is no longer
+ needed to deprecate it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:13:54 2017 +0200
+
+ gnutls_x509_crl_sign: undeprecate
+
+ After the updates of the function semantics, it is no longer
+ needed to deprecate it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 09:21:16 2017 +0200
+
+ gnutls_x509_crq_sign: no longer sign with SHA1
+
+ Modify the behavior of the functions to sign with an appropriate
+ to the public key hash algorithm. That although it modifies the
+ semantics of the functions, it allows them to be useful even after
+ SHA1 is considered insecure.
+
+ In addition to that, the functions which accept a hash algorithm, will
+ accept a null hash, which instructs the function to select a
+ reasonable choice.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:21:47 2017 +0200
+
+ gnutls_x509_*_sign: no longer sign with SHA1
+
+ Modify the behavior of the functions to sign with an appropriate
+ to the public key hash algorithm. That although it modifies the
+ semantics of the functions, it allows them to be useful even after
+ SHA1 is considered insecure.
+
+ In addition to that, the functions which accept a hash algorithm, will
+ accept a null hash, which instructs the function to select a
+ reasonable choice.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:12:05 2017 +0200
+
+ doc: document the change of gnutls_x509_crt_sign
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 8 08:31:42 2017 +0200
+
+ tests: tolerate leaks in opensc-pkcs11 when present
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 7 08:08:12 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 6 14:51:59 2017 +0200
+
+ tests: added reproducer for safe renegotiation failure with openssl
+
+ Relates #259
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 6 15:11:00 2017 +0200
+
+ handshake: check SCSVs prior to resuming a session
+
+ This ensures that extensions which are also available as SCSVs
+ are parsed prior to resuming a session. This resolves an issue
+ with openssl sending SCSV instead of an extension for the safe
+ renegotiation.
+
+ Relates #259
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Thomas Klausner <wiz@NetBSD.org>
+Date: Wed Sep 6 19:16:30 2017 +0200
+
+ Use $(LIBDL) instead of hardcoding -ldl.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 6 14:34:20 2017 +0200
+
+ cmocka: require 1.0.1
+
+ This prevents failures in test suite due to insufficient cmocka
+ library version.
+
+ Resolves #268
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 6 09:46:05 2017 +0200
+
+ tlslite-ng: updated to latest version
+
+ This addresses issues with RSA-PSS signing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Avinash Sonawane <rootkea@gmail.com>
+Date: Thu Aug 31 18:05:04 2017 +0530
+
+ cli-debug-args.def: Fix typo
+
+ Signed-off-by: Avinash Sonawane <rootkea@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 29 15:38:49 2017 +0200
+
+ latex: handle the deprecated function mark [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 29 13:56:58 2017 +0200
+
+ .gitlab-ci.yml: give more specific name to windows job artifacts [ci skip]
+
+ This allows a more descriptive name to any downloaded artifacts.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 28 15:16:58 2017 +0200
+
+ tools: removed re-using PIN message when in non-verbose mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 28 12:57:38 2017 +0200
+
+ p11tool: print public or private key algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 28 14:20:36 2017 +0200
+
+ gnutls_pkcs11_privkey_generate3: doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 26 17:27:09 2017 +0200
+
+ tests: check whether generated private keys are marked private
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 26 17:16:26 2017 +0200
+
+ tests: added unit test of p11tool with --set-pin
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 26 17:02:28 2017 +0200
+
+ tests: check whether generated or copied keys are marked as sensitive
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 15:58:14 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 15:56:49 2017 +0200
+
+ p11tool: allow obtaining PIN from command line on operations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 14:49:33 2017 +0200
+
+ certtool: eliminate global use of default_dig
+
+ Use instead the cinfo->hash field which is already used
+ by p11tool.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 12:01:37 2017 +0200
+
+ tests: krb5-test: disable valgrind mem leak checks for negative checks
+
+ Resolves #192
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 11:47:28 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 11:41:47 2017 +0200
+
+ tests: check whether p11tool signing with RSA-PSS works
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 10:53:51 2017 +0200
+
+ p11tool: allow signing with RSA-PSS and specifying an explicit hash
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 10:41:27 2017 +0200
+
+ sign_params_to_flags: moved to certtool-common.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 10:33:27 2017 +0200
+
+ certtool: hash_to_id moved to certtool-common.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Aug 26 17:49:28 2017 +0200
+
+ Fix some typos [ci skip]
+
+ occurence -> occurrence
+ sucessful -> successful
+
+ Signed-off-by: Andreas Metzler <ametzler@bebt.de>
+
+Author: Tom Vrancken <dev@tomvrancken.nl>
+Date: Fri Aug 25 19:54:58 2017 +0200
+
+ Fixed segmentation faults caused by accessing NULL pointers during mutex operations. This bug was triggered while setting priorities.
+
+ Signed-off-by: Tom Vrancken <email@tomvrancken.nl>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 25 16:15:24 2017 +0200
+
+ p11tool: explicitly mark generated keys as sensitive
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sat Aug 26 00:16:03 2017 +0300
+
+ tests: windows: warning: function declaration isn't a prototype
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Aug 25 23:45:44 2017 +0300
+
+ tests: warning: implicit declaration of function
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 24 17:03:17 2017 +0200
+
+ m4: updated ax_code_coverage.m4 [ci skip]
+
+ This version fixes a bug which prevented including the branch coverage
+ into output.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 21 15:19:25 2017 +0200
+
+ fuzzer: Enhance code coverage of gnutls_base64_encoder_fuzzer
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 21 15:16:55 2017 +0200
+
+ fuzzer: Add script 'view-coverage'
+
+ This helper script is for viewing the code coverage of
+ single (or combined) fuzzers running with all his corpora.
+
+ It helps optimizing the code coverage by hand-crafting corpora
+ and/or dictionaries.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 21 14:22:58 2017 +0200
+
+ fuzzer: Change CFLAGS -O0 to -O1 in fuzz/README.md
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 21 14:20:54 2017 +0200
+
+ fuzzer: Update corpora from oss-fuzz
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 24 15:29:19 2017 +0200
+
+ tlslite: updated to latest version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 23 10:20:05 2017 +0200
+
+ certtool: do not ask about RSA encryption in non-RSA keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 22 16:17:54 2017 +0200
+
+ fuzz: work-around libtool file name
+
+ fuzzers utilize argv[0] to discover the name the reproducers are stored
+ in. However libtool creates a script which later runs the executable.
+ Try to detect that situation and use the right paths.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 22 08:48:03 2017 +0200
+
+ dh params: document DH param setting functions as deprecated
+
+ They are no longer useful after the RFC7919 DH parameter negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 10:03:54 2017 +0200
+
+ tests: introduced unit test of gnutls_memset()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 22 07:27:03 2017 +0200
+
+ fuzz: removed -static ldflag completely
+
+ It is not necessary for building the fuzzer, and was causing
+ issues in MacOSX systems.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 21 09:47:59 2017 +0200
+
+ .gitlab-ci.yml: use the same flags in the tags and non-tags windows builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 21 09:46:07 2017 +0200
+
+ tests: p11-kit-trust is not compiled in windows
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 21 08:35:07 2017 +0200
+
+ fuzz: temporarily disable -static build of fuzz/ in MacOSX
+
+ This allows running the MacOSX CI tests on travis.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 21 08:26:57 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 21 07:56:58 2017 +0200
+
+ tests: verify the output size of gnutls_x509_privkey_export
+
+ That is, make sure that gnutls_x509_privkey_export() and
+ gnutls_x509_privkey_export2() agrees with the strlen()
+ value on the data.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 20:46:31 2017 +0200
+
+ .travis.yml: print failed log files in fuzz after failure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 19:43:52 2017 +0200
+
+ hooks.m4: reduce the gap between minor soversion of 3.5.x and 3.6.0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 09:24:19 2017 +0200
+
+ tests: make mini-record more friendly for OSes with limited buffers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 09:18:05 2017 +0200
+
+ pull/push backends: ECONNRESET is translated to GNUTLS_E_PREMATURE_TERMINATION
+
+ This returns a more reasonable error code on platforms where
+ this errno is set.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 09:05:02 2017 +0200
+
+ tests: gnutls_x509_privkey_import: address issue on error path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 20 00:18:44 2017 +0200
+
+ sed: use it in a portable way in makefiles
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 19 23:33:46 2017 +0200
+
+ configure: disable hardware acceleration on aarch64/ilp32 mode
+
+ Our included assembly code for aarch64 is not suitable for that
+ data mode.
+
+ Resolves #252
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 19 13:39:28 2017 +0200
+
+ create_tls_random: avoid warning in fuzzying mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 19 08:58:37 2017 +0200
+
+ configure.ac: removed conditional FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
+
+ Instead rely only on the definition, to make fuzzying mode to be
+ enabled even if --enable-fuzzer-target is not specified, but defined
+ b the compiler.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 19 08:56:28 2017 +0200
+
+ rnd-fuzzer: use ifdef instead of conditional compilation
+
+ This allows compiling in fuzzying mode even when --enable-fuzzer-target
+ is not specified on configure, but the definition is present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 18 21:39:13 2017 +0200
+
+ fuzzer: Update base64 fuzzers + corpora
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 18 21:32:28 2017 +0200
+
+ fuzzer: Fix include path in run-clang.sh [skip ci]
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 15:43:43 2017 +0200
+
+ gnutls_x509_privkey_export: use _gnutls_copy_string on PEM data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 13:05:34 2017 +0200
+
+ Corrected argument names of functions to correspond to declaration
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 12:57:07 2017 +0200
+
+ lib: use casts and be explicit on intentional enumeration use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 13:56:04 2017 +0200
+
+ gnutls-cli-debug: do not run non-FIPS cipher tests when in FIPS mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 12:52:20 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 12:47:12 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:51:53 2017 +0200
+
+ tests: added basic test for the operation of gnutls-cli-debug
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:44:55 2017 +0200
+
+ tests: verify the presence of GNUTLS_SFLAGS_RFC7919 flag in server and client mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:34:46 2017 +0200
+
+ gnutls-cli-debug: check whether RFC7919 is supported
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:31:52 2017 +0200
+
+ gnutls_session_get_flags: introduced GNUTLS_SFLAGS_RFC7919
+
+ This allows checking whether the DHE parameters used were negotiated
+ using RFC7919.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:22:11 2017 +0200
+
+ gnutls_auth_*: check cs parameter for validity prior to use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:16:50 2017 +0200
+
+ certtool: simplified certificate PEM printing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 11:14:16 2017 +0200
+
+ gnutls-cli: fixed bounds check on benchmark-tls
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 10:44:21 2017 +0200
+
+ lib: removed legacy debugging code
+
+ That code was code from the initial versions of gnutls. It was neither
+ used nor updated for long time.
+
+ Relates #248
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 10:35:03 2017 +0200
+
+ fuzz: added missing files into dist [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 10:06:36 2017 +0200
+
+ tests: added missing files in dist [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 10:05:36 2017 +0200
+
+ tests: do not suppress stderr errors on servers startup
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 17:41:34 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 08:39:50 2017 +0200
+
+ abi-check: added check for 3.6.0 ABI compatibility
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 18 08:38:48 2017 +0200
+
+ gnutls_x509_crl_get_issuer_dn: removed unnecessary const
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 11:27:24 2017 +0200
+
+ certtool: fixed documentation of sign-params
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 10:50:56 2017 +0200
+
+ README.md: mention lockfile-progs dependency
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 10:02:47 2017 +0200
+
+ tests: tls-neg-ext4-key: explicitly restrict to TLS 1.2, 1.1 and 1.0
+
+ This allows testing all signature types used in the protocol.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 09:59:53 2017 +0200
+
+ sign APIs: introduce RSA-RAW signing algorithm
+
+ This ensures that there is a signing algorithm for all the operations
+ we support. Previously, we required GNUTLS_SIGN_UNKNOWN to be acceptable
+ by signing functions to accomodate for raw RSA operations. Now we make
+ that explicit and in the process clean-up the API.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 17 10:09:13 2017 +0200
+
+ removed devel/fuzz; functionality moved to fuzz/ [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 11 21:42:02 2017 +0200
+
+ fuzzer: Add 'make -C fuzz coverage' [ci skip]
+
+ This reports how much code is covered by fuzzing.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 14 08:46:03 2017 +0200
+
+ _gnutls_recv_server_certificate_status: use the same type in subtracted values
+
+ This ensures that there are no issues with subtracting those values.
+ Note that the second is read from an uint24_t and thus it is always
+ positive regardless its type.
+
+ Resolves #245
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 14 08:42:51 2017 +0200
+
+ _gnutls_proc_srp_client_kx: use same type in subtracted values
+
+ This ensures that there are no issues with subtracting those values.
+ Note that the second is read from an uint16_t and thus it is always
+ positive regardless its type.
+
+ Resolves #244
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Aug 15 12:34:25 2017 +0200
+
+ fuzzer: Move regression corpora from tests/ to fuzz/
+
+ See fuzz/README.md for the corresponding paths.
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 14 12:34:00 2017 +0200
+
+ fuzzer: Suppress leak in libgmp <= 6.1.2
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Fri Aug 11 18:31:35 2017 +0200
+
+ fuzzer: Suppress unsigned integer overflow in rnd-fuzzer.c
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Aug 5 20:49:19 2017 +0200
+
+ fuzzer: Initial check in for improved fuzzing
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 08:24:59 2017 +0200
+
+ fuzzer: added a fuzzer target
+
+ This allows to compile the library with flags which will add predictable
+ random generation and eliminate some crypto checks, in order for the
+ library to be used for testing (fuzzying).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 16:40:41 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 16:39:36 2017 +0200
+
+ gnutls_x509_privkey_export: made a wrapper over gnutls_x509_privkey_export2()
+
+ In addition, improved function description.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 13:23:39 2017 +0200
+
+ gnutls-http-serv: use RSA-PSS key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 13:11:03 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 12:58:02 2017 +0200
+
+ tests: use certtool to check RSA-PSS to RSA conversion
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 12:07:01 2017 +0200
+
+ certtool: introduced --to-rsa option
+
+ This allows converting an RSA-PSS key to raw RSA.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 11 16:37:21 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 11 12:30:17 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 15:51:34 2017 +0200
+
+ tests: added unit tests for gnutls_privkey_import_ext4
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 15:00:46 2017 +0200
+
+ gnutls_privkey_import_ext4: introduced to allow signing with RSA-PSS or Ed25519 keys
+
+ That function allows a signing callback which passes the signature
+ algorithm, providing all the information to callback for signing.
+ It also introduces GNUTLS_PRIVKEY_INFO_HAVE_SIGN_ALGO flag which
+ allows the library to query the private key of the supported
+ signature algorithms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 10:47:11 2017 +0200
+
+ reduce common asserts to assist in debugging the library
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 10:29:42 2017 +0200
+
+ doc: algorithms.texi: include list of groups but skip compression methods
+
+ Compression methods are no longer relevant or supported, and groups
+ replace the elliptic curves.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 15 10:27:19 2017 +0200
+
+ doc: improved elliptic curve and group documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 14 19:02:45 2017 +0200
+
+ doc: mention the AES-DRBG random generator [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 11 12:40:14 2017 +0200
+
+ tests: improved detection of 64-bit systems
+
+ We now use the ${ac_cv_sizeof_unsigned_long_int} variable which
+ gives the numbers used in the host system, not the build one.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 10 10:51:26 2017 +0200
+
+ tests: updated for new x86 host
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 10 09:37:07 2017 +0200
+
+ .gitlab-ci.yml: replaced the f23 x86 build with a f26 x86 build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 11 11:09:39 2017 +0200
+
+ fuzz: explicitly initialize and deinitialize the library [ci skip]
+
+ This enables the fuzzers to run even when statically linked.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 13:08:31 2017 +0200
+
+ handshake: eliminated unnecessary function wrappers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 10:35:13 2017 +0200
+
+ gnutls_int.h: reduce memory occupied by ext_data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 10:25:10 2017 +0200
+
+ gnutls_int.h: reduced the maximum number of epoch states we keep
+
+ There was no need to keep 16 epochs, as we typically we have only
+ one or two active.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 10:14:11 2017 +0200
+
+ gnutls_int.h: removed unused variable from state
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 11:30:51 2017 +0200
+
+ extensions: simplified requirements from send callback
+
+ The callback no longer needs to return the number of sent data;
+ they are now calculated by the caller.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 11:42:25 2017 +0200
+
+ ext/ecc: renamed Supported curves extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 11:01:08 2017 +0200
+
+ gnutls-serv: --require-client-cert no longer implies --verify-client-cert
+
+ That is, it is now possible to require a client certificate without
+ verifying it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 10 10:35:22 2017 +0200
+
+ CONTRIBUTING.md: corrected typo [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 16:59:15 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 10:30:04 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 09:40:03 2017 +0200
+
+ CONTRIBUTING.md: added section on symbol versioning
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 11:06:18 2017 +0200
+
+ libgnutls.map: separated symbols introduced in 3.6.0
+
+ This separation assists tools like rpm which can detect
+ the right version of the library to use, by using the
+ symbol version.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 10:21:06 2017 +0200
+
+ tests: added reproducer for private key import leak
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=561
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 13:18:33 2017 +0200
+
+ rnd: use time_t for prng_reseed_time
+
+ This ensures that all time comparisons are done
+ under the same type.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 10:20:36 2017 +0200
+
+ gnutls_x509_privkey_import_pkcs8: fixed memory leak on incorrect key import
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 09:58:17 2017 +0200
+
+ tests: added reproducer for memory leak in SRP server
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2859
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 09:57:49 2017 +0200
+
+ gnutls_srp_verifier: corrected memory leak
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 09:52:37 2017 +0200
+
+ tests: added reproducer for memory leak in RSA-PSK
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2863
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 09:52:21 2017 +0200
+
+ rsa-psk: corrected memory leak on invalid decrypt
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 10:44:56 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 9 10:41:58 2017 +0200
+
+ p11tool: --generate-xxx options were replaced by generate-privkey
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 7 23:04:36 2017 +0200
+
+ Fix memleaks in gnutls_x509_trust_list_add_crls()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Aug 7 23:04:05 2017 +0200
+
+ Fix memleak in gnutls_x509_crl_list_import()
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 15:03:53 2017 +0200
+
+ publickey: fixed incorrect assignment
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 15:03:11 2017 +0200
+
+ mac: simplified iteration functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 14:59:56 2017 +0200
+
+ corrected input to gnutls_sign_supports_pk_algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 14:59:44 2017 +0200
+
+ extensions: corrected flag check
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 15:50:44 2017 +0200
+
+ tests: updated for new rsa-pss key in doc/credentials
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 12:51:58 2017 +0200
+
+ cert selection: prioritize RSA-PSS certs over RSA
+
+ RSA and RSA-PSS can both be used for RSA-PSS operations, and
+ as such without prioritizing RSA-PSS certificates it is unknown
+ which certificate will be used for an RSA-PSS operation. The
+ reason we want to have only RSA-PSS keys used for RSA-PSS operations
+ is to cover the use case where a server uses a legacy RSA certificate
+ for clients that don't support RSA-PSS and an RSA-PSS certificate
+ for the rest, thus separating the keys used for these client
+ groups. That separation ensures that any issue on PKCS#1 1.5
+ (legacy RSA), would not affect sessions which use RSA-PSS.
+
+ Resolves #243
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 11:35:26 2017 +0200
+
+ gnutls_certificate_credentials_t: combine privkey into cert_st structure
+
+ This reduces the number of applications and allows for easier
+ use of the structure information, as they are now self-contained
+ for most uses.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 10:56:17 2017 +0200
+
+ tests: verify whether the RSA-PSS key is preferred on RSA-PSS sigs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 8 09:27:57 2017 +0200
+
+ certtool: eliminated unused variable
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 7 16:32:17 2017 +0200
+
+ tests: added negative tests in provable-privkey
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 7 16:23:29 2017 +0200
+
+ gnutls_pk_params_st: separate flags/qbits and curve
+
+ Previously we were using the field flags to store the
+ size of q in case of GNUTLS_PK_DH, some key generation flags
+ in case of GNUTLS_PK_RSA, and the curve in case of elliptic
+ curve key. Separate this into multiple fields to reduce
+ confusion on the field.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 7 14:55:38 2017 +0200
+
+ tests: check whether validation parameters are lost on key re-import
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 20:08:31 2017 +0200
+
+ certtool: improved documentation on --provable option
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 19:52:40 2017 +0200
+
+ certtool: create mapping between --load-x and --info options
+
+ That allows using:
+ certtool --certificate-info --load-certificate FILE
+ and
+ certtool --certificate-info --infile FILE
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 19:35:53 2017 +0200
+
+ certtool: removed definitions of non-existing functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 17:08:16 2017 +0200
+
+ tests: updated for the new provable private key format
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 10:17:46 2017 +0200
+
+ gnutls_x509_privkey_verify_seed: improved error on missing validation parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 16:17:45 2017 +0200
+
+ certtool: silence warnings related to --pkcs8
+
+ There is no reason to bug the user with such details by default.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 15:18:34 2017 +0200
+
+ certtool: better print provable key validation parameters
+
+ That is, include hash in the printable set, and keep spaces
+ from next fields.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 15:11:12 2017 +0200
+
+ certtool: provable private keys are always exported in PKCS#8 form
+
+ That allows the provable parameters to be included.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 14:43:04 2017 +0200
+
+ x509: no longer emit the previous custom format for provable parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 14:30:06 2017 +0200
+
+ x509: store and read provable seed in PKCS#8 form of key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 10:28:07 2017 +0200
+
+ Added information on OID registry
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 14:23:31 2017 +0200
+
+ pkix.asn: removed unused DomainParameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 11:29:26 2017 +0200
+
+ x509: separated PKIX1 attributes parsing code for cert request handling
+
+ This allows other code to utilize it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 7 09:36:20 2017 +0200
+
+ _gnutls_fbase64_decode will always return non-zero
+
+ That is, document that fact and update its callers to remove
+ checks for zero.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 6 17:23:52 2017 +0200
+
+ _gnutls_base64_decode: reject all zero-length string encodings on decoding
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 6 11:34:39 2017 +0200
+
+ wrap_nettle_pk_fixup: added sanity check in RSA-PSS param checking
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 6 11:34:10 2017 +0200
+
+ _decode_pkcs8_rsa_key: signal error in RSA privkey decoding
+
+ Addresses oss-fuzz issue:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2865
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 6 11:28:15 2017 +0200
+
+ tests: added reproducer for private key crash
+
+ Found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2865
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 6 10:17:29 2017 +0200
+
+ tests: added unit test of gnutls_x509_crt_list_import
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 5 09:35:14 2017 +0200
+
+ tests: added reproducer applications for psk and srp fuzzers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 19:47:00 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 02:57:03 2017 +0200
+
+ gnutls_server_fuzzer: added ed25519 key/cert
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 09:22:51 2017 +0200
+
+ removed references for "new" semantics of PEM base64 encode and decode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 09:19:22 2017 +0200
+
+ base64: reverted the raw semantics from the PEM encoding/decoding functions
+
+ Keeping the complex semantics with NULL headers would most likely cause
+ issues in the future.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 09:15:20 2017 +0200
+
+ base64: test the new base64 encoding and decoding functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 09:13:35 2017 +0200
+
+ base64: uniformly use GNUTLS_E_BASE64_DECODING_ERROR for decoding errors
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 09:08:24 2017 +0200
+
+ base64: introduced new functions for base64 encoding
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 19:05:23 2017 +0200
+
+ tests: gnutls_x509_privkey_import: enhanced to test DER key import
+
+ It seems that this function was not tested for multiple cases of
+ private keys in DER mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 03:43:42 2017 +0200
+
+ gnutls_x509_privkey_import: allow importing ed25519 PKCS#8 keys in DER form
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 14:00:27 2017 +0200
+
+ sign/digest: separate "brokenness" of signatures and hash algorithms
+
+ That is, allow digital signatures to be marked as broken irrespective
+ of their used hash, and restrict hash brokenness to preimage resistance.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 13:40:21 2017 +0200
+
+ sign: use C99 syntax for signature algorithm's table
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 13:22:51 2017 +0200
+
+ .gitlab-ci.yml: enable multiple undefined sub-sanitizers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 16:40:29 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 13:51:56 2017 +0200
+
+ p11tool: auto-generate the list of PKCS#11 mechanisms from p11-kit
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 12:11:06 2017 +0200
+
+ tests: added unit test for gnutls_x509_privkey_import
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 11:52:28 2017 +0200
+
+ tests: added TLS negotiation with various keys under PKCS#11
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 11:48:40 2017 +0200
+
+ x509_privkey: handle keys which can only have PKCS#8 form transparently
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 11:00:03 2017 +0200
+
+ tests: updated for errors returned due to early signature selection
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 10:30:25 2017 +0200
+
+ tests: added check for the negotiation of ext keys
+
+ That is, check whether we can negotiate TLS with ext abstract
+ key types, and whether the algorithms which cannot be used
+ with that key type, gracefully fail.
+
+ Relates #234
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 10:22:29 2017 +0200
+
+ privkey: reject signing with ext keys and GNUTLS_PK_RSA_PSS or GNUTLS_PK_EDDSA_ED25519
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 10:09:54 2017 +0200
+
+ _gnutls_check_key_cert_match: use the new API for signing
+
+ This ensures that the same signature algorithm is used for
+ signing and verification.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 10:02:59 2017 +0200
+
+ privkey: return less specific but more appropriate error on invalid pks for ext keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 09:27:03 2017 +0200
+
+ prior to negotiating a signature check compatibility with private key
+
+ That is, check if the private key can support the public key operation
+ needed for the signature. That in particular includes, excluding the
+ Ed25519 and RSA-PSS from being used with the 'EXT' keys as the
+ current API cannot handle them, and RSA-PSS from being used by PKCS#11
+ RSA keys which do not provide the CKM_RSA_PKCS_PSS mechanism.
+
+ Relates #234
+ Resolves #209
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 09:21:59 2017 +0200
+
+ pkcs11: mark RSA PKCS#11 key which can do RSA-PSS
+
+ Also refuse to sign with RSA-PSS if the mechanism is not supported.
+
+ Relates #208
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 11:55:52 2017 +0200
+
+ handshake: select a signature algorithm early
+
+ That is, select the signature algorithm at the point the certificate and
+ ciphersuites are decided. Also ensure that a compatible signature algorithm
+ with the ciphersuite and the key is selected.
+
+ That prevents situations where a ciphersuite and a certificate are
+ negotiated, but later on the handshake we figure that there are no
+ common signature algorithms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 08:46:18 2017 +0200
+
+ tests: added basic unit test of gnutls_pkcs11_token_check_mechanism
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 18:07:54 2017 +0200
+
+ gnutls_pkcs11_token_check_mechanism: introduced function to check token for a particular mechanism
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 10:45:20 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 10:21:06 2017 +0200
+
+ x509/output: print error on invalid public key parameters on certificate
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 10:05:29 2017 +0200
+
+ gnutls_pk_get_oid: return early on unknown algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:48:42 2017 +0200
+
+ tests: check whether the gnutls_x509_*_set_spki will reject invalid values
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:34:23 2017 +0200
+
+ tests: updated for gnutls_x509_spki_get_rsa_pss_params
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:29:12 2017 +0200
+
+ tests: added unit test of generation of legal and illegal rsa-pss parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:25:31 2017 +0200
+
+ spki: combined all exported functions to a single set and get
+
+ This simplifies setting parameters for a particular key type,
+ as well as getting them. The advantage is that they are set
+ atomically, preventing an inadverterly half-filled structure.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:13:15 2017 +0200
+
+ certtool: set RSA-PSS parameters using GNUTLS_KEYGEN_SPKI kdata type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 4 09:06:32 2017 +0200
+
+ introduced error code GNUTLS_E_PK_INVALID_PUBKEY_PARAMS
+
+ This is being use to indicate errors in the public key parameters
+ such as the RSA-PSS salt size or digest algorithm.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 16:46:32 2017 +0200
+
+ gnutls_x509_privkey_generate*: allow specifying the SPKI parameters for key generation
+
+ This in turn removes the need for reading the flag GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE
+ on the key generation process. The flag is now only used during key signing
+ which is also its documented purpose.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 16:29:18 2017 +0200
+
+ gnutls_x509_privkey_set_spki: check validity of parameters set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 16:21:26 2017 +0200
+
+ gnutls_x509_cr*_set_spki: check for validity of parameters set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 16:16:49 2017 +0200
+
+ _gnutls_x509_check_pubkey_params: removed unnecessary parameter
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 16:06:06 2017 +0200
+
+ tests: added check for import of RSA-PSS key with invalid salt
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 15:37:18 2017 +0200
+
+ gnutls_pubkey_import_x509: propagate errors from gnutls_x509_crt_get_pk_algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 15:16:08 2017 +0200
+
+ _rsa_pss_verify_digest: verify the validity of the salt_size length on verification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 15:08:43 2017 +0200
+
+ gnutls_x509_privkey_import: immediately exit on GNUTLS_E_PK_INVALID_PRIVKEY
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 15:00:00 2017 +0200
+
+ wrap_nettle_pk_fixup: check RSA PSS parameters for validity on import
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 11:03:44 2017 +0200
+
+ gnutls_x509_*_set_spki: removed arbitrary restrictions to setting parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 28 08:20:16 2017 +0200
+
+ tests: added unit test for the SPKI abstract functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 11:24:40 2017 +0200
+
+ tests: chainverify: included negative and positive tests with RSA-PSS signed chains
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 15:03:00 2017 +0200
+
+ pct_test: use local SPKI structure to override parameters if not set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 08:44:05 2017 +0200
+
+ fixup_spki_params: use GNUTLS_E_CONSTRAINT_ERROR for RSA-PSS violations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 08:28:54 2017 +0200
+
+ _gnutls_x509_read_pkalgo_params: initialize params structure
+
+ That is the primary call on these parameters, thus it should
+ initialize the structure with something reasonable. That is
+ similar to behavior of _gnutls_x509_read_rsa_pss_params.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 08:14:37 2017 +0200
+
+ RSA-PSS parameter checking was moved to lower level functions
+
+ That way all PKI callers get protected by the checks.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 07:55:24 2017 +0200
+
+ signature security level check were moved to lower level functions
+
+ That way all callers (including PKI functions) get protected by
+ the available checks.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 07:19:36 2017 +0200
+
+ _wrap_nettle_pk_encrypt: return GNUTLS_E_INVALID_REQUEST on unsupported algorithms
+
+ That is a more specific error code than internal error.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 07:10:22 2017 +0200
+
+ certtool: print signature algorithm in cert verification output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 17:51:00 2017 +0200
+
+ verify_crt: translate GNUTLS_E_CONSTRAINT_ERROR to verification status flag
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 17:50:33 2017 +0200
+
+ x509/sign: in debugging mode print the signature algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 17:34:14 2017 +0200
+
+ _gnutls_x509_validate_sign_params: use GNUTLS_E_CONSTRAINT_ERROR for mismatch of RSA-PSS parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 17:28:00 2017 +0200
+
+ _gnutls_x509_read_rsa_pss_params: fail early on unknown hash algorithms
+
+ Also utilize GNUTLS_E_CONSTRAINT_ERROR for signaling differences
+ between the hash functions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 16:55:02 2017 +0200
+
+ gnutls_pubkey_get_preferred_hash_algorithm: will take into account the RSA-PSS SPKI
+
+ In addition it will offer a SHA hash depending on the key size for
+ RSA public keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 16:45:00 2017 +0200
+
+ certtool: sign_params_to_flags: use strtok to parse input
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 15:41:51 2017 +0200
+
+ certtool: copy SPKI information from private key when available
+
+ That also addresses a bug due to which SPKI information was not set.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 15:54:07 2017 +0200
+
+ x509/output: Subject Public Key parameters are printed just before actual key
+
+ That allows to easier figure out algorithm and basic parameters, rather
+ than having them at the end of long key output.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 15:35:15 2017 +0200
+
+ gnutls_x509_crt_set_spki: be more verbose in parameter restrictions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 15:07:42 2017 +0200
+
+ _gnutls_privkey_update_spki_params: use GNUTLS_E_CONSTRAINT_ERROR on mismatch of hash
+
+ That is a more specific error code for hash mismatch between
+ public key information and signature. In addition only override
+ the salt size, if it is set to zero without the proper flags.
+
+ That prevents the update function from setting an invalid (lower)
+ than the expected size.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 15:00:17 2017 +0200
+
+ cert-tests: use .tmp suffix for all tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 14:43:15 2017 +0200
+
+ certtool: allow specifying RSA-PSS parameters for key generation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 14:56:36 2017 +0200
+
+ _gnutls_x509_write_rsa_pss_params: refuse to write RSA-PSS parameters we cannot use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 14:30:03 2017 +0200
+
+ certtool: group together common options
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 13:41:46 2017 +0200
+
+ tests: modified to account new errors
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 17:58:06 2017 +0200
+
+ gnutls_x509_*_get_signature_algorithm: simplified error handling
+
+ These functions were documented to return a negative error code
+ on failure, as well as GNUTLS_SIGN_UNKNOWN on unknown algorithms.
+ Simplify them by only returning GNUTLS_SIGN_UNKNOWN on all error
+ conditions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 13:24:52 2017 +0200
+
+ _gnutls_x509_get_signature_algorithm: return negative error code on unknown algorithm
+
+ This allows internal callers to quickly fail on errors.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 13:40:31 2017 +0200
+
+ compare_sig_algorithm: modify to work even for certs with unsupported signature algorithm
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 09:20:22 2017 +0200
+
+ pubkey_verify_hashed_data: simplified and made static
+
+ That also removes its ability to operate with the 'unknown'
+ signature algorithm, and forces the TLS 1.0 key exchange to
+ supply the right algorithm or flags.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 26 09:16:03 2017 +0200
+
+ pubkey_verify_data: accept signature entry instead of PK and hash
+
+ That aligns better with current callers which know the signature
+ algorithm in use.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 17:00:00 2017 +0200
+
+ NEWS: documented the SPKI handling functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:42:12 2017 +0200
+
+ tests: added RSA and RSA PSS key unit tests
+
+ That is test:
+ 1. Whether RSA-PSS keys will refuse to sign with incompatible signature
+ 2. Whether RSA-PSS public keys cannot be used for encryption
+ 3. Whether RSA-PSS keys cannot be used for signing with PKCS#1 1.5
+ 4. Whether an RSA key can be converted to an RSA-PSS one with the public APIs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 16:52:18 2017 +0200
+
+ certtool: do not print error on missing RSA-PSS parameters on key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 27 16:53:57 2017 +0200
+
+ Added convention for missing SubjectPublicKeyInfo params field
+
+ That is, when that field is missing, the spki_st structure field
+ pk will be set to GNUTLS_PK_UNKNOWN. In that case other fields
+ are undefined.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 14:01:48 2017 +0200
+
+ *set_spki(): return error on incompatible algorithms
+
+ In addition update the public key algorithm field in the
+ respective structure.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 16:33:26 2017 +0200
+
+ gnutls_x509_privkey_generate2: do not hardcode the RSA-PSS hash to SHA256
+
+ Instead use _gnutls_pk_bits_to_sha_hash() to set an appropriate hash
+ for the number of bits of the key. This matches better the "intention"
+ of RSA-PSS or tying the security parameter with the salt and hash.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 14:14:49 2017 +0200
+
+ _decode_pkcs8_rsa_pss_key: ensure we set the PSS PK identifier
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:38:34 2017 +0200
+
+ cleanup: removed duplicate parameter in gnutls_pubkey_st
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:28:44 2017 +0200
+
+ gnutls_x509_privkey_int: eliminated duplicate pk_algorithm field
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:34:50 2017 +0200
+
+ cleanup: removed unnecessary/duplicate parameters in _dsa_q_to_hash
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:18:05 2017 +0200
+
+ cleanup: removed unnecessary/duplicate parameters in functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 13:12:19 2017 +0200
+
+ cleanup: removed unnecessary/duplicate parameters in functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 12:01:52 2017 +0200
+
+ abstract.h: added functions to read and write SPKI information
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 11:48:58 2017 +0200
+
+ gnutls_x509_privkey_set_spki: introduced function to update SPKI on a key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 16:35:50 2017 +0200
+
+ tests: added unit test for the SPKI related functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 11:37:04 2017 +0200
+
+ x509.h: Renamed SPKI related functions
+
+ This better reflects their purpose as providers of information
+ for subject public key. In addition use 'const' for fields that
+ should be left intact.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 09:43:05 2017 +0200
+
+ tests: introduced RSA-PSS key exchange with a key fixed to rsa-pss with sha256
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 10:06:10 2017 +0200
+
+ _gnutls_pubkey_compatible_with_sig: enforce RSA-PSS requirements
+
+ That is require that parameters in an RSA-PSS key which has them
+ explicitly set, are respected with regards to signature algorithm
+ negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 09:39:32 2017 +0200
+
+ tests: eagain-common.h: remove superfluous information
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 08:49:30 2017 +0200
+
+ tests: renamed tests for uniformity
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 16:15:15 2017 +0200
+
+ tests: added unit test for RSA-PSS signing over PKCS#11
+
+ This requires a softhsm with support for RSA_PKCS_PSS mechanism.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 16:05:36 2017 +0200
+
+ gnutls_pubkey_verify*: use common function to set RSA-PSS parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 11:21:34 2017 +0200
+
+ pkcs11: added support for signatures with RSA-PSS
+
+ Relates #209
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 25 10:16:40 2017 +0200
+
+ gnutls_pk_params_st: renamed sign field to spki
+
+ The name "sign" was ambiguous with regard to its intented
+ use, as it could refer to digital signature parameters
+ which was not exactly the case. That field contains parameters
+ present in the subject public key info (SPKI), which could
+ be used in a digital signature, but not necessarily.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 10:12:54 2017 +0200
+
+ Clarified the purpose of the spki params related functions
+
+ _gnutls_privkey_get_sign_params was renamed to _gnutls_privkey_get_spki_params,
+ _gnutls_privkey_update_sign_params to _gnutls_privkey_update_spki_params,
+ and the dig entry of gnutls_x509_spki_st was renamed to rsa_pss_dig.
+
+ The reason is that there could be a confusion on the purpose of
+ the 'dig' entry, as it could be assumed to be the signature's hash
+ algorithm in the general case. That could not be because the SPKI
+ parameters do not contain it for any other algorithm than RSA-PSS.
+ As such, make a logical separation from SPKI reading functions
+ with the signature reading functions and try to use the
+ gnutls_sign_entry_st when signature information is required.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 23:56:20 2017 +0200
+
+ Pass the signature algorithm lower in the verification stack
+
+ This will allow enhancing the back-ends (PKCS#11 and ext) for
+ signing with the new signature algorithms like RSA-PSS and Ed25519.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 07:46:11 2017 +0200
+
+ fuzz: introduced mem.h with common callbacks for mem access
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 3 07:38:13 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 31 10:50:52 2017 +0200
+
+ fuzz: added SRP server and client fuzzers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 03:01:08 2017 +0200
+
+ fuzz: introduced psk.h common header
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 02:48:11 2017 +0200
+
+ fuzz: added PSK server fuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 02:30:43 2017 +0200
+
+ fuzz: added PSK client fuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 02:12:19 2017 +0200
+
+ gnutls-cli: introduced options to save client and server traces
+
+ This allows to easier obtain traces for use in fuzzers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 01:45:22 2017 +0200
+
+ fuzz: ported libidn2's main.c taking advantage of afl-clang-fast
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 30 01:55:43 2017 +0200
+
+ gnutls_system_recv_timeout: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 20:52:57 2017 +0200
+
+ tlsfuzzer: enabled EC tests for x25519
+
+ That includes tests for default curve.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 15:18:38 2017 +0200
+
+ tlsfuzzer: enabled test for ECDHE without the supported groups/EC extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 17:25:17 2017 +0200
+
+ Set a default supported curve
+
+ RFC4492 and draft-ietf-tls-rfc4492bis-17 mention:
+ "A client that proposes ECC cipher suites may choose not to include these
+ extensions. In this case, the server is free to choose any one of
+ the elliptic curves or point formats listed in Section 5."
+
+ As such, we set a default curve to be used in the case the
+ server encounters a handshake with no supported groups/curves
+ extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 12:58:48 2017 +0200
+
+ tlsfuzzer: removed duplicate tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 12:55:24 2017 +0200
+
+ tlsfuzzer: fixed comment fields
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 08:02:56 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 24 08:39:00 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 08:13:00 2017 +0200
+
+ gnutls-cli: use FFDHE3072 parameters for benchmarking
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 1 10:21:37 2017 +0200
+
+ _gnutls_figure_dh_params: do not use have_ffdhe flag
+
+ This flag is intended to indicate whether the peer has advertized
+ at least one FFDHE group, and not whether we have negotiated FFDHE.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 12:23:55 2017 +0200
+
+ tests: added unit test for group listings in priority structure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 12:05:01 2017 +0200
+
+ tests: updated cipher-listings.sh for the new groups listing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 11:46:03 2017 +0200
+
+ doc: documented the use of RFC7919 and groups
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 10:44:14 2017 +0200
+
+ tlsfuzzer: enabled RFC7919 FFDHE tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 09:09:27 2017 +0200
+
+ tests: enhanced server key exchange tests with explicit DH param setting
+
+ That is, not only check the DH parameter setting using the known_dh_params()
+ functions, but also with the explicit setting --set_server_dh_params().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 16:17:12 2017 +0200
+
+ tests: updated for post-RFC7919 behavior of library
+
+ That is, it is no longer necessary to set DH parameters on a
+ credentials structure, and thus previously expected to fail
+ connections may succeed even without DH parameters.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 15:54:27 2017 +0200
+
+ tests: added RFC7919 FFDHE unit tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 15:37:00 2017 +0200
+
+ cli,serv: do not print any information on compression
+
+ Compression is always NULL.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 15:32:58 2017 +0200
+
+ cli,serv: no longer print parameters when FFDHE groups are used
+
+ The negotiated RFC7919 group is now printed as part of the Description string,
+ and there is no reason to print more information on parameters defined by
+ the protocol.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 11:57:51 2017 +0200
+
+ gnutls-cli: print the supported groups instead of curves
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 12:02:13 2017 +0200
+
+ gnutls_priority_ecc_curve_list: avoid including groups into elliptic curves list
+
+ This provides a mostly-compatible behavior of gnutls_priority_ecc_curve_list()
+ in order to avoid keeping additional information for elliptic curves in the
+ priority cache. This approach will always return the supported curves, if the set
+ groups are prioritized with the elliptic curve variants set first. This
+ is the default in the built-in priorities, and to most common setups.
+
+ Items which are non-valid curves will not be returned.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 2 08:42:37 2017 +0200
+
+ handshake: moved group negotiation after ciphersuite selection
+
+ This allows to cope with situations where the peer prioritizes a
+ supported group which doesn't map to a supported ciphersuite.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 10:35:58 2017 +0200
+
+ security_parameters: ease access to group information by keeping pointer to it
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 10:15:23 2017 +0200
+
+ security_parameters: simplified contents by keeping pointer to cipher_suite_entry_st
+
+ That, in addition to simplifying the contents, it allows faster access
+ to ciphersuite's properties.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 15:36:04 2017 +0200
+
+ TLS: introduced support for RFC7919 groups
+
+ That replaces the EC curve extension negotiation with
+ the negotiated groups extensions, introduces handling
+ for groups as priority strings, as well as using and
+ checking of RFC7919 DH parameters once negotiated.
+
+ Resolves: #37
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 16:03:35 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 14:21:32 2017 +0200
+
+ gnutls-cli: use gnutls_priority_set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 14:20:26 2017 +0200
+
+ tests: modified gnutls_priority_set2() tests for gnutls_priority_set()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 12:09:49 2017 +0200
+
+ gnutls_priority_set: use reference counting
+
+ That eliminates the need for gnutls_priority_set2() which is now
+ removed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 11:43:27 2017 +0200
+
+ Introduced atomic.h to simplify handling of atomic integers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 11:22:31 2017 +0200
+
+ Revert "Documented use gnutls_priority_set2()."
+
+ This reverts commit b4aed16ee30f76211c13b075149bb87c012f9bf6.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 10:54:13 2017 +0200
+
+ tlsfuzzer: enabled test-ecdsa-sig-flexibility.py
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 21 10:05:44 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 14:48:33 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 14:43:20 2017 +0200
+
+ algorithms/mac: marked RIPEMD160 as insecure for certificates
+
+ This is an algorithm which is not really used in Internet PKI
+ and due to that has seen no public cryptanalysis. As such
+ we disable it for certificate verification to prevent it from
+ being used as an attack vector.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 13:26:46 2017 +0200
+
+ tests: partially reverted SHA1 broken tests
+
+ SHA1 is now considered broken only for certificates, hence
+ OCSP or raw signing tests no longer need to use GNUTLS_VERIFY_ALLOW_BROKEN
+ in the cases where certificate verification is not performed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 13:18:10 2017 +0200
+
+ x509/verify: reject SHA1 in signature algorithms for certificate verification
+
+ That is, we now use gnutls_sign_is_secure2() with GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS
+ flag for checking the validity of the signature algorithm, when
+ verifying signatures in certificates.
+
+ Resolves #229
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 13:16:07 2017 +0200
+
+ tests: added unit tests for gnutls_sign_is_secure2()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 12:41:47 2017 +0200
+
+ gnutls_sign_is_secure2: introduced
+
+ This function exports the ability to check the validity of
+ a signature algorithm for signing certificates.
+
+ That also introduces the flag GNUTLS_SIGN_FLAG_SECURE_FOR_CERTS
+ which when specified will cause the function to return whether
+ the algorithm is secure for signing certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 12:40:34 2017 +0200
+
+ _gnutls_digest_is_secure_for_certs: introduced
+
+ This is a macro to allow checking the security of a hash algorithm
+ with respect to signing certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 12:17:40 2017 +0200
+
+ mac: re-organized the hash algorithms table
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 16:28:15 2017 +0200
+
+ tests: added reproducer with ed25519 private key
+
+ Found with oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2689
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 16:43:18 2017 +0200
+
+ Ensure that public key parameters are initialized on import
+
+ Previously we depended on initialization during the _init()
+ call, however, there can be cases where this re-initialization
+ is needed (e.g., on multiple tries to load a key).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 16:49:11 2017 +0200
+
+ _decode_pkcs8_eddsa_key: ensure that the key size read matches the curve size
+
+ That is, in the newly introduced ed25519 keys we didn't check
+ whether the input size in the PKCS#8 file matched the curve
+ size.
+
+ Found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2689
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 16:40:11 2017 +0200
+
+ tlsfuzzer: enabled SNI and other tests from master
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 20 08:22:10 2017 +0200
+
+ tests: updated to reflect the fact that invalid dns names are rejected
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 16:32:07 2017 +0200
+
+ server_name: several simplifications of the code base
+
+ The existing code was written with the intention of supporting multiple
+ server names, however that was never happened, and this extension is
+ currently only used for DNS server names. Remove unneeded extensibility.
+
+ In addition, removed conversion of client provided server name (DNS) to
+ IDNA. Clients not providing valid names are violating the spec and
+ that conversion step not only wastes resources, but increases
+ the attack surface of a server.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 16:11:05 2017 +0200
+
+ server_name: be strict in decoding errors
+
+ That is, return error when a malformed extension is seen.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 11:23:11 2017 +0200
+
+ tlsfuzzer: enabled RSA-PSS checks on certificate verify
+
+ Relates: #208
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 11:16:09 2017 +0200
+
+ tlsfuzzer: enabled test-extended-master-secret-extension.py
+
+ That allows testing the extended master secret behavior.
+
+ Resolves: #231
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 10:59:23 2017 +0200
+
+ ext_master_secret: return proper error code on decoding error
+
+ Proper meaning that it maps to the alert 'decode error' rather
+ than illegal parameter. According to tlsfuzzer the former is more
+ suitable.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 18 08:07:24 2017 +0200
+
+ gnutls-cli: re-use priorities for both client and server on benchmarks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 19:14:33 2017 +0200
+
+ gnutls-cli: re-use priorities when measuring performance
+
+ This avoids measuring cache misses due to priority processing time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 14:06:50 2017 +0200
+
+ tests: enhanced SSL3.0 openssl detection in testcompat-openssl
+
+ That disables SSL 3.0 testing in openssl versions which cannot negotiated
+ it (see https://bugzilla.redhat.com/show_bug.cgi?id=1471783 for rationale)
+ and corrects a typo in the variable name and printed message.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 11:57:41 2017 +0200
+
+ .gitlab-ci.yml: document that the x86 build is our openssl 1.0.x compat testing as well
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 11:08:07 2017 +0200
+
+ tests: disable ARCFOUR interop tests if openssl doesn't support the cipher
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 08:32:08 2017 +0200
+
+ tests: testcompat-openssl: 3DES is explicitly enabled for SSL 3.0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 18:06:01 2017 +0200
+
+ Use gcc's attribute to mark fallthrough statements
+
+ gcc7 is more verbose on fallthrough warnings, and this patch set
+ cleans up the current state by making use of the attribute when
+ necessary.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 18:09:18 2017 +0200
+
+ configure: do not utilize the -Wno-format-truncation gcc warning
+
+ The warnings it produces have little value in our use of string functions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 17:43:09 2017 +0200
+
+ .gitlab-ci.yml: switched to fedora 26 for CI builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 15:17:08 2017 +0200
+
+ tests: introduced tests on public key import-export
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 09:31:10 2017 +0200
+
+ tests: added sign/verification test using rfc8080 keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 10:20:41 2017 +0200
+
+ tests: verify that a server with an ed25519 key will fail when client does not advertise it
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 09:11:59 2017 +0200
+
+ tests: privkey-keygen: added unit test for Ed25519 keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 17 09:06:52 2017 +0200
+
+ privkey_sign_and_hash_data: in pre-hashed schemes, allow empty hash algorithm
+
+ In these schemes the hash algorithm is fixed in the signature algorithm
+ and thus the empty (unknown) value will act as a wildcard.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 20:10:24 2017 +0200
+
+ tests: added private key parameter verification in key-import-export checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 20:03:21 2017 +0200
+
+ nettle: wrap_nettle_pk_verify_priv_params: verify whether public key matches private
+
+ This enables gnutls_privkey_verify_params() for Ed25519 keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 20:52:49 2017 +0200
+
+ CONTRIBUTING.md: specified rules on boolean functions
+
+ Based on suggestion by Hubert Kario.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 14 14:08:20 2017 +0200
+
+ priority: enabled Ed25519 signature by default
+
+ As our implementation interoperates with boringssl's implementation
+ of Ed25519, we can now enable it.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 10:45:49 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 7 09:50:29 2017 +0200
+
+ handshake: return better error code on unwanted algorithm
+
+ That is, when a signature algorithm is available which was not
+ asked by the peer, then return GNUTLS_E_UNWANTED_ALGORITHM
+ instead of the UNKNOWN_ALGORITHM.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 7 10:05:50 2017 +0200
+
+ tests: added check on Ed25519 chain verification
+
+ This chain was generated using certtool, and passed verification
+ with OpenSSL's implementation (commit: db0f35dda18403accabe98e7780f3dfc516f49de)
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 11:34:49 2017 +0200
+
+ gnutls-cli: added RSA-PSS signatures in benchmark
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 11:47:48 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 11:47:09 2017 +0200
+
+ privkey_sign_and_hash_data: added sanity check on param validity
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 10:42:58 2017 +0200
+
+ gnutls-cli: added benchmark on X25519-Ed25519 key exchange
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 09:42:22 2017 +0200
+
+ tests: pkcs7: added ed25519 basic signing and verification checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 09:23:53 2017 +0200
+
+ privkey_sign_and_hash_data: handle prehashed signatures
+
+ This allows this function to handle ed25519, i.e., allows it
+ to operate for PKCS#7 signatures.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 09:21:48 2017 +0200
+
+ pkcs7: improved syntax in if-clause
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 10:14:43 2017 +0200
+
+ tests: enhanced OID tests for Ed25519 OIDs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 11:27:34 2017 +0200
+
+ tests: key-import-export: added Ed25519 key import/export checks
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 09:52:51 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 09:44:52 2017 +0200
+
+ tests: replaced rsa-pss/eddsa certtool options with --key-type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 09:41:56 2017 +0200
+
+ certtool: introduced the --key-type option
+
+ This replaces the --rsa-pss and --eddsa options.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 13:02:06 2017 +0200
+
+ Renamed GNUTLS_PK_ECDHX to GNUTLS_PK_ECDH_X25519
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 12:53:40 2017 +0200
+
+ tests: parse and interpret an EdDSA public key
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 16:23:10 2017 +0200
+
+ tests: added TLS handshake test with EdDSA25519 certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 16:22:27 2017 +0200
+
+ Allowed Ed25519 signing in TLS handshakes
+
+ This follows draft-ietf-tls-rfc4492bis-17
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 15:23:21 2017 +0200
+
+ tests: added tests on EdDSA signature validation using the sign/verify_data APIs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 17:26:34 2017 +0200
+
+ tests: Added unit test on EdDSA key parsing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 12:52:12 2017 +0200
+
+ tests: added Ed25519 key and certificate generation tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 15:20:38 2017 +0200
+
+ Added support for EdDSA (Ed25519) curve keys
+
+ This adds support for draft-ietf-curdle-pkix-04.
+
+ Resolves #25
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 18:52:33 2017 +0200
+
+ parse_pem_cert_mem: fixed issue resulting to accessing past the input data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 15 17:54:01 2017 +0200
+
+ supported_exts.h: make sure that the generated function is static
+
+ That avoids compiler warnings due to missing prototype.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 15:12:11 2017 +0200
+
+ tlsfuzzer: enabled chacha20 tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 14:50:55 2017 +0200
+
+ updated tlsfuzzer
+
+ That fixes issue detecting connection termination from gnutls-serv
+ in chacha20 test.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 15:54:38 2017 +0200
+
+ tests: csr-invalid.der: modify the SPKI OID to use SECP384R1
+
+ That avoids false positives in error detection in 'crq' test due to
+ SECP224R1 not being supported in our CI platforms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 16:04:49 2017 +0200
+
+ x509/output: do not attempt to print the key ID on unknown SPKI algorithms
+
+ On unknown algorithms, it is not always possible to parse the SPKI
+ field. Instead avoid printing errors.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 15:24:23 2017 +0200
+
+ .gitlab-ci.yml: corrected location of artifacts in aarch64 build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 12 13:44:24 2017 +0200
+
+ tests: certtool-rsa-pss: use unique temp files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 10:28:16 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 15:18:20 2017 +0200
+
+ _gnutls_buffer_append_data_prefix: cleanup
+
+ This eliminates a misleading code that assumed that the called functions
+ will return the appended size. Always return zero on success which is
+ what the existing callers assume.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 10:30:56 2017 +0200
+
+ .gitlab-ci.yml: removed unnecessary options from minimal build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 09:52:21 2017 +0200
+
+ pubkey: print the failed signature algorithm when verification fails
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 09:58:35 2017 +0200
+
+ gnutls-cli: added option to allow verification with broken algorithms
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 10:06:22 2017 +0200
+
+ tls sessions will not fail of insecure algorithms which are explicitly enabled
+
+ That is, if DSA-SHA1 is allowed, do not propagate errors from
+ gnutls_pubkey_verify_data2() due to SHA1 considered insecure, but rather
+ ignore such errors.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 14:37:00 2017 +0200
+
+ tests: mini-record-2: made more robust
+
+ It will no longer close the session prior to peer processing
+ all messages. This prevents the peer stopping processing
+ prior to all messages being received.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 14:22:33 2017 +0200
+
+ tests: mini-record: made more robust
+
+ It will no longer use a stream socket as this can does not work
+ well with damaged records (they may end up merged).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 13 13:21:29 2017 +0200
+
+ record: reject 0-byte long ciphertext
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 10:18:56 2017 +0200
+
+ record: added sanity checking in the record layer version copy
+
+ Previously we assumed that an active session had always a version
+ set, however there have been reports of evolution crashing in
+ that particular point. Although, this could have been due to
+ memory corruption, be careful and check for invalid input.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 11:51:20 2017 +0200
+
+ record: more precise calculation of max recv size
+
+ Previously we were using a rough calculation of the max recv size
+ based on maximum values. Now we calculate the exact maximum value once
+ the epoch is initialized and enforce it throughout the session.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 15:33:01 2017 +0200
+
+ decryption: use the same error code on all cases
+
+ This eases testing using tlsfuzzer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 11:08:49 2017 +0200
+
+ gnutls-serv: allow receiving requests up to 16kb
+
+ This makes gnutls-serv useful for few tlsfuzzer test cases.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 3 11:19:44 2017 +0200
+
+ max_record_recv_size: removed call to gnutls_compression_get()
+
+ We no longer support compression.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 09:10:39 2017 +0200
+
+ Print the requested CA names when in debug mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 11:00:20 2017 +0200
+
+ gnutls-http-serv: do not set the obsolete PGP options
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 11 08:51:07 2017 +0200
+
+ doc: updated documentation on client authentication [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 10 09:53:55 2017 +0200
+
+ doc: explicitly state intended usage of priorities on server-side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 4 09:26:57 2017 +0200
+
+ doc: use the default priorities in server example
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 14:04:37 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 10:26:03 2017 +0200
+
+ tests: added unit tests for gnutls_priority_set*()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 10:18:33 2017 +0200
+
+ Documented use gnutls_priority_set2().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 26 10:02:22 2017 +0200
+
+ priorities: share priority structures across sessions
+
+ As the contents of the priority cache grows, it makes sense to shared
+ these structures across many sessions (in server side) rather than
+ copying them to a session. All overrides of the priority contents
+ were moved to session->internals. On client side where gnutls_priority_set_direct()
+ is more commonly used, ensure that the set priority is deinitialized.
+
+ That also introduces gnutls_priority_set2() which does not copy the priority
+ contents by default.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 27 11:19:37 2017 +0200
+
+ set_client_ciphersuite: use the new internal APIs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 25 16:06:49 2017 +0200
+
+ .gitignore: ignore new tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 25 15:32:52 2017 +0200
+
+ tests: added unit testing for server/client cipher negotiation
+
+ This verifies that the expected algorithm (cipher) is negotiated.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 25 12:03:46 2017 +0200
+
+ tests: added unit testing for server ciphersuite/KX negotiation
+
+ This verifies whether the ciphersuite negotiation will detect and
+ reject incompatible data present in credentials.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 14:00:52 2017 +0200
+
+ doc: corrected typo
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 13:32:09 2017 +0200
+
+ Renamed fields of sign_algorithm_st
+
+ The new names better reflect the reality with signature algorithms
+ in TLS 1.3, and correct the initial naming error.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 13:24:48 2017 +0200
+
+ handshake: simplified signature algorithm list generation
+
+ Similarly to ciphersuites, that also utilizes a cache of signature algorithms
+ on the priority structure which is used to quickly generate the signature
+ algorithm list.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 11:55:23 2017 +0200
+
+ Eliminated access to obsolete priority cache fields
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 10:34:11 2017 +0200
+
+ handshake: simplified the client-side ciphersuite negotiation
+
+ This takes advantage of the ciphersuite cache in priorities structure
+ while keeping the same ciphersuite selection checks in place.
+
+ The previous ciphersuite selection checks kept:
+ * Removing SRP ciphersuites when no SRP credentials are set
+ * Removing ciphersuites when no corresponding to KX credentials were set
+ * SCSV addition in SSL 3.0 and fallback SCSV
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 21 11:54:39 2017 +0200
+
+ handshake: simplified the server-side ciphersuite negotiation
+
+ This eliminates all the back and forth loops in the previous code
+ while keeping the same ciphersuite selection checks in place.
+
+ The ciphersuite selection tests that were kept:
+ * Check if key exchange supports the server public key and key usage flags
+ * Check if DH or other parameters required for the ciphersuite are present
+ * Find appropriate certificate for the credentials and ciphersuite
+ * Check whether a curve is negotiated for the ECDH ciphersuites
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 21 10:25:32 2017 +0200
+
+ priority: include a cache of supported ciphersuites
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 21 09:31:31 2017 +0200
+
+ removed unused cipher-suite and KX related functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 21 09:17:57 2017 +0200
+
+ algorithm/kx: sorted key exchange algorithms based on current trends
+
+ That optimizes linear search for the common options.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 23 11:07:11 2017 +0200
+
+ Removed unused functions
+
+ These were identified using callcatcher.
+ http://www.skynet.ie/~caolan/Packages/callcatcher.html
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 15:43:25 2017 +0200
+
+ fuzz: added make update command [ci skip]
+
+ This allows updating the fuzzer corpus from openssl using a single
+ command.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 15:11:13 2017 +0200
+
+ fuzz: added corpora from openssl [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 14:59:52 2017 +0200
+
+ fuzz: undid changes related to boringssl server/client corpus format [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 14:58:34 2017 +0200
+
+ fuzz: included verbatim corpus from boringssl
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 12:22:23 2017 +0200
+
+ fuzz: gnutls-client-fuzzer: read directly from memory [ci skip]
+
+ Also updated to read the prefixed boringssl corpus files.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 7 11:45:05 2017 +0200
+
+ fuzz: gnutls-server-fuzzer: read directly from memory [ci skip]
+
+ Also updated to read the prefixed boring ssl corpus files.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 5 20:14:54 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 1 18:00:45 2017 +0200
+
+ priority_options.gperf: modified for gperf 3.1
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 4 16:12:26 2017 +0200
+
+ tlsfuzzer: enabled ALPN tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 5 21:44:19 2017 +0200
+
+ updated tlsfuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 4 16:15:08 2017 +0200
+
+ ext/alpn: added stricter checks on field lengths
+
+ That is, no longer tolerate empty fields, and error on invalid
+ lengths.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 4 15:35:25 2017 +0200
+
+ gnutls-serv: added the --alpn and --alpn-fatal options
+
+ This allows specifying ALPN protocols supported by server, allowing
+ to test the ALPN negotiation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 4 11:42:59 2017 +0200
+
+ fuzz: updated server with multiple keys (ECDSA, RSA) and DH parameters [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 1 10:50:57 2017 +0200
+
+ OCSP: find_signercert: improved DER length calculation
+
+ Previously we were assuming a fixed amount of length bytes which
+ is not correct for all possible lengths. Use libtasn1 to decode
+ the length field.
+
+ Resolves: #223
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 10:04:01 2017 +0200
+
+ OCSP: check the subject public key identifier field to figure issuer
+
+ Normally when attempting to match the 'Responder Key ID' in an OCSP response
+ against the issuer certificate we check (according to RFC6960) against the
+ hash of the SPKI field. However, in few certificates (see commit:
+ "added ECDSA OCSP response verification"), that may not be the case. In that
+ certificate, that value matches the Subject Public Key identifier field
+ but not the hash.
+
+ To account for these certificates, we enhance the matching to also consider
+ the Subject Public Key identifier field.
+
+ Relates: #223
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 09:33:08 2017 +0200
+
+ OCSP: added more verbose debug logging on verification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 29 21:17:34 2017 +0200
+
+ tests: added ECDSA OCSP response verification
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 30 10:43:20 2017 +0200
+
+ .travis.yml: do not fail on brew install failures
+
+ brew install seems to fail on several occasions when a newer package
+ is available than the installed. Ignore those errors rather than
+ failing build.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 29 14:34:20 2017 +0200
+
+ tests: added check on saving certs and OCSP responses
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 29 14:28:29 2017 +0200
+
+ gnutls-cli: save OCSP response at the time certificate is saved
+
+ That ensures that we always save the OCSP response, even when certificate
+ verification fails.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 14:26:07 2017 +0200
+
+ moved compression-related APIs to compat.h
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 08:56:09 2017 +0200
+
+ doc: removed any references to compression and documented change
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 16:20:25 2017 +0200
+
+ tests: removed tests related to zlib support
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 15:58:35 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 15:36:18 2017 +0200
+
+ Removed support for compression mechanisms
+
+ They are not required for TLS 1.3, and are deprecated for TLS 1.2.
+ We eliminate them in order to reduce the complexity in the record
+ packet handling.
+
+ Resolves #212
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 13:59:54 2017 +0200
+
+ gnutls-cli: be less verbose in OCSP error messages
+
+ Previously we were reporting "No issuer found" if any certificate
+ in a chain could not be verified. That was confusing information
+ and not strictly necessary. No longer print that.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 13:57:15 2017 +0200
+
+ gnutls-cli: improved error message of OCSP failure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 09:12:39 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 20:50:22 2017 +0200
+
+ tests: ocsptool: added test of --verify-response with --load-chain
+
+ This utilizes the provided chain to find the signer of the
+ OCSP response.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 09:09:41 2017 +0200
+
+ ocsp: print response's signature algorithm in compact listing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 09:06:01 2017 +0200
+
+ ocsptool: verify_response will print information on the response
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 08:59:45 2017 +0200
+
+ ocsptool: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 20 08:31:41 2017 +0200
+
+ ocsptool: allow combining --load-trust with --verify-response
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 20:58:21 2017 +0200
+
+ ocsptool: --load-chain will sort the input chain
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 20:50:22 2017 +0200
+
+ ocsptool: introduced --verify-allow-broken option
+
+ This allows verification to succeed even when broken algorithms are
+ involved.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 20:47:10 2017 +0200
+
+ ocsptool: the --verify-response can be combined with --load-chain
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 20:27:24 2017 +0200
+
+ gnutls_certificate_verification_status_print: mention OCSP in error messages
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 14:36:43 2017 +0200
+
+ ocsptool: added --load-chain option
+
+ This option allows to directly verify all the members of a certificate
+ chain.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 19 08:20:47 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 18 17:35:06 2017 +0200
+
+ tests: enabled X25519 interop tests with openssl 1.1.0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 18 14:35:57 2017 +0200
+
+ NORMAL priority: no longer enable the smaller curves by default
+
+ They are not widely enabled by web servers, and they provide no
+ advantage over X25519.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 18 14:35:33 2017 +0200
+
+ NORMAL priority: enable X25519 curve
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 17 14:22:02 2017 +0200
+
+ pkcs11: cleanups in pkcs11_login()
+
+ Use pkcs11_rv_to_err() to return the right error code map after
+ PKCS#11 calls; separate checks for already log in status for SO and
+ user login.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 17 14:07:50 2017 +0200
+
+ tests: pkcs11-mock: reset state when requesting reauth
+
+ That is, for the MOCK_FLAG_SAFENET_ALWAYS_AUTH flag we ensure that
+ GetSessionInfo() will return the right state when authentication
+ is required for the first time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 22:04:49 2017 +0200
+
+ pkcs11: improved handling of HSMs without CKU_CONTEXT_SPECIFIC support
+
+ That is, when the HSM returns CKR_USER_NOT_LOGGED_IN, switch
+ to CKU_USER, instead of relying to a fallback within pkcs11_login().
+ That simplifies login logic.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 28 11:07:50 2017 +0200
+
+ tests: added unit test for safenet protectserver HSM's PKCS#11 support
+
+ That is, detect whether the absence of C_Login will fallback to CKU_USER
+ after CKU_CONTEXT_SPECIFIC is tried.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 11:26:19 2017 +0200
+
+ pkcs11: simplified pkcs11_login()
+
+ By cleanups, as well as including the reauth flag in the flags option.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 11:11:24 2017 +0200
+
+ pkcs11: the GNUTLS_PKCS11_OBJ_FLAG_LOGIN will force a login
+
+ That is, even in tokens which do not have a CKF_LOGIN_REQUIRED flag
+ a login will be forced. This allows operation on the safenet HSMs
+ which do not set that flag.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 27 07:24:36 2017 +0200
+
+ Handle specially safenet HSMs which cannot handle CKU_CONTEXT_SPECIFIC
+
+ These HSMs do not support CKA_ALWAYS_AUTHENTICATE, nor understand CKU_CONTEXT_SPECIFIC,
+ but rather return CKR_USER_NOT_LOGGED_IN on the first private key operation.
+ Try to discover that state by calling C_Login when CKR_USER_NOT_LOGGED_IN
+ is seen, and retrying with CKU_USER after CKU_CONTEXT_SPECIFIC login fails.
+ See discussion in https://github.com/OpenSC/libp11/issues/160
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 12:06:36 2017 +0200
+
+ Added documentation to legacy openpgp functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 10:58:23 2017 +0200
+
+ Removed unnecessary certificate type functionality
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 10:23:19 2017 +0200
+
+ NEWS: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 10:21:52 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 10:21:10 2017 +0200
+
+ doc: removed references to openpgp
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 10:14:58 2017 +0200
+
+ po: removed openpgp/output.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 09:55:44 2017 +0200
+
+ guile: removed openpgp related tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 09:30:41 2017 +0200
+
+ fuzz: removed the openpgp certificate fuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 09:03:05 2017 +0200
+
+ tools: removed options for openpgp support
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 08:50:32 2017 +0200
+
+ Removed support for openpgp certificates and keys
+
+ Resolves #178
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 16 08:38:42 2017 +0200
+
+ tests: removed openpgp related tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 7 11:58:25 2017 +0200
+
+ tests: added reproducer for assertion trigger
+
+ This relates to handshakes with support for RSA-PSS.
+ Found with oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2132
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Jun 8 15:42:30 2017 +0200
+
+ nettle: ported fix for assertion failure in pss_verify_mgf1
+
+ Backport the upstream fix from:
+ https://git.lysator.liu.se/nettle/nettle/commit/b1252fedf6ee1dbb8468d1d3f177711a16e83e52
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 17:33:21 2017 +0200
+
+ .gitlab-ci.yml: keep logs of tests in abi build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 13:41:36 2017 +0200
+
+ doc: simplified the default client example
+
+ Removed optional paths.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 13:20:51 2017 +0200
+
+ tests: added reproducer for OCSP response found test cases
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 13:14:23 2017 +0200
+
+ fuzz: documented location for OCSP-related reproducers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 12:43:48 2017 +0200
+
+ ocsp: added sanity check in returned length
+
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1492
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 10:37:53 2017 +0200
+
+ doc: added/modernized text on AEAD ciphers [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 09:09:20 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 15 09:06:49 2017 +0200
+
+ tests: improved duplicate extension test
+
+ Instead of sending two duplicate extensions of which one is invalid,
+ send two valid ones instead. That way, we avoid the possibility of false
+ positives due to the validation code of the extension contents.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 14:15:08 2017 +0200
+
+ tests: verify that duplicate extensions are rejected
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 13:09:44 2017 +0200
+
+ TLS extensions: added duplicate extension check on server side
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 11:15:54 2017 +0200
+
+ gnutls_init: better naming for internal function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 13 08:08:56 2017 +0200
+
+ tests: added unit test for overriding TLS extensions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 11:11:34 2017 +0200
+
+ TLS extensions: mark each extension which cannot be overriden
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 11:02:49 2017 +0200
+
+ TLS extensions: combined the extension data and resumed data structures
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 12 17:31:19 2017 +0200
+
+ removed type extension_priv_data_t
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 13 08:02:04 2017 +0200
+
+ gnutls_int.h: groupped extension structures together
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 12 14:19:23 2017 +0200
+
+ TLS extensions: several simplifications
+
+ This allows extensions set by the application to override some
+ of the internal ones.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 14 15:53:13 2017 +0200
+
+ .gitlab-ci.yml: FreeBSD system is no longer available; disabling for CI [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 12 10:26:13 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 18:53:48 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 16:37:48 2017 +0200
+
+ doc: added reference to privkey export functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 18:29:18 2017 +0200
+
+ tests: added basic unit tests for the export_*_raw2() functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 18:17:34 2017 +0200
+
+ corrected typo in x962 functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 16:21:31 2017 +0200
+
+ pkcs11: do not set leading zeros on integers
+
+ PKCS#11 defines integers as unsigned having most significant byte
+ first, e.g., 32768 = 0x80 0x00. This is interpreted literraly by
+ some HSMs which do not accept an integer with a leading zero.
+
+ Resolves: #215
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 9 16:20:05 2017 +0200
+
+ Introduced functions to export integers with no leading zero
+
+ That is introduced the flag GNUTLS_EXPORT_FLAG_NO_LZ and:
+ * gnutls_pubkey_export_rsa_raw2
+ * gnutls_pubkey_export_dsa_raw2
+ * gnutls_pubkey_export_ecc_raw2
+ * gnutls_privkey_export_rsa_raw2
+ * gnutls_privkey_export_dsa_raw2
+ * gnutls_privkey_export_ecc_raw2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 15:03:17 2017 +0200
+
+ nettle: use older GMP macros for mpz_mod_2exp and mpz_div_2exp
+
+ These ensure that compilation will succeed even when building with gmp-mini.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 13:15:00 2017 +0200
+
+ _gnutls_ucs2_to_utf8: use void* as pointer type to avoid compiler assumptions on alignment [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 13:06:19 2017 +0200
+
+ ciphersuites: removed unused function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 13:00:25 2017 +0200
+
+ nettle/cipher: document that ctx_ptr is 16-byte aligned, and use void* to avoid compiler assumptions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 12:53:44 2017 +0200
+
+ certtool: corrected typo in strcmp() use
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 11:15:02 2017 +0200
+
+ _gnutls_x509_privkey_reinit: ensure fields will not be re-used
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 8 09:25:32 2017 +0200
+
+ certtool: improved error message when public key cannot be figured [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 16:05:37 2017 +0200
+
+ updated auto-generated files for new signing API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 16:00:41 2017 +0200
+
+ handshake: simplify handshake by using the new signing API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 13:38:05 2017 +0200
+
+ tests: introduced unit tests of the new signing API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 15:39:52 2017 +0200
+
+ abstract API: introduced new signing functions
+
+ That is, the gnutls_privkey_sign_data2() and gnutls_privkey_sign_hash2().
+ The new functions perform signing with input the signature algorithm instead
+ of the hash algorithm; that allows to use algorithms where the hash algorithm
+ is not used, or the public key algorithm may be different than the key's.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 7 11:18:07 2017 +0200
+
+ pkix: removed unused definition
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 16:04:53 2017 +0200
+
+ gnutls_privkey_st: removed unused element
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 10:34:33 2017 +0200
+
+ gnutls_session_get_desc: improved ciphersuite description
+
+ That is, separated the key exchange from the signature algorithm
+ used by the server, and list them in different fields.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 11:16:45 2017 +0200
+
+ tests: key-import-export: use cert-common.h
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 2 17:04:45 2017 +0200
+
+ tests: simplified CPPFLAGS of tests using internal gnutls funcs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 12:54:24 2017 +0200
+
+ tests: key-exchange: added error checking in gnutls_certificate_set_x509_key_mem
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 10:58:33 2017 +0200
+
+ _gnutls_check_key_cert_match: account for RSA and RSA-PSS mismatches
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 6 09:49:09 2017 +0200
+
+ certtool: fix DER export with --p7-info
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 13:21:38 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 10:01:07 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 09:59:49 2017 +0200
+
+ psktool: minor documentation updates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 09:52:53 2017 +0200
+
+ tests: added basic functionality check for psktool
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 09:50:07 2017 +0200
+
+ psktool: increased default key size to 256-bits
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 09:39:49 2017 +0200
+
+ psktool: do not assume any default key file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed May 31 12:58:58 2017 -0400
+
+ clarify documentation and arguments for psktool
+
+ * psktool's -p argument should really be short for --pskfile, not
+ --passwd. there is no passwd involved.
+
+ * the example documentation switches names halfway through, which is
+ confusing.
+
+ * there is no prompt for a password. do not mention it in the
+ example.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 09:22:44 2017 +0200
+
+ tests: added unit test to verify that certificates with non-DER strict time fields are accepted
+
+ Also removed the old strict compliance DER test.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 09:15:27 2017 +0200
+
+ Tolerate DER time encoding errors
+
+ It seems that openssl generated certificates may contain invalid
+ formatted times, and gnutls will no longer parse them. Ignore such
+ formatting errors when DER decoding.
+
+ We should reconsider this in the future (#207)
+
+ Resolves #196
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 10:24:04 2017 +0200
+
+ tests: enhanced OID tests with OIDs for SHA3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 5 10:21:54 2017 +0200
+
+ tests: enhanced OID tests with OIDs for RSA-PSS
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 4 13:56:04 2017 +0200
+
+ .gitlab-ci.yml: added aarch64 build based on Debian
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 14:55:19 2017 +0200
+
+ _gnutls_PRF: was made inline function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 14:29:10 2017 +0200
+
+ tests: added low-level unit tests on TLS 1.0 and 1.2 PRFs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 13:52:03 2017 +0200
+
+ prf: implement the TLS 1.0 and 1.2 PRFs using nettle
+
+ That simplifies the existing PRF code and moves it in the
+ crypto-backend component.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 12:00:26 2017 +0200
+
+ doc: refer to the site for commercial support options
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 11:29:08 2017 +0200
+
+ tests: mini-record-retvals: include AES-CBC tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 11:36:30 2017 +0200
+
+ tests: eliminated build warnings
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 08:55:54 2017 +0200
+
+ tests: combined tables of sign-verify tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 19:54:48 2017 +0200
+
+ Only accept known public key algorithms in the GNUTLS_PRIVKEY_EXT private keys
+
+ The reason is that this API, assumes very low level primitives which
+ are not available for the newer RSA-PSS private keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 19:42:36 2017 +0200
+
+ _gnutls_privkey_*_sign_params: added support for GNUTLS_PRIVKEY_EXT keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 19:25:11 2017 +0200
+
+ tests: added basic test on "external" keys with gnutls_privkey_import_ext2()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 16:53:14 2017 +0200
+
+ gnutls_x509_privkey_sign_data: wrap over gnutls_privkey_sign_data()
+
+ That will allow this function to operate with the new key types.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 16:43:28 2017 +0200
+
+ tests: added unit tests for the gnutls_x509_* sign/verify APIs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 15:23:21 2017 +0200
+
+ tests: added tests signature validation using the sign/verify_data APIs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 16:24:05 2017 +0200
+
+ Separated use of GNUTLS_PRIVKEY_FLAG_PROVABLE and GNUTLS_PRIVKEY_SIGN_FLAG_REPRODUCIBLE
+
+ For simplicity, rename GNUTLS_PRIVKEY_SIGN_FLAG_REPRODUCIBLE to GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 16:19:25 2017 +0200
+
+ _gnutls_privkey_find_sign_params: renamed and simplified
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 15:40:40 2017 +0200
+
+ gnutls_privkey_sign_hash: removed duplicate code
+
+ The same code was available in _gnutls_privkey_find_sign_params().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 10:47:12 2017 +0200
+
+ GNUTLS_E_INSUFFICIENT_SECURITY: moved to fatal errors
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 16:22:27 2017 +0200
+
+ tls-sig: re-organize and simplify the TLS signature generation and verification
+
+ That makes sure that the high level APIs are used when possible, and
+ separate the TLS 1.2 from other code paths. This will allow supporting
+ signature schemes like EdDSA and others.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 10:59:53 2017 +0200
+
+ tests: modify tests to allow signatures with SHA1
+
+ There were several tests that were utilizing SHA1 signatures but were
+ not failing due to the bug in gnutls_pubkey_verify_hash2().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 31 10:12:31 2017 +0200
+
+ gnutls_pubkey_verify_hash2: do not allow GNUTLS_VERIFY_USE_TLS1_RSA with non-RSA keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 10:42:27 2017 +0200
+
+ gnutls_pubkey_verify_hash2: check for broken signature algorithms
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 10:13:16 2017 +0200
+
+ gnutls_pubkey_verify_data2: do not utilize GNUTLS_VERIFY_USE_RSA_PSS
+
+ This flag is not required for verification since the signature algorithm
+ is sufficient to detect RSA-PSS without requiring any flags.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 30 10:36:59 2017 +0200
+
+ tests: do not utilize GNUTLS_VERIFY_USE_RSA_PSS
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 08:55:47 2017 +0200
+
+ certtool: do not ask for password when exporting to PKCS#8 implicitly
+
+ Previously --generate-privkey wouldn't ask for password unless --pkcs8
+ was explicitly given. Keep that behavior, and do not ask for any password
+ even if we need to export to PKCS#8 for some key types. Always require
+ the --pkcs8 option to encrypt with password.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 08:43:14 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 08:37:03 2017 +0200
+
+ doc: mention RSA-PSS-SHA* signature algorithms
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 08:33:44 2017 +0200
+
+ certtool: replaced rsa-pss-sign with sign-params option
+
+ This option could accomodate future enhancements/additions in
+ certificate signining.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 29 08:26:41 2017 +0200
+
+ certtool: better documentation on rsa-pss-sign
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 13:30:18 2017 +0200
+
+ replaced MAX_SIGNATURE_ALGORITHMS macro with MAX_ALGOS
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 13:19:08 2017 +0200
+
+ tests: added unit test for gnutls_sign_supports_pk_algorithm()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:44:41 2017 +0200
+
+ tls-fuzzer: ignore the incomplete RSA-PSS tests
+
+ These tests fail because tls-fuzzer currently does not properly implement
+ RSA-PSS.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:06:34 2017 +0200
+
+ tests: verify that generated RSA-PSS keys can be read with certtool -k
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:01:04 2017 +0200
+
+ certtool: use PKCS#8 format for generated RSA-PSS keys
+
+ An RSA-PSS key has additional parameters which cannot be stored
+ in the "standard" PKCS#1 format. For that when asked to generate
+ an RSA-PSS key, we export to the PKCS#8 form.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 09:52:33 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 08:57:11 2017 +0200
+
+ tests: x509sign-verify: include ECDSA and RSA-PSS key tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 08:22:07 2017 +0200
+
+ tlsfuzzer: the test-certificate-verify-malformed check now passes
+
+ Previously it was expecting a different alert code than gnutls returned.
+ Now gnutls returns the expected alert code (GNUTLS_A_DECRYPT_ERROR)
+ on malformed signatures.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 16:35:18 2017 +0200
+
+ alert: map GNUTLS_E_PK_SIG_VERIFY_FAILED to GNUTLS_A_DECRYPT_ERROR
+
+ This makes server respond with GNUTLS_A_DECRYPT_ERROR on malformed signatures,
+ which is the expected behavior. Hinted by Hubert Kario.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 16:18:25 2017 +0200
+
+ Increased the maximum number of signature algorithms
+
+ That allows including all the existing signatures including DSA.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 14:30:17 2017 +0200
+
+ x509sign-verify: corrected test to perform RSA tests on RSA keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 14:01:53 2017 +0200
+
+ tests: added tests for RSA-PSS key exchange under TLS 1.2
+
+ That includes tests with RSA and RSA-PSS server and client certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 14:53:43 2017 +0200
+
+ publickey: map RSA ciphersuites to GNUTLS_PK_RSA_PSS
+
+ That is in addition to GNUTLS_PK_RSA
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 30 06:40:39 2016 +0300
+
+ Rework KX -> PK mappings
+
+ GOST VKO and PSS keys would support several public keys, so change
+ the previous 1:1 kx->pk mapping into 1:many.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 12:45:08 2017 +0200
+
+ tests: added TLS 1.2 tests with RSA-PSS signatures on RSA certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 11:50:38 2017 +0200
+
+ gnutls_privkey_sign_hash: use the GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS flag
+
+ That is, the privkey_sign_hash() function was made static (no users other
+ than the same file), and gnutls_privkey_sign_hash will take into account
+ the GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS, if specified.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 11:33:49 2017 +0200
+
+ tls-sig: sign with RSA-PSS when requested by negotiated signature algorithm
+
+ That is, when signing a TLS message, take into account the
+ negotiated signature algorithm, in addition to the hash algorithm
+ to decide which flags to pass to gnutls_privkey_sign_hash(). This
+ allows signing the handshake messages with RSA-PSS even when an RSA
+ key is present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 11:19:12 2017 +0200
+
+ priority: enabled RSA-PSS signatures by default
+
+ They are prioritized low on the list to reduce compatibility
+ issues in case they are wrongly implemented in gnutls or in the
+ peer implementation. To be revised when more elaborate compatibility
+ tests are made.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 11:13:23 2017 +0200
+
+ ext/signature: accept compatible algorithms with PK
+
+ That is instead of using a 1-1 mapping of signature algorithms
+ to public key algorithms, use gnutls_sign_supports_pk_algorithm()
+ to determine whether algorithms match. That way we can allow
+ GNUTLS_SIGN_RSA_PSS_SHA256 under GNUTLS_PK_RSA and GNUTLS_PK_RSA_PSS
+ keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 11:12:33 2017 +0200
+
+ gnutls_pubkey_verify_hash2: corrected operation with RSA-PSS keys
+
+ That is, do not check the flag GNUTLS_VERIFY_USE_RSA_PSS, as we
+ already have enough information to determine whether an RSA-PSS
+ signature is used (the sign algorithm). Also return the code
+ GNUTLS_E_INCOMPATIBLE_SIG_WITH_KEY when a signature algorithm
+ incompatible with the public key is encountered.
+
+ In addition, fixed few misplacements of GNUTLS_PK_RSA_PSS in switch
+ cases.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 10:48:30 2017 +0200
+
+ Introduced gnutls_sign_supports_pk_algorithm()
+
+ This function allows to test whether a combination of public key
+ algorithm and signature algorithm are supported. This is introduced
+ for RSA-PSS signatures which can be generated by a GNUTLS_PK_RSA key
+ or by a GNUTLS_PK_RSA_PSS key.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Thu Mar 16 11:38:58 2017 +0100
+
+ x509: implement RSA-PSS signature scheme
+
+ This patch enables RSA-PSS signature scheme in the X.509 functions and
+ certtool.
+
+ When creating RSA-PSS signature, there are 3 different scenarios:
+
+ a. both a private key and a certificate are RSA-PSS
+ b. the private key is RSA, while the certificate is RSA-PSS
+ c. both the private key and the certificate are RSA
+
+ For (a) and (b), the RSA-PSS parameters are read from the certificate.
+ Any conflicts in parameters between the private key and the certificate
+ are reported as an error.
+
+ For (c), the sign functions, such as gnutls_x509_crt_privkey_sign() or
+ gnutls_privkey_sign_data(), shall be instructed to generate an RSA-PSS
+ signature. This can be done with the new flag
+ GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS.
+
+ Verification is similar to signing, except for the case (c), use the
+ flag GNUTLS_VERIFY_USE_RSA_PSS instead of
+ GNUTLS_PRIVKEY_SIGN_FLAG_RSA_PSS.
+
+ From the command line, certtool has a couple of new options: --rsa-pss
+ and --rsa-pss-sign. The --rsa-pss option indicates that the generated
+ private key or certificate is restricted to RSA-PSS, while the
+ --rsa-pss-sign option indicates that the generated certificate is signed
+ with RSA-PSS.
+
+ For simplicity, there is no means of choosing arbitrary salt length.
+ When it is not given by a private key or a certificate, it is
+ automatically calculated from the underlying hash algorithm and the
+ RSA modulus bits.
+
+ [minor naming changes by nmav]
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 10:19:22 2017 +0200
+
+ fuzz: added RSA-PSS certificate
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Fri Mar 31 14:36:46 2017 +0200
+
+ build: import files from Nettle for RSA-PSS
+
+ Signed-off-by: Daiki Ueno <dueno@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 27 07:29:44 2017 +0200
+
+ libtasn1: updated to 4.11
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 15:10:17 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 09:39:10 2017 +0200
+
+ tests: added unit tests for gnutls_de/encode_rs_value
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 25 08:38:43 2017 +0200
+
+ pk: exported gnutls_decode_rs_value() and gnutls_encode_rs_value()
+
+ These functions allow encoding to and from a Dss-Sig-Value.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 12:43:21 2017 +0200
+
+ tests: skip x86-specific tests when not in x86
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:56:30 2017 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:18:09 2017 +0200
+
+ tests: tls-fuzzer: corrected unlocking at tls-fuzzer-cert.sh
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:42:28 2017 +0200
+
+ examples: made a comment that getpass() output needs to be sanitized
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 26 10:13:05 2017 +0200
+
+ certtool: avoid printing legacy options in --help
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 17:34:31 2017 +0200
+
+ Makefile: improved code coverage extraction from lcov output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 15:48:31 2017 +0200
+
+ configure: warn when building as static library [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 14:01:56 2017 +0200
+
+ gnutls_ocsp_status_request_enable_client: removed support for problematic parameters
+
+ Removed support for responder_id and extensions parameters. These
+ had very difficult semantics to use and the underlying implementation
+ had encoding errors, meaning there was no interoperation with other
+ clients. Given that issue it means there are no applications depending on
+ these parameters; ignore these parameters completely and no longer send
+ either responder_id or extensions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 11:48:24 2017 +0200
+
+ gnutls_ocsp_status_request_enable_client: documented requirements for parameters
+
+ That is, the fact that extensions and responder_id parameters must be
+ allocated, and are assigned to the session.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 11:38:16 2017 +0200
+
+ ext/status_request: Removed the parsing of responder IDs from client extension
+
+ These values were never used by gnutls, nor were accessible to applications,
+ and as such there is not reason to parse them.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 10:46:03 2017 +0200
+
+ ext/status_request: ensure response IDs are properly deinitialized
+
+ That is, do not attempt to loop through the array if there is no array
+ allocated.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 10:28:28 2017 +0200
+
+ tlsfuzzer: enabled ocsp stapling test
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 24 10:17:09 2017 +0200
+
+ tlsfuzzer: updated to latest version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 23 09:26:10 2017 +0200
+
+ self-tests: limit compatibility API checks to vectors with plaintext
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 16:43:38 2017 +0200
+
+ tests: on cipher override do not run the compatibility checks
+
+ That is, because we introduce a cipher using the new AEAD API which
+ does not provide compatibility hooks.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 16:41:48 2017 +0200
+
+ self-tests: introduced flag GNUTLS_SELF_TEST_FLAG_NO_COMPAT
+
+ This allows skipping the compatibility APIs when running self tests.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 16:39:14 2017 +0200
+
+ self-tests: all parameter was replaced by flags
+
+ This allows to introduce more options than just check all
+ ciphers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 14:41:56 2017 +0200
+
+ aarch64: fix AES-GCM in-place encryption and decryption
+
+ Resolves #204
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 11:54:25 2017 +0200
+
+ crypto: self-tests: enhance to include compatibility APIs
+
+ That is, run the compatibility gnutls_cipher_* APIs on self tests
+ for AEAD ciphers in addition to the AEAD API.
+
+ Relates #204
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 14:23:14 2017 +0200
+
+ crypto-api: refuse to run gnutls_cipher_init() in full AEAD modes
+
+ That is, there are AEAD modes like CCM that can only be used through
+ the AEAD API. Always refuse calls to gnutls_cipher_init() in these
+ modes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 22 09:19:53 2017 +0200
+
+ doc: corrected error in gnutls_x509_privkey_sign_data parameters [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 20:41:30 2017 +0200
+
+ sysrng-linux: improved detection of getrandom()
+
+ The getrandom() call is defined in sys/random.h.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 20:34:40 2017 +0200
+
+ gnutls-cli: use 16k buffers in --benchmark-tls-ciphers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 20:31:33 2017 +0200
+
+ gnutls-cli: cleaned up --benchmark-ciphers output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 20:20:34 2017 +0200
+
+ gnutls-cli: no longer include arcfour in benchmarks
+
+ This cipher is considered broken and no longer included in
+ the default set of ciphers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 08:51:55 2017 +0200
+
+ documented the make files-update make option
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 08:48:26 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 08:26:47 2017 +0200
+
+ tests: added TLS server test for multi-key usage
+
+ That is, a server which utilizes both RSA and ECDSA keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 20 08:14:59 2017 +0200
+
+ p11tool: mark provider opts as deprecated
+
+ That is, to avoid listing that option in p11tool --help, as it is
+ only useful for debugging very low level interfaces with PKCS#11
+ parameter passing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat May 20 02:19:17 2017 +0300
+
+ gnutls-serv: allow user to specify multiple x509certile/x509keyfile
+
+ Instead of adding more and more variants like x509dsakeyfile or
+ x509ecckeyfile (counting eddsa and gost in future), allow user to
+ specify x509certfile/x509keyfile multiple times. Keep the old
+ options as compatibility options.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu May 18 23:55:57 2017 +0300
+
+ Fix two memory leaks in debug output of gnutls tools
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Nov 30 07:13:09 2016 +0300
+
+ Don't let GnuTLS headers in NETTLE_CFLAGS override local headers
+
+ Change order of CFLAGS so that local headers always come before ones in
+ $(NETTLE_CFLAGS).
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 12 17:58:55 2017 +0200
+
+ find_signer: eliminate memory leak
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Karl Tarbe <karl.tarbe@cyber.ee>
+Date: Mon May 8 15:06:33 2017 +0300
+
+ tests: add test for signing with certificate list
+
+ Signing with one certificate, but includes the other certificates
+ inside the PKCS#7 structure.
+
+ Signed-off-by: Karl Tarbe <karl.tarbe@cyber.ee>
+
+Author: Karl Tarbe <karl.tarbe@cyber.ee>
+Date: Thu May 4 16:46:14 2017 +0300
+
+ certtool: allow multiple certificates in --p7-sign
+
+ Signed-off-by: Karl Tarbe <karl.tarbe@cyber.ee>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun May 14 11:21:07 2017 +0200
+
+ Fix autoconf progress message concerning heartbeat [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 11 22:03:08 2017 +0200
+
+ doc: corrected typo [ci skip]
+
+ Reported by Andreas Metzler.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 11 22:01:10 2017 +0200
+
+ test: corrected typo preventing the run of openpgp test [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 17:43:32 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 17:23:54 2017 +0200
+
+ pkcs11_override_cert_exts: do not use CKA_X_DISTRUSTED flag when retrieving
+
+ This flag was introduced in order for reducing the number of duplicate
+ stapled extensions returned by p11-kit. Unfortunately that fix was bogus
+ and in fact it resulted to p11-kit not returning any stapled extensions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 17:08:11 2017 +0200
+
+ tests: added unit test for p11-kit trust store
+
+ This verifies whether an Example Root CA can be read together
+ with its stapled extensions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 16:40:10 2017 +0200
+
+ p11tool: added the --provider-opts option
+
+ This option allows passing parameters to the PKCS#11 module
+ loading process, i.e., passed to gnutls_pkcs11_add_provider().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 16:34:25 2017 +0200
+
+ pkcs11_add_provider: allow passing parameters to p11-kit trust module
+
+ When the @params argument of gnutls_pkcs11_add_provider() starts with
+ 'p11-kit:' the specified provider is loaded as an unmanaged module
+ and the rest of parameters are being passed opaque to the module. This
+ allows loading for example the p11-kit trust module with a custom path
+ for the trust database.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 9 22:03:45 2017 +0200
+
+ tests: introduced checks in alternative chain discovery
+
+ These cope with alternative chain discovery in the case of insecure
+ algorithm found in the chain.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 9 21:24:36 2017 +0200
+
+ tests: modified pkcs1-pad to account for alt path search
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 8 06:43:28 2017 +0200
+
+ gnutls_x509_trust_list_verify_crt2: treat signers with insecure algorithms as unknown
+
+ The reason is that many servers utilize a legacy chain to improve compatibility
+ with old clients and that chain often contains insecure algorithm. In that case
+ try to construct alternative paths. To maintain compatibility with previous
+ versions, we ensure that the same error code (verification status) is returned
+ in these cases as before by sending the cached error if the alternative path fails
+ too.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 9 20:57:40 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 9 20:57:00 2017 +0200
+
+ Makefile: files-update directive will update the auto-generated files in src/
+
+ This simplifies the update of files generated by autogen.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 8 07:02:16 2017 +0200
+
+ tests: added check for gnutls-cli's sni-hostname option
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 8 06:13:59 2017 +0200
+
+ gnutls-cli: introduced --sni-hostname option
+
+ This allows overriding the value set on the TLS server name indication
+ extension.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 10 10:39:22 2017 +0200
+
+ Makefile: added phony targets to .PHONY [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 9 14:51:44 2017 +0200
+
+ fuzz: doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 8 06:27:21 2017 +0200
+
+ errors.h: _gnutls_cert_log will only print on non-null certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nicolas Dufresne <nicolas.dufresne@collabora.com>
+Date: Fri Apr 28 17:17:32 2017 -0400
+
+ rsa-psk: Use the correct username datum
+
+ In rsa-psk we properly request username for the case the
+ application uses a callback, but later we use the username
+ cached in the credentials structure. This will lead to empty
+ username issues.
+
+ Signed-off-by: Nicolas Dufresne <nicolas.dufresne@collabora.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 6 23:06:45 2017 +0200
+
+ tests: added check for PSK client callback in RSA-PSK
+
+ This check verifies whether gnutls_psk_client_credentials_function
+ is operational, and the parameters sent are taken into account
+ by the server.
+
+ Relates !364
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 6 22:47:32 2017 +0200
+
+ tests: simplified name of mini-rsa-psk check
+
+ In addition modernize the used APIs and added explicit check
+ on the received by the server username value.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 5 14:31:30 2017 +0200
+
+ tests: utilize the email_protection_key template option
+
+ This ensures that generated certificates and requests will
+ include that key purpose when the option is present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 5 14:21:13 2017 +0200
+
+ certtool: introduced the email_protection_key option
+
+ This option was introduced in documentation for certtool without
+ an implementation of it. It is a shortcut for option
+ key_purpose_oid = 1.3.6.1.5.5.7.3.4
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Mon May 1 19:20:38 2017 +0200
+
+ gnutls-cli: Use CRLF with --starttls-proto=smtp.
+
+ Closes https://gitlab.com/gnutls/gnutls/issues/200
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 1 01:43:40 2017 +0200
+
+ doc: remove libidn from instructions and add libidn2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 1 00:59:12 2017 +0200
+
+ doc: update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 1 00:26:47 2017 +0200
+
+ added newline in debug messages [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 20:13:11 2017 +0200
+
+ Removed support for libidn1
+
+ Currently we support both IDNA2003 and IDNA2008. However, IDNA2003
+ is already obsolete by registrars and NICs, thus there is no reason
+ to continue supporting it. We switch to IDNA2008 exclusively using libidn2.
+
+ Resolves #194
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 1 12:44:46 2017 +0200
+
+ updated minitasn1
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 1 12:42:57 2017 +0200
+
+ gnutls.h: introduced GNUTLS_E_ASN1_TIME_ERROR
+
+ This corresponds to libtasn1 ASN1_TIME_ENCODING_ERROR and
+ indicates an error in the DER or BER encoding of time field.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 30 13:25:16 2017 +0200
+
+ gnutls_pkcs12_simple_parse: set to null vars after deinitialization
+
+ This avoids having the variables being deinitialized twice during
+ cleanup.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 30 12:52:51 2017 +0200
+
+ tests: enhance with checks to verify that textual IPs are not matched
+
+ That verifies that the hostname check verification function will
+ not succeed if given textual IPs, and the certificate contains
+ textual IPs in DNSname or in the CN fields.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 29 13:30:50 2017 +0200
+
+ gnutls_x509_crt_check_hostname2: no match dns fields against IPs
+
+ Previously we were checking textual IP address matching against
+ the DNS fields. This match was non-standard and was intended to
+ work around few broken servers. However that also led to not
+ evaluating and IP constraints for that IP. No longer follow that
+ broken behavior.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 30 12:45:19 2017 +0200
+
+ tests: check against symbols present only in IDNA2003
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 29 14:00:24 2017 +0200
+
+ gnutls_idna_map: fallback to IDNA2008 transitional encoding on failure
+
+ This aligns with the behavior of firefox, which maps to IDNA2008, and
+ fallbacks to IDNA2003 if that fails (e.g., mapping doesn't exist).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 28 23:12:19 2017 +0200
+
+ fuzz: fix leaks in PKCS#12 fuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 28 22:46:48 2017 +0200
+
+ pkcs12: release CRL data on error path
+
+ This addresses issue:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1295
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 12:01:25 2017 +0200
+
+ doc: added gnutls_ext_flags_t enumeration
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 11:55:10 2017 +0200
+
+ _gnutls_base64_decode: corrected leak on decoding error
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 11:08:47 2017 +0200
+
+ tests: fixed expected error code in base64 check
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 15:15:27 2017 +0200
+
+ certtool: ensure no leaks on pkcs12_info() error paths
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 11:02:01 2017 +0200
+
+ tests: added reproducer for mem leak in PKCS#12 decoding
+
+ This relates to:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1173
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 10:59:58 2017 +0200
+
+ pkcs12: eliminate mem leaks in _pkcs12_decode_safe_contents
+
+ This makes sure we deinitialize previously available elements.
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1173
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 10:48:46 2017 +0200
+
+ cleanups in _pkcs12_decode_safe_contents
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 10:36:22 2017 +0200
+
+ pkcs12: clean ups in PKCS#12 parsing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 24 14:16:24 2017 +0200
+
+ Added explicit check for the bounds of the generated 'd'.
+
+ This is according to FIPS186-4 sec. B.3.1.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 24 13:06:45 2017 +0200
+
+ fips140-2: enhanced check of generated parameters
+
+ That is, replaced all assert() calls with if statements to allow
+ gracefull fail.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 24 13:11:04 2017 +0200
+
+ dsa-fips.h: include nettle/bignum.h to allow compilation under nettle-mini
+
+ Relates #197
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 25 09:50:08 2017 +0200
+
+ tests: added base64 reproducer of mem leak
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 24 13:28:39 2017 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 23 11:54:38 2017 +0200
+
+ gnutls.h: introduced flag GNUTLS_EXT_FLAG_OVERRIDE_INTERNAL [ci skip]
+
+ This flag is expected to be used by applications which handle
+ custom extensions that are not currently supported in gnutls, but
+ support for them may be added in the future.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 21 09:28:47 2017 +0200
+
+ _gnutls_base64_decode: addressed memory leak in decoding
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 21 09:19:56 2017 +0200
+
+ gnutls_pem_base64_decode: allow decoding raw base64 data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 21 09:14:18 2017 +0200
+
+ tests: check whether gnutls_pem_base64_decode2 decodes with null argument
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 21 09:12:51 2017 +0200
+
+ Revert "gnutls_pem_base64_decode: allow decoding raw base64 data"
+
+ This reverts commit fa86fc6892d6551340f24da6a6af4f484a62b884.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 20 16:34:56 2017 +0200
+
+ doc: clarifications on custom thread override [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 20 14:03:39 2017 +0200
+
+ fuzz: added PEM base64 decoder and encoder fuzzers [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 19 20:04:59 2017 +0200
+
+ fuzz: openpgp fuzzer always succeeds when no support is present [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 14 01:18:56 2017 +0300
+
+ lib/system/fastopen: simplified TCP fast open for OSX
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Apr 10 12:39:46 2017 +0200
+
+ lib/system/fastopen: Add TCP Fast Open for OSX
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:37:28 2017 +0200
+
+ doc: removed incorrect comment
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 17:02:35 2017 +0200
+
+ gnutls_dh_get_pubkey: fixed operation under PSK authentication
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:15:36 2017 +0200
+
+ tests: test gnutls_dh_get_pubkey in PSK auth
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:33:09 2017 +0200
+
+ tests: combined and enhanced DH params tests
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:25:49 2017 +0200
+
+ tests: added DH parameter check in X.509 auth
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:18:26 2017 +0200
+
+ tests: added basic test on gnutls_dh_params_cpy
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:14:06 2017 +0200
+
+ tests: test gnutls_dh_get_pubkey in anonymous auth
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 16:15:46 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 8 15:50:16 2017 +0200
+
+ tests: added basic unit test on gnutls_random_art()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 22:51:09 2017 +0200
+
+ doc: fixed documentation for various function parameters
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 22:37:54 2017 +0200
+
+ .gitlab-ci.yml: removed the coverage run under pkcs11 trust store
+
+ It was causing inaccurate total coverage numbers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 16:56:06 2017 +0200
+
+ .gitlab-ci.yml: added runs under the PKCS#11 trust store in fedora
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 16:51:46 2017 +0200
+
+ tests: use gnutls_global_init instead of global_init
+
+ The reason is to force initialization of the PKCS#11 backend,
+ and thus support for any PKCS#11 trust store when setup.
+ This fixes running the test suite in Fedora.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:42:10 2017 +0200
+
+ tests: added checks with certificates that contain invalid time field
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:33:29 2017 +0200
+
+ x509/time: reject invalid dates in local mktime()
+
+ Resolves #135
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:25:34 2017 +0200
+
+ certtool: added newline in error message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:09:31 2017 +0200
+
+ tests: added basic check for systemkey tool
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:05:45 2017 +0200
+
+ systemkey: improved error message on unsupported systems
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 14:00:41 2017 +0200
+
+ tests: enhanced tofu trustdb checks
+
+ Include checks which store and load commitments from the user's home
+ directory.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 10:35:33 2017 +0200
+
+ tests: do not run pkgconfig test in systems with invalid libidn flags
+
+ This prevents our test from failing, due to invalid flags found in
+ a dependency of ours.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 13:30:16 2017 +0200
+
+ doc: fixed tpmtool and psktool documentation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 09:39:50 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 09:38:45 2017 +0200
+
+ tests: added unit tests for the base64 raw decoding functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 09:37:10 2017 +0200
+
+ gnutls_pem_base64_decode: allow decoding raw base64 data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 09:26:01 2017 +0200
+
+ x509/output: do not print usage entry when there is none
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 09:21:19 2017 +0200
+
+ certtool: improved printing of the key PIN and key ID
+
+ That is, on private keys use the same format when printing
+ the public Key ID and public key PIN, as when printing it
+ in certificates.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 6 18:34:56 2017 +0200
+
+ .gitlab-ci.yml: fixed freebsd build project restriction
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 6 18:18:02 2017 +0200
+
+ certtool: print the key PIN on private and public keys
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 6 18:09:14 2017 +0200
+
+ gnutls_pem_base64_encode2: do raw base64 when msg is NULL
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 7 08:33:54 2017 +0200
+
+ .gitlab-ci.yml: simplified CI setup
+
+ This makes builds independent by reducing interactions between
+ artifacts of builds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 6 11:53:33 2017 +0200
+
+ fuzz: do not enable the openpgp fuzzer when openpgp is disabled
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 14:50:43 2017 +0200
+
+ serv: fixed carriage return stripping in strip()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 14:47:30 2017 +0200
+
+ Mark with (void) the remove() function and other unchecked functions
+
+ This allows static analysers to properly warn on unchecked return values.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 14:29:16 2017 +0200
+
+ gnutls-cli: fixed minor coverity identified issues
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 14:26:52 2017 +0200
+
+ certtool: fixed newline skip code in smime-to-p7 code
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 14:12:03 2017 +0200
+
+ tests: added unit test for the certtool smime conversion functionality
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:41:36 2017 +0200
+
+ certtool: fixed minor issues pointed out by coverity
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:38:06 2017 +0200
+
+ gnutls-cli: better resource management in benchmark cmd
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:30:22 2017 +0200
+
+ is_level_acceptable: ensure issuer is not dereferenced when null
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:25:08 2017 +0200
+
+ certtool: guard the value of tl before gnutls_pkcs7_verify
+
+ This utilizes assert() as it cannot be triggered in practice.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:20:44 2017 +0200
+
+ Avoid using ASN1_MAX_NAME_SIZE directly
+
+ Since ASN1_MAX_NAME_SIZE refers to a single element in the asn1
+ tree, it is not suitable to hold the maximum combined name. Instead
+ use a local definition of MAX_NAME_SIZE, which is a multiple of
+ the ASN1_MAX_NAME_SIZE.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:15:38 2017 +0200
+
+ gnutls_x509_crq_set_challenge_password: don't accept null password
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:13:26 2017 +0200
+
+ Mark with (void) the functions where the returned value is not checked intentionally
+
+ This allows static analysers to properly warn on unchecked return values.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 13:08:11 2017 +0200
+
+ removed duplicate code
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 12:47:03 2017 +0200
+
+ handshake/record: mark with comments all expected fall-through switches
+
+ This reduces warnings from static analysers like coverity and makes
+ explicit the intention.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 12:42:18 2017 +0200
+
+ gnutlsxx.cpp: fixed misleading indentation issues
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 12:39:23 2017 +0200
+
+ doc: document intended fallthrough
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 12:36:52 2017 +0200
+
+ tests: fixed possible buffer overflow to avoid spurious complaints
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 12:34:56 2017 +0200
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 11:54:45 2017 +0200
+
+ x509.h: added macro for inhibit any policy
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 11:50:29 2017 +0200
+
+ NEWS: updated
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 10:24:17 2017 +0200
+
+ doc: documented the inhibit any policy extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 11:08:09 2017 +0200
+
+ tests: added PKCS#12 unit test with AES file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 16:36:48 2017 +0200
+
+ tests: added unit test for inhibit anypolicy generation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 15:36:47 2017 +0200
+
+ supported_exts: inhibit anypolicy is listed as supported
+
+ Since we don't support certificate verification based on policies,
+ we make sure we do not reject any certificates based on the inhibit
+ any policy extension being present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 16:27:34 2017 +0200
+
+ certtool: added template option inhibit_anypolicy_skip_certs
+
+ This option writes the inhibit anyPolicy option in a certificate.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 16:25:47 2017 +0200
+
+ x509: output the inhibit anyPolicy value
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 10:29:32 2017 +0200
+
+ documented the GNUTLS_X509_OID_POLICY_ANY macro
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 16:03:34 2017 +0200
+
+ x509: added function to set and retrieve inhibit anypolicy extension value
+
+ That is, introduced:
+ * gnutls_x509_crt_get_inhibit_anypolicy
+ * gnutls_x509_crt_set_inhibit_anypolicy
+
+ Resolves #180
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 15:53:05 2017 +0200
+
+ _gnutls_x509_write_uint32: ensure we prepend leading zero when writing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 15:46:45 2017 +0200
+
+ Added helper functions to parse the inhibit anyPolicy X.509 extension
+
+ That introduces:
+ * gnutls_x509_ext_export_inhibit_anypolicy
+ * gnutls_x509_ext_import_inhibit_anypolicy
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 15:22:06 2017 +0200
+
+ tests: added unit test for PKCS#12 with file that uses PBES1 with no salt
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 6 05:14:25 2017 +0200
+
+ tests: added basic check for system trust store
+
+ This checks whether the gnutls_certificate_set_x509_system_trust()
+ and thus the trust list equivalent function operate as expected
+ and return a positive number of certificates. The test is ignored
+ in systems where these functions return GNUTLS_E_UNIMPLEMENTED_FEATURE.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: David Caldwell <david@porkrind.org>
+Date: Tue Apr 4 21:29:55 2017 -0700
+
+ gnutls_x509_trust_list_add_system_trust: Add macOS keychain support
+
+ Also don't check for a default_trust_store_file in configure when building on
+ macOS (unless explicitly asked to with --with-default-trust-store-file=xxx),
+ because otherwise it finds /etc/ssl/cert.pem: This file is new (since
+ 10.12.2?), which means libraries built on the newest OS version wouldn't work
+ the same way on an older versions (and vice versa). "/etc/ssl/cert.pem" also
+ doesn't seem to reflect additions and deletions from the user's or system's
+ trusted roots keychain (in my limited testing).
+
+ Signed-off-by: David Caldwell <david@porkrind.org>
+
+Author: David Caldwell <david@porkrind.org>
+Date: Wed Apr 5 11:15:45 2017 -0700
+
+ Rename uint64 to gnutls_uint64 to avoid conflict with macOS
+
+ Signed-off-by: David Caldwell <david@porkrind.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 10:11:01 2017 +0200
+
+ mpi: openpgp integer scanning was put into conditional
+
+ That is, no longer include that code when compiling without openpgp
+ support.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 29 12:38:34 2017 +0200
+
+ Moved all openpgp-related variables and definitions into ifdef blocks
+
+ This allows compilation with -Werror even if openpgp is disabled.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 29 09:55:36 2017 +0200
+
+ OpenPGP authentication is disabled by default
+
+ The flag --enable-openpgp-authenticationcan be used to revert
+ this change.
+
+ Resolves #178
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 08:50:53 2017 +0200
+
+ tools: remove outfile when exited on error
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 08:32:48 2017 +0200
+
+ certtool: added examples on verifying certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 5 08:12:17 2017 +0200
+
+ certtool: improved documentation
+
+ Incorporated comments made in Lenka Horakova's thesis study.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 15:22:06 2017 +0200
+
+ tests: added unit test for PKCS#12 with file that uses PBES1 with no salt
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 11:28:27 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 12:52:14 2017 +0200
+
+ tests: add unit test for PKCS#12 with file that uses SHA512 for MAC
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 12:11:27 2017 +0200
+
+ pkcs12: increased the maximum salt size
+
+ This accomodates for files which have salt sizes up to 256 bytes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 12:01:15 2017 +0200
+
+ _gnutls_pkcs12_string_to_key: allow SHA384 and SHA512
+
+ The previous implementation of the function was restricted to SHA1 and
+ SHA256. Extended to allow SHA384 and SHA512 as well.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 11:25:22 2017 +0200
+
+ PKCS#12: added support for files with zero salt length in MAC
+
+ Resolves #191
+ Resolves #190
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 11:19:23 2017 +0200
+
+ tests: added unit test for PKCS#12 with file with no salt in MAC
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 3 09:44:43 2017 +0200
+
+ tests: verify that the encryption OID is printed
+
+ That is, verify whether certtool --p12-info will print the
+ actual encryption OID on unsupported files, rather than the
+ generic PBES2 algorithm.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 3 09:35:31 2017 +0200
+
+ gnutls_pkcs8_info: return the encryption algorithm OID on failure
+
+ When failing to import a structure due to an unsupported encryption
+ algorithm OID, return the unsupported OID instead of the generic
+ PBES2 OID.
+
+ Resolves: #193
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 4 10:26:43 2017 +0200
+
+ gnutls_transport_set_pull_timeout_function: doc update [ci skip]
+
+ Clarified when this function should be set. Based on suggestion by
+ Sean Greenslade.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Apr 2 17:56:15 2017 +0200
+
+ Use NORMAL priority for SSLv23_*_method.
+
+ Instead of enforcing TLS1.0/SSL3.0 use gnutls NORMAL priority for
+ SSLv23_*_methods.
+
+ http://bugs.debian.org/857436
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 2 15:14:41 2017 +0200
+
+ .gitlab-ci.yml: renamed dist build to doc-dist
+
+ This better describes the name of the build.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 2 15:12:44 2017 +0200
+
+ .gitlab-ci.yml: combined minimal and no-tools builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 2 15:07:05 2017 +0200
+
+ .gitlab-ci.yml: combined static analyser runs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 1 23:40:12 2017 +0200
+
+ .gitlab-ci.yml: reduced builds and stages
+
+ That is an improvement to run the CI faster.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 30 20:56:01 2017 +0200
+
+ tests: added unit test for gnutls_priority_get_cipher_suite_index
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 31 20:33:49 2017 +0200
+
+ gnutls-cli: eliminate leak on --list option
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 29 18:52:48 2017 +0200
+
+ gnutls_priority_get_cipher_suite_index: fixed returned protocols
+
+ That is no longer return indexes for ciphersuites which would not have
+ been available due to TLS version mismatch in the priorities cache.
+
+ Resolves #146
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Matt Turner <mattst88@gmail.com>
+Date: Fri Mar 31 13:45:04 2017 -0700
+
+ tests: Copy template out of ${srcdir}
+
+ Otherwise, out of tree builds will fail to copy the template.
+
+ Signed-off-by: Matt Turner <mattst88@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 31 20:56:04 2017 +0200
+
+ gnutls_cipher_get_tag_size: document behavior on non-AEAD ciphers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 31 20:53:19 2017 +0200
+
+ doc: make a note that parts of the crypto API are in Core API
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 31 16:27:03 2017 +0200
+
+ tests: added checks with problematic PKCS#12 files
+
+ These check whether parsing of unsupported files (e.g., with RC2-128),
+ will succeed. This serves as functionality check for gnutls_pkcs8_info.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 31 16:17:07 2017 +0200
+
+ gnutls_pkcs8_info: do not free oid on GNUTLS_E_UNKNOWN_CIPHER_TYPE
+
+ The documented behavior of the function was to return a valid
+ OID in that case.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 30 19:58:22 2017 +0200
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 29 14:08:26 2017 +0200
+
+ Makefile.am: dropped .clcopying from dist files [ci skip]
+
+ It is no longer being used.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 29 10:40:31 2017 +0200
+
+ Simplified the generation of ChangeLog [ci skip]
+
+ Removed the dependency on git2cl and utilize git log directly.
+ git2cl seems to provide incorrect output.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 28 09:05:38 2017 +0200
+
+ tests: added global locks on tls-fuzzer tests
+
+ They both require access to the same port and thus cannot
+ be run in parallel.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 28 09:01:25 2017 +0200
+
+ cert: ensure that there are no leftovers in certificate msg
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 28 08:58:29 2017 +0200
+
+ testsuite: added tlsfuzzer certificate requiring tests
+
+ This enhances the testsuite by running all the tlsfuzzer
+ fuzzer tests which require certificates from server.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 28 08:40:32 2017 +0200
+
+ alert: return GNUTLS_A_BAD_CERTIFICATE on GNUTLS_E_PK_SIG_VERIFY_FAILED
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 28 09:28:44 2017 +0200
+
+ fuzz: updated pkcs12 corpus
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 27 17:40:23 2017 +0200
+
+ fuzz: added PKCS#12 file parser fuzzer
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 27 17:28:08 2017 +0200
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 26 13:46:45 2017 +0200
+
+ ocsp-test: disable under windows
+
+ This test was failing because datefudge couldn't run under win32.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 26 13:45:37 2017 +0200
+
+ Revert "ocsp-test: disable under windows"
+
+ This reverts commit 90d5ad5a42759957866ba1d9c96f5dccfd3ea1cc.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 26 10:10:02 2017 +0200
+
+ .travis.yml: no longer install pkg-config
+
+ Travis build seem to fail for some reason since pkg-config is already
+ installed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 26 10:07:13 2017 +0200
+
+ ocsp-test: disable under windows
+
+ This test was failing because datefudge couldn't run under win32.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 25 21:48:46 2017 +0100
+
+ .gitlab-ci.yml: increase time of artifact expiration
+
+ This allows to re-run failed builds on the depending stages
+ during that time.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 25 21:44:53 2017 +0100
+
+ gnutls.pc: Removed P11_KIT_LIBS from Libs.private
+
+ It was already being included in Requires.private. Reported
+ by Andreas Metzler.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 23 08:03:52 2017 +0100
+
+ gnutls.pc: don't include zlib twice in private libs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 23 11:39:34 2017 +0100
+
+ tests: create-chain.sh: do not explicitly set serial
+
+ We were previously exporting certificates with serial number being
+ zero, which is not allowed by RFC5280.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 23 11:34:07 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 22 09:39:12 2017 +0100
+
+ tests: added mini-x509-ipaddr
+
+ This is a unit test for GNUTLS_DT_IP_ADDRESS as used in
+ gnutls_certificate_verify_peers().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 22 09:00:09 2017 +0100
+
+ Introduced GNUTLS_DT_IP_ADDRESS
+
+ This allows verifying an IP address using gnutls_certificate_verify_peers()
+ or gnutls_x509_trust_list_verify_crt2().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 12:19:35 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 15:04:50 2017 +0100
+
+ tests: check whether we fallback to CN unconditionally
+
+ This is a unit test for:
+ "gnutls_x509_crt_check_hostname2: do not fallback to CN unconditionally"
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 15:01:12 2017 +0100
+
+ gnutls_x509_crt_check_hostname2: do not fallback to CN unconditionally
+
+ Do not fallback to checking the CN of a certificate for a hostname
+ if supported names such as IP addresses were found in gnutls_x509_crt_check_hostname2().
+ This behavioral change is in order to satisfy the RFC6125 requirement
+ of not falling back to CN in that case. Reported by Suphannee Sivakorn.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 14:50:10 2017 +0100
+
+ tests: added unit test of GNUTLS_VERIFY_DO_NOT_ALLOW_IP_MATCHES
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 14:43:36 2017 +0100
+
+ Introduced verification flag GNUTLS_VERIFY_DO_NOT_ALLOW_IP_MATCHES
+
+ This flag when provided to the gnutls_x509_crt_check_hostname2() function
+ (and its callers), will prevent IP matching of the subject alternative
+ name. This can be utilized by applications which directly check for
+ IP addresses using gnutls_x509_crt_check_ip().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 14:37:21 2017 +0100
+
+ updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 11:38:19 2017 +0100
+
+ tests: added unit test for gnutls_x509_crt_check_ip
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 10:07:37 2017 +0100
+
+ Added gnutls_x509_crt_check_ip()
+
+ This function allows to directly verify IP addresses on a certificate.
+ That is a first step towards making gnutls_x509_crt_check_hostname2()
+ not verify IP addresses.
+
+ Based on discussion and suggestion by Suphannee Sivakorn. See
+ https://lists.gnupg.org/pipermail/gnutls-devel/2017-March/008368.html
+
+ Relates #185
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 14:07:22 2017 +0100
+
+ tests: added unit test of gnutls_pubkey_verify_data2 override flags
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 13:47:09 2017 +0100
+
+ tests: keygen -> privkey-keygen
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 13:20:02 2017 +0100
+
+ _gnutls_check_key_cert_match: allow broken sigs
+
+ That ensures that when loading a certificate pair with SHA1, when
+ SHA1 is disabled will not cause the server to fail to load.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 13:14:24 2017 +0100
+
+ .gitignore: more files to ignore
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 13:12:07 2017 +0100
+
+ Use a common function to decide acceptable signatures
+
+ That is, ensure that results from all verification functions,
+ including gnutls_pubkey_verify_data2(), will be consistent with
+ SHA1 and other algorithms deprecation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 13:01:51 2017 +0100
+
+ check_ocsp_response: utilize the same flags as in certificate verification
+
+ That ensures that overrides like using broken algorithms are considered
+ in OCSP validation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 14:34:37 2017 +0100
+
+ extensions: print the name/type of any unexpected extension
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 18 18:12:55 2017 +0100
+
+ tests: added script to check pkg-config operation
+
+ That is, whether the generated gnutls.pc will function for
+ compiling and linking.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 18 17:56:42 2017 +0100
+
+ gnutls.pc: don't pass the libtool vars to Libs.private
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 10:11:54 2017 +0100
+
+ tests: improved tls-rehandshake tests
+
+ Used common definitions from cert-common.h for certificates,
+ and improved error detection in tls-rehandshake-cert-2.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 09:42:59 2017 +0100
+
+ tests: check whether a rehandshake without a cert works
+
+ That is, check whether if on initial handshake the server requests
+ a certificate, but on the following rehandshake he doesn't, whether
+ the client behaves as expected. This tests:
+ 1f685db853db6e48c77c6dbde0cdf716a7303baa
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 09:36:18 2017 +0100
+
+ handshake: reset cert request state on handshake init
+
+ That addresses a bug which on client side on case of an initial
+ handshake with a client certificate, we continue to send this
+ certificate even if on rehandshake we were not requested with on.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 21 07:59:37 2017 +0100
+
+ Revert "nettle/rnd: use gettime() instead of gnutls_time()"
+
+ This reverts commit c4842a21f65c7fc9a27932eb1792b1fc9e65f722.
+ The time() syscall is also implemented as syscall() and is in
+ fact performing better than gettime().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 20 23:00:06 2017 +0100
+
+ README.md: corrected typo [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 20 16:31:42 2017 +0100
+
+ nettle/rnd: use gettime() instead of gnutls_time()
+
+ The gnulib gettime() maps to gettimeofday() or clock_gettime()
+ which are both implemented as fast system calls - see vdso(7)-
+ and as such are available without a switch to kernel mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 20 13:29:42 2017 +0100
+
+ doc: updated RNG documentation to reflect the previous changes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 20 13:23:39 2017 +0100
+
+ nettle/rnd: re-seed both key and nonce levels based on time
+
+ The time(0) is quite cheap on modern operating systems, and thus we
+ can rely on it to provide improved assurance in the output randomness.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 20 13:13:11 2017 +0100
+
+ nettle/pk: use nonce level for RSA padding
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 18 19:26:02 2017 +0100
+
+ README.md: corrected link for coverage in master [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Fri Mar 17 23:33:01 2017 +0200
+
+ Avoid deprecation warnings when including gnutls/abstract.h
+
+ Since ac3de8f5, when all openpgp functionality was deprecated, a
+ library user including gnutls/abstract.h gets warnings about
+ deprecated declarations, like this:
+
+ gnutls/openpgp.h:328:10: warning: ‘gnutls_openpgp_recv_key_func’ is deprecated [-Wdeprecated-declarations]
+ gnutls_openpgp_recv_key_func func) _GNUTLS_GCC_ATTR_DEPRECATED;
+
+ This warning is emitted since the gnutls_openpgp_set_recv_key_function
+ prototype uses the deprecated typedef gnutls_openpgp_recv_key_func.
+
+ By omitting the deprecation attribute from this individual
+ typedef, we avoid the spurious warnings in calling code which just
+ includes gnutls/abstract.h without actually using anything related
+ to openpgp.
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 17 10:47:33 2017 +0100
+
+ gnutls.h: added definitions to obtain the maximum element in several enumerations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 14:29:10 2017 +0100
+
+ tests: added basic unit tests for several string functions of libs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 09:44:55 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 22:51:57 2017 +0100
+
+ tests: certtool-crl-decoding: ignore lines warning about SHA1 deprecation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 17:17:32 2017 +0100
+
+ tests: check the flag GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1
+
+ In addition verify whether the GNUTLS_VERIFY_ALLOW_BROKEN flag
+ works when MD5 is present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 17:13:48 2017 +0100
+
+ Introduced flag GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1
+
+ This allows performing a verification with only SHA1 allowed
+ from the broken algorithms. This can be used to fine-tune
+ verification in case default verification fails, to detect
+ whether the failed algorithm was SHA1.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 17:06:47 2017 +0100
+
+ Introduced the %VERIFY_ALLOW_BROKEN priority string option
+
+ This allows enabling broken signature algorithms in certificate verification.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 17:00:22 2017 +0100
+
+ Allow reverting the SHA1 ban as a signature algorithm
+
+ This allows distributors to decide not to ban SHA1. This
+ option may be removed in the future.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 12:36:46 2017 +0100
+
+ p11tool: test-sign operation using SHA256 instead of SHA1
+
+ This avoids the errors returned from the verification functions due to
+ SHA1 usage.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 09:42:26 2017 +0100
+
+ tests: updated to account SHA1 move to broken set
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 08:35:34 2017 +0100
+
+ algorithms: tag SHA1 as insecure algorithm
+
+ Although SHA1 was considered to be risky to use the past few years,
+ there has been no demonstration of breakage. As of 2017-2-23 there has
+ been a demonstrated collision in SHA1, and even though the attack was
+ a costly one, it provided the incentive to should move SHA1 into
+ the broken hashes list together with MD5 and MD2.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 14:02:05 2017 +0100
+
+ README.md: updated coverage links [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 08:25:52 2017 +0100
+
+ tests: removed unneeded ifdef in tlsext-decoding.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 16 09:04:24 2017 +0100
+
+ doc: updated RNG design
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 15 14:21:43 2017 +0100
+
+ nettle/rnd: introduced time limit for key generator
+
+ That is, force re-key of the KEY and RANDOM PRNG after 2 hours
+ of operation, irrespective of the amount of data having been output.
+ At the same time, increase limits for key and nonce generators,
+ to prevent a large amount of system calls in busy servers.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 15 15:11:14 2017 +0100
+
+ _gnutls_pk_generate_keys: separate between ephemeral and long-term keys
+
+ That allows using the faster generator for ephemeral keys.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 15 14:46:54 2017 +0100
+
+ nettle/pk: use the nonce level for digital signatures
+
+ That is, we do not really require high quality secret data for the generation
+ of signatures. A better approach would be to switch to predictable signatures (RFC6979).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 15 22:06:59 2017 +0100
+
+ .gitlab-ci.yml: limit submodule update to avoid fetch
+
+ This should reduce both the bandwidth and the time of the fetch.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Martin Storsjo <martin@martin.st>
+Date: Wed Mar 15 23:32:12 2017 +0200
+
+ Fix a typo in a variable name in an m4 script
+
+ Signed-off-by: Martin Storsjo <martin@martin.st>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Mar 14 19:27:49 2017 +0200
+
+ build: disable valgrind tests by default
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 15 05:17:37 2017 +0100
+
+ .gitlab-ci.yml: ubsan build utilizes -Werror for the library
+
+ That brings back the -Werror for building, after its removal from
+ clang-analyzer build.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 14 16:43:34 2017 +0100
+
+ .gitlab-ci.yml: remove -Werror compilation from scan-build
+
+ When we pass '--status-bugs' to the command in combination with
+ '-Werror' in CFLAGS it has the following side effects. In a failed
+ due to Werror build, scan-build fails to find any issues, and
+ marks the run as successfully completed. Hence, removes the -Werror
+ from clang-analyzer.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Mar 13 20:47:02 2017 +0200
+
+ build: tests: resolve as-needed issue with seccomp
+
+ Incorrect ordering of -lseccomp:
+ <snip>
+ -Wl,--as-needed ../lib/.libs/libgnutls.so -lseccomp ./.libs/libutils.a
+ ./.libs/libutils.a(seccomp.o): In function seccomp_init'
+ seccomp.c:(.text+0x2b): undefined reference to `seccomp_init'
+ <snip>
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 23:27:14 2017 +0100
+
+ fuzz: Corrected default options in fuzz scripts [ci skip]
+
+ This change assumes that afl-fuzz (and not libfuzzer) will be used
+ by default.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 20:13:49 2017 +0100
+
+ gnutls_pkcs11_privkey_init: document limitation on created object [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 15:21:40 2017 +0100
+
+ pkcs11: re-open privkey session handle on CKR_SESSION_HANDLE_INVALID
+
+ When initializing a private key operation, attempt to re-open the key
+ if CKR_SESSION_HANDLE_INVALID is received.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 15:15:31 2017 +0100
+
+ tests: pkcs11-mock lib: check object session sanity prior to using it
+
+ This avoids crashes when the object is used after a fork but prior
+ to the session being re-established.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 11:21:50 2017 +0100
+
+ tests: added an OCSP response parsing coverage test
+
+ This inputs a large set of valid and invalid OCSP files
+ in the OCSP parser with the intention to stress test its
+ error checking, and prevent regressions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 08:14:32 2017 +0100
+
+ tests: added a certificate parsing coverage test
+
+ This inputs a large set of valid and invalid certificates in
+ the certificate parser with the intention to stress test its
+ error checking, and prevent regressions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:39:03 2017 +0100
+
+ .gitignore: more files to ignore
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:33:29 2017 +0100
+
+ tests: added unit tests for gnutls_pkcs11_token_get_mechanism
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:28:25 2017 +0100
+
+ tests: included unit test for gnutls_pkcs11_obj_export
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:23:37 2017 +0100
+
+ tests: added unit test for gnutls_pkcs11_reinit()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:17:42 2017 +0100
+
+ tests: added unit tests for gnutls_pkcs11_obj_get_info
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:17:07 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 13 09:14:15 2017 +0100
+
+ gnutls_pkcs11_obj_get_info: don't include the terminator into output size
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Mar 13 11:32:07 2017 +0200
+
+ tests: cert-tests: openpgp-certs: align test redirection
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Mar 13 10:45:08 2017 +0200
+
+ tests: suppressions.valgrind: supress fillin_rpath
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon Mar 13 11:30:41 2017 +0200
+
+ tests: remove unused suppressions.valgrind
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 12 14:48:19 2017 +0100
+
+ lib: unconditionally enable the self-check functions
+
+ These functions were previously made available only in FIPS140-2
+ mode. Enabling them unconditionally allows applications to directly
+ utilize that functionality for testing the gnutls library.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 12 14:43:00 2017 +0100
+
+ tests: added unit test for gnutls_pkcs11_get_pin_function
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 12 14:29:14 2017 +0100
+
+ tests: moved ocsp-tests to main directory
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 10 17:37:10 2017 +0100
+
+ pkcs11: re-open private key session inside a locked section
+
+ This prevents clashes when the same operation is carried in other
+ threads.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 10 17:12:50 2017 +0100
+
+ pkcs11: introduced locks to PKCS#11 private key structure
+
+ This allows to run PKCS#11 private key operations such as signing
+ and decryption in parallel.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 10 17:04:20 2017 +0100
+
+ tests: introduced check for parallel operation (signatures) in PKCS#11 mode
+
+ That is, verify that parallel signatures using a single gnutls_pkcs11_privkey_t
+ context work.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Mar 12 15:05:41 2017 +0200
+
+ tests: scripts: suppress which errors
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 11 12:08:21 2017 +0100
+
+ pkcs11: during scan, leave the provider loop asap
+
+ This optimizes access when multiple provider modules are available,
+ by avoiding scanning irrelevant ones.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Sat Mar 11 10:28:50 2017 -0500
+
+ Do not attempt to parse a 32-bit integer if a packet is not 4 bytes.
+
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=824
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 15:50:24 2017 +0100
+
+ fuzz: document how to run AFL [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 10:57:28 2017 +0100
+
+ fuzz: added initial corpus for the OCSP request parser
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 17:09:59 2017 +0100
+
+ fuzz: added initial corpus for OCSP response parser
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 17:01:59 2017 +0100
+
+ fuzz: added OCSP structure parsers
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 16:51:39 2017 +0100
+
+ fuzz: increased minimized set of X.509 certificates
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 12:57:41 2017 +0100
+
+ PKCS8/PKCS12: enforce a maximum number of iterations
+
+ This prevents denial of service through very large iteration
+ counts. Issue found via oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=434
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Wed Mar 8 14:52:38 2017 -0500
+
+ Do not attempt to parse a 32-bit integer if a packet is not 4 bytes.
+
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=737
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 11:25:54 2017 +0100
+
+ Revert ".gitlab-ci.yml: include coverage statistics of FIPS140-2 code"
+
+ This reverts commit 603772688c4e37dae437b4cede12e25b9dd9f678.
+ The commit introduced a long wait for the coverage build without
+ and significant benefit (the extend of the FIPS140 code is limited
+ to have any impact on the overall coverage).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 9 10:52:59 2017 +0100
+
+ sysrng-linux: define _rnd_get_system_entropy unconditionally
+
+ This fixes compilation in systems without getrandom().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 16:00:02 2017 +0100
+
+ tests: dtls-stress: use X.509 certificates instead of openpgp
+
+ This will allow the test tool to operate even after openpgp certificates
+ are deprecated.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 22:52:31 2017 +0100
+
+ .gitlab-ci.yml: added build without openpgp support
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 11:32:31 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 22:36:16 2017 +0100
+
+ Added openpgp stub file
+
+ That allows disabling openpgp authentication and at the same time
+ retaining ABI compatibility with versions including openpgp.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 15:00:06 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 14:58:14 2017 +0100
+
+ tests: split PKCS#12 encoding from decoding tests
+
+ Enhanced PKCS#12 encoding tests, with the encoding of a file
+ which contains a cert, a key and a CRL.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 14:47:20 2017 +0100
+
+ tests: added PKCS#12 file decoding containing a CRL
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 14:40:15 2017 +0100
+
+ certtool: enhance to allow writing CRLs in PKCS#12 files
+
+ In addition fallback to DER when --load-crl fails importing a PEM
+ encoded CRL due to PEM issues.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 14:21:30 2017 +0100
+
+ tests: added CRL decoding unit tests using certtool
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 14:04:32 2017 +0100
+
+ tests: enhanced basic tests in CRL parsing
+
+ That tests gnutls_x509_crl_get_crt_serial().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 13:50:55 2017 +0100
+
+ Rewritten gnutls_x509_rdn_get() and gnutls_x509_rdn_get2()
+
+ The new code re-uses the gnutls_x509_dn APIs instead of re-implementing.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 13:43:36 2017 +0100
+
+ tests: added checks for the old DN decoding functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 22:39:20 2017 +0100
+
+ tests: do not run tests which require openpgp when it is disabled
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 22:47:55 2017 +0100
+
+ .gitlab-ci.yml: include coverage html output as artifact
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 13:22:59 2017 +0100
+
+ tests: x509-verify: print the keys on failure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 13:17:15 2017 +0100
+
+ gnutls_privkey_export_x509: doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 13:07:08 2017 +0100
+
+ tests: split sign-verify test to RSA and ECDSA parts
+
+ This allows parallelist and also helps identifying easier the
+ culprit on an error.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 11:52:25 2017 +0100
+
+ tests: adjusted for the removal of HMAC-MD5
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 11:48:28 2017 +0100
+
+ priority: do not enable HMAC-MD5 by default
+
+ While HMAC-MD5 is not yet broken, it is not used by any non-broken
+ or non-NULL ciphersuites (is only used with NULL and RC4), and as there
+ is not plan to introduce new ciphersuites with that MAC algorithm, there
+ is no point to include it in the default set of allowed algorithms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 23:10:43 2017 +0100
+
+ tests: converted FIPS140-2 mode checks in Makefiles to run-time in scripts
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 8 10:48:40 2017 +0100
+
+ gnutls.h: introduced GNUTLS_E_TLS_PACKET_DECODING_ERROR [ci skip]
+
+ This is an alias to GNUTLS_E_UNEXPECTED_PACKET_LENGTH. That
+ allows distinguishing the alert from GNUTLS_E_RECORD_OVERFLOW.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 21:53:51 2017 +0100
+
+ tests: crq: ignore lines for Security Level
+
+ This allows running the test under FIPS140-2 mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 21:39:12 2017 +0100
+
+ ax_code_coverage.m4: updated
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 23:21:33 2017 +0100
+
+ .gitlab-ci.yml: initialize submodules where needed (for tlsfuzzer run)
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 15:28:01 2017 +0100
+
+ .gitlab-ci.yml: include subdirs of suite/ in artifacts
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 23:11:39 2017 +0100
+
+ ext/signature: error on invalid extension format
+
+ That is, if an extension containing no signature algorithms is
+ encountered, treat that as an error. This is an RFC5246 requirement,
+ since the minimum "supported_signature_algorithms" length is 2.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 14:30:19 2017 +0100
+
+ _gnutls_proc_x509_server_crt: return GNUTLS_E_CERTIFICATE_ERROR on parsing error
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 14:21:45 2017 +0100
+
+ alert: GNUTLS_E_NO_CERTIFICATE_FOUND maps to GNUTLS_A_DECODE_ERROR
+
+ This is the closest to use alert when no certificate is found; at least
+ it is closer according to tlsfuzzer and rfc5246 text on insuficient_security
+ alert.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 13:51:33 2017 +0100
+
+ read_client_hello: use integer for extensions size
+
+ As we do not read the value directly, but rather assign to it
+ the remaining data, we ensure that there are no overflows if
+ we have additional data past the extensions field. The integer
+ can hold more than 2^24 which is the maximum handshake packet
+ size.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 16:33:57 2017 +0100
+
+ ext/signature: reject an extension with padded data
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 16:18:44 2017 +0100
+
+ ext/signature: reject an extension size of zero
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 15:58:19 2017 +0100
+
+ gnutls_record_recv: do not accept a client hello while handshake is in progress
+
+ That is, do not return GNUTLS_E_REHANDSHAKE, while we are within
+ a handshake process.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 15:16:59 2017 +0100
+
+ read_client_hello: fail early on illegally formatted message
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 2 17:57:57 2017 +0100
+
+ _gnutls_parse_extensions: do not fail on empty extensions field
+
+ On the other hand, fail if an empty extensions field is seen, but
+ the client hello contains data nevertheless, or if the extensions
+ field is padded with additional unaccounted data.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 2 17:53:55 2017 +0100
+
+ alert: GNUTLS_E_PK_INVALID_PUBKEY maps to GNUTLS_A_ILLEGAL_PARAMETER
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 2 17:48:31 2017 +0100
+
+ alerts: separated record overflow from decode error alerts
+
+ Introduced GNUTLS_E_RECORD_OVERFLOW.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 2 17:42:51 2017 +0100
+
+ auth: failures of _gnutls_mpi_init_scan_nz map to GNUTLS_E_RECEIVED_ILLEGAL_PARAMETER
+
+ That ensures that the right alert is send when illegal
+ parameters are received (e.g., zero length).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 11:49:45 2017 +0100
+
+ doc: updated tlsproxy to latest version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 14:17:18 2016 +0200
+
+ testsuite: added tlsfuzzer
+
+ This enhances the testsuite by running all the tlsfuzzer
+ fuzzer tests which require no certificates from server.
+
+ https://github.com/tomato42/tlsfuzzer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 07:55:10 2017 +0100
+
+ tests: converted compile-time checks for FIPS140 mode to run-time
+
+ This allows running the complete test suite even when the library
+ is compiled in FIPS140-2 mode, as long as the run-time is not at
+ this mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 07:39:20 2017 +0100
+
+ .gitlab-ci.yml: include coverage statistics of FIPS140-2 code
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 7 07:32:46 2017 +0100
+
+ .gitlab-ci.yml: include FIPS140-2 code into static analyzer runs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 22:35:41 2017 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 10:22:04 2017 +0100
+
+ nettle/rnd-fips: combined the FIPS-compliant generators to two
+
+ This brings the FIPS generators in par with the non-FIPS chacha-based ones.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 10:18:14 2017 +0100
+
+ nettle/rnd: use two random generators instead of 3
+
+ That combines the levels GNUTLS_RND_RANDOM and GNUTLS_RND_KEY, while
+ at the same time makes sure that backtracking is impossible on the
+ GNUTLS_RND_KEY level, by reinitializing the RNG after a call requesting
+ data for the GNUTLS_RND_KEY level.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 10:04:18 2017 +0100
+
+ doc: updated the PRNG documentation to utilize two PRNG instances
+
+ Also move the random generator discussion to internals section.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 11:37:39 2017 +0100
+
+ doc: document the state of PRNG in GnuTLS 3.6.0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 11:51:18 2017 +0100
+
+ nettle/pk: corrected call to gnutls_rnd() for rnd_nonce_func
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 26 20:07:41 2017 +0100
+
+ tests: decoupled the random generator operational tests from the forking ones
+
+ That also corrects the fact that not all tests were run for all generators,
+ and allows to run the tests in parallel.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 26 19:56:09 2017 +0100
+
+ nettle/rnd: specify different limits for rekey in PRNGs
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 26 19:20:16 2017 +0100
+
+ nettle/pk: use the GNUTLS_RND_RANDOM level for DH/DSA params
+
+ This are not long term keys and do not require the key level.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 26 19:16:32 2017 +0100
+
+ tests: added check to verify that including crypto.h is sufficient
+
+ That is, sufficient to use its functionality, and including additional
+ headers isn't necessary.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 26 19:11:51 2017 +0100
+
+ crypto.h: include gnutls.h to obtain required types
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 10:44:43 2017 +0100
+
+ rnd: reduce calls to _rnd_get_system_entropy
+
+ That is, no longer obtain the initial nonces for the RNG
+ via _rnd_get_system_entropy() but instead use time-based ones
+ which are typically faster kernel calls. This reduces the number
+ of expensive system calls done during thread and
+ process initialization.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 11:48:08 2017 +0100
+
+ rnd: when reseeding the generators use the next best generator
+
+ That is, use the RANDOM level to obtain keys to reseed the
+ NONCE level, and the KEY level to reseed the RANDOM. The KEY
+ level is reseeded using the system random generator.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 11:11:31 2017 +0100
+
+ tests: verify whether crypto operations fail
+
+ That is verify whether a signature operation will fail if
+ the library is in error state.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 11:05:48 2017 +0100
+
+ Added _gnutls_lib_force_operational
+
+ This allows recovering from _gnutls_lib_simulate_error() which in
+ turn allows more advanced tests. Not documented, and intended to
+ be an internal symbol only.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 10:56:44 2017 +0100
+
+ pk: always use _gnutls_switch_lib_state
+
+ This avoids relying on abort() for RNG errors in PK wrappers.
+ We use instead the library state originally added for FIPS140-2
+ support, and if the state indicates failure the operation will
+ fail.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 10:43:56 2017 +0100
+
+ rnd: switched to 3 chacha-based PRNGs for all security levels
+
+ Chacha was selected because it is already present in TLS protocol
+ as algorithm, meaning that re-using would improve CPU caching,
+ and it is a comparable in performance algorithm to the existing
+ PRNG used for nonces (salsa20). The yarrow generator was removed
+ because we are primarily seeding from system devices which are
+ sufficiently trustworthy to offload us from coping with the
+ handling of multiple sources of input. As such it allows
+ us to switch to a simpler PRNG such as a stream cipher like Chacha.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 19 10:40:44 2017 +0100
+
+ rnd: aligned type of data counter with input data type (size_t)
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 19 09:57:39 2017 +0100
+
+ random: keep global list of initialized contexts
+
+ This allows to properly deinitialize all random generator
+ contexts on library deinitialization.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 18 21:47:33 2017 +0100
+
+ rnd: removed call of _rnd_system_entropy_deinit on deinit
+
+ This was already being done in _gnutls_rnd_deinit().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 27 13:52:23 2017 +0100
+
+ Removed locks from internal rng
+
+ Also made the rng back-end to be thread-safe.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 27 10:21:56 2017 +0100
+
+ Use a thread local random generator.
+
+ This allows accessing the per-thread random generator in
+ a lock-free way, at the cost of additional memory per thread.
+ The default random generator imposes around 640 bytes per thread
+ on 64-bit architectures.
+
+ Resolves: #141
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 07:38:20 2017 +0100
+
+ Makefile.am: added missing file
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 6 06:58:29 2017 +0100
+
+ .gitlab-ci.yml: execute initialization stage unconditionally [ci skip]
+
+ This step is required both in tags and commit runs.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 5 18:22:04 2017 +0100
+
+ datum.h: documented behavior of datum functions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 5 18:17:36 2017 +0100
+
+ _gnutls_set_strdatum: always return an allocated string on success
+
+ That prevents returning NULL to functions which require a string.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Sun Mar 5 02:21:30 2017 +0000
+
+ Enforce the max packet length for OpenPGP subpackets as well
+
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=392
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 5 08:08:10 2017 +0100
+
+ doc: corrected typo [ci skip]
+
+ It was pointed out by morozov@eags.ru.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 09:31:37 2017 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 09:29:12 2017 +0100
+
+ tests: do not generate certificates with serial being zero
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 08:48:41 2017 +0100
+
+ tests: check whether a certificate with illegal version is rejected
+
+ That is, whether a certificate with version zero fails to import.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 08:38:01 2017 +0100
+
+ gnutls_x509_crt_set_version: do not allow writing illegal versions
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 08:28:47 2017 +0100
+
+ x509: reject illegal certificate versions
+
+ Resolves #182
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 08:44:41 2017 +0100
+
+ gnutls_x509_crt_set_serial: refuse to write all-zero serial number
+
+ This is prohibited by RFC5280.
+
+ Relates #181
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 3 08:27:23 2017 +0100
+
+ gnutls_x509_crt_set_serial: document the 20-byte limit for serial sizes
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 12:51:47 2017 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 11:59:50 2017 +0100
+
+ tests: chainverify: incorporated the tests for unknown critical extensions
+
+ These check whether unknown critical extensions are detected during verification,
+ and whether the flag GNUTLS_VERIFY_IGNORE_UNKNOWN_CRIT_EXTENSIONS, is honored
+ during verification.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 11:47:17 2017 +0100
+
+ x509.h: introduced flag GNUTLS_VERIFY_IGNORE_UNKNOWN_CRIT_EXTENSIONS
+
+ That flag signals the verification process, not to fail on unknown critical
+ extensions. This can be used when the critical extension checking in a chain
+ is handled externally.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 16:54:33 2017 +0100
+
+ tests: verify that critical extensions can be stored
+
+ That is, ensure that we don't repeat the regression of
+ certtool not processing free-form critical extensions when no
+ other free-form extensions are present.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 15:50:44 2017 +0100
+
+ tests: added verification for unknown critical extensions
+
+ This tests whether unknown critical extensions will cause a verification
+ failure.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 14:48:37 2017 +0100
+
+ x509/verify: refuse to verify certificates with unknown critical extensions
+
+ That is, introduced flag GNUTLS_CERT_UNKNOWN_CRIT_EXTENSIONS, which is
+ set when the chain under verification contains unsupported extensions marked
+ as critical.
+
+ Resolves: #177
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 10:17:41 2017 +0100
+
+ .gitlab-ci.yml: run tests under a FIPS140 mode simulation
+
+ That is, in FIPS140-2/Fedora/x86_64 build, run tests under a normal
+ run (when library is compiled with FIPS140-2 support but not enabled
+ on run time), and also run tests under a run-time that simulates
+ FIPS140-2 support.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 17:13:37 2017 +0100
+
+ crypto-self-tests: modified exported functions to work under fips140-2 mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 15:52:13 2017 +0100
+
+ tests: skip tests which cannot be run in FIPS140-2 mode
+
+ This allows the test suite to be run in FIPS140-2 mode.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 15:42:25 2017 +0100
+
+ _gnutls_pk_params_copy: copy the provable algorithm used
+
+ This is affected utilization of generated RSA keys under FIPS140-2 mode
+ which utilizes provable generation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 14:31:30 2017 +0100
+
+ gnutls_session_ticket_key_generate: fixed operation under FIPS140-2 mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 14:05:31 2017 +0100
+
+ tests: priorities: enhanced for test to work under FIPS140-2 mode
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 13:46:43 2017 +0100
+
+ gnutls-cli: print the ciphers, MACs and KXs when priority string is given
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 13:39:39 2017 +0100
+
+ gnutls_priority_get_cipher_suite_index: do not return values for non-existent ciphers
+
+ That is, do return only the enabled algorithms in states like FIPS140-2,
+ rather than returning the set that would have been enabled if these
+ restrictions wouldn't be in place.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 15:46:07 2017 +0100
+
+ README.md: removed info that gnutls is a gnu project [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 15:33:45 2017 +0100
+
+ tests: doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 07:58:04 2017 +0100
+
+ tests: added test cases with invalid openpgp certs
+
+ These certificates contain invalid secret key sub-packets.
+ These trigger invalid memory accesses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=360
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=354
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 1 07:54:04 2017 +0100
+
+ opencdk: do not parse any secret keys in packet when reading a certificate
+
+ This reduces the attack surface on the parsers, and prevents any bugs
+ in the secret key parser to be exploitable by inserting secret key
+ sub-packets into an openpgp certificate.
+
+ This addresses:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=354
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=360
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 10:32:38 2017 +0100
+
+ tests: crt_apis: added tests for writing/reading unique IDs
+
+ That is check the functionality of:
+ - gnutls_x509_crt_get_subject_unique_id
+ - gnutls_x509_crt_get_issuer_unique_id
+ - gnutls_x509_crt_set_issuer_unique_id
+ - gnutls_x509_crt_set_subject_unique_id
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 10:59:28 2017 +0100
+
+ Added _gnutls_idna_email_reverse_map
+
+ This allows printing the reverse map of an IDNA-encoded email.
+ Modified x509/output to include this decoding for RFC822Name.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 10:47:03 2017 +0100
+
+ x509/output: Cleanup in IDNA name printing
+
+ That also removes the incorrect mapping to IDNA punycode when the
+ input is not printable.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 08:48:24 2017 +0100
+
+ tests: added test for interactive creation of a request
+
+ Relates #179
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 08:24:30 2017 +0100
+
+ certtool: removed limits in interactive input
+
+ That removes the limits when reading most of the interactive input.
+ The read_str() function due to its dependence on static variable remains
+ with a limit, but will output an error if the input string exceeds size.
+
+ Resolves #179
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 28 08:00:56 2017 +0100
+
+ certtool: increased buffer for reading from user
+
+ This allows reading longer than 128-byte fields interactively.
+ The new limit is 512-bytes.
+
+ Relates #179
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 08:23:47 2017 +0100
+
+ tests: added certificate generation with very long DNS and CN name
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 15:58:53 2017 +0100
+
+ gnutls_x509_crt_get_extension_info: fixed function to comply with documented approach
+
+ That is, do not include the trailing NULL byte size in the
+ size of the object identifier.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 16:47:55 2017 +0100
+
+ certtool: store critical extensions even if no other extension are present
+
+ That is, fix a bug which prevented critical extensions to be stored
+ if no other free-form extensions were specified.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 27 15:06:57 2017 +0100
+
+ x509/name_constraints: documented return values and corrected return type
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 09:24:19 2017 +0100
+
+ gnutls_ocsp_resp_verify_direct, gnutls_ocsp_resp_verify: defined flags argument
+
+ That was defined to be gnutls_certificate_verify_flags, and
+ it allows passing verification flags, such as flags to allow
+ broken algorithms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 09:09:10 2017 +0100
+
+ is_level_acceptable: no longer checks for broken algorithms
+
+ This is done at is_broken_allowed(), and in fact checking them in
+ is_level_acceptable() creates a conflict when overrides like flag
+ GNUTLS_VERIFY_ALLOW_BROKEN is used.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 08:57:27 2017 +0100
+
+ gnutls_store_commitment: introduced flag GNUTLS_SCOMMIT_FLAG_ALLOW_BROKEN
+
+ This flag allows operation of the function even with broken algorithms.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 08:46:01 2017 +0100
+
+ verify: is_broken_allowed: account for "new" flag GNUTLS_VERIFY_ALLOW_BROKEN
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 09:53:26 2017 +0100
+
+ devel/fuzz: added necessary casts for compilation [ci skip]
+
+ Also added the IDNA targets to makefile's default target.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 24 07:56:50 2017 +0100
+
+ devel/fuzz: include string.h for strlen() [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 18:05:09 2017 +0100
+
+ devel/fuzz: IDNA fuzzers: removed printf [ci skip]
+
+ see request in:
+ https://github.com/google/oss-fuzz/issues/417
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 11:08:34 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ This triggers an invalid memory access:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=391
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 11:10:04 2017 +0100
+
+ opencdk: read_attribute: account buffer size
+
+ That ensures that there is no read past the end of buffer.
+
+ Resolves the oss-fuzz found bug:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=391
+
+ Relates: #159
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 13:35:42 2017 +0100
+
+ gnutls-cli-debug: fixed protocol to port discovery
+
+ That is, if --starttls-proto is provided the default port
+ selected will be converted to host byte order as expected.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 13:11:45 2017 +0100
+
+ pk.c: fixed memory leak on DSS signature decoding
+
+ Detected using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=676
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 13:07:47 2017 +0100
+
+ tests: added client reproducer for memory leak
+
+ That reproduces a memory leak detected in the client code path.
+ Detected using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=676
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 12:34:28 2017 +0100
+
+ tests: update to take into account the removal of random art
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 10:26:04 2017 +0100
+
+ x509/output: No longer include public key's random art
+
+ That is in order to reduce bloat in the output, which already
+ contains many identifiers for public key.
+
+ See mailing list discussion at:
+ https://lists.gnupg.org/pipermail/gnutls-devel/2017-February/008324.html
+ https://lists.gnupg.org/pipermail/gnutls-devel/2017-February/008329.html
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 17:02:33 2017 +0100
+
+ tests: updated to include the pin-sha256 in output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 16:47:02 2017 +0100
+
+ tests: updated to take into account the pin-sha256 oneline output
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 11:11:06 2017 +0100
+
+ x509/output: print key PIN on oneline output
+
+ That is, instead of the public key ID. The key PIN due to HPKP
+ is now more widely used than hex-based key IDs.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 11:06:51 2017 +0100
+
+ x509/output: print the public key PIN of a certificate
+
+ That is, print the value used by the HPKP protocol as per
+ RFC7469.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 23 09:39:28 2017 +0100
+
+ certtool: don't warn when 'uri' is specified on template
+
+ Reported at:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1425884
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 21:53:42 2017 +0100
+
+ .gitlab-ci.yml: ubsan build: fixed artifacts path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 21:45:32 2017 +0100
+
+ tests: split starttls.sh into multiple scripts
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 21:29:22 2017 +0100
+
+ tests: pkcs11-import-with-pin: removed invalid conditional macro
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 17:38:07 2017 +0100
+
+ tests: added PKCS#11 test for pin input
+
+ This introduces a test on PIN input to retrieve an object using
+ pin-value and pin-source (file).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 22 21:01:30 2017 +0100
+
+ SECURITY.md: updated after comments from Daniel Berrange [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 16:50:22 2017 +0100
+
+ Removed unnecessary entries in pkix.asn and gnutls.asn
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 14:20:17 2017 +0100
+
+ nettle/pk: corrected memcpy of Q in DSA params
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 08:02:02 2017 +0100
+
+ crypto.h: improved documentation of randomness levels
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 08:01:09 2017 +0100
+
+ nettle/pk: use the appropriate level of randomness for each operation
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 08:00:41 2017 +0100
+
+ srp: use nonce level for SRP password randomization
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 08:58:16 2017 +0100
+
+ doc: document the use of assert()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 08:17:25 2017 +0100
+
+ doc: removed protocol/ directory
+
+ While it was used during the first years of development, today
+ it is way more easy to access protocol documents via the IETF
+ web site.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 21 08:13:56 2017 +0100
+
+ Added SECURITY.md, a description of the security issue handling process
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 18:57:56 2017 +0100
+
+ .gitlab-ci.yml: require clang analyzer build to be warning free
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 18:53:01 2017 +0100
+
+ configure: no longer use -Wframe-larger-than
+
+ We do not require a specific stack size, and there is legacy
+ code which utilizes large stack sizes. As such remove the
+ warnings to allow for a warning free compilation.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 18:50:40 2017 +0100
+
+ pkcs11: avoid calling memcpy will null options
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 16:41:46 2017 +0100
+
+ preinitialize variables to work-around warnings with clang
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 15:05:57 2017 +0100
+
+ eliminated dead code as indicated by clang scan-build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 15:02:22 2017 +0100
+
+ pkcs7: corrected error checking in write_signer_id
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 14:18:25 2017 +0100
+
+ preinitialize variables to work-around warnings with clang's scan-build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 14:03:40 2017 +0100
+
+ eliminated various clang warnings with non-null arguments
+
+ That is, use assert() to ensure that known to be non-null
+ variables will be used as input to functions requiring non-null.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 13:49:55 2017 +0100
+
+ make_printable_string: allow operation with null input
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 13:32:37 2017 +0100
+
+ .gitlab-ci.yml: replaced clang's build with clang analyser's scan-build
+
+ This introduces a static analyser pass in the CI.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 13:13:19 2017 +0100
+
+ .gitlab-ci.yml: added cppcheck run
+
+ This adds a basic static analysis of the source code.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 11:14:49 2017 +0100
+
+ opencdk/read-packet.c: corrected typo in type cast
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 11:13:08 2017 +0100
+
+ cdk_pkt_read: enforce packet limits
+
+ That ensures that there are no overflows in the subsequent
+ calculations.
+
+ Resolves the oss-fuzz found bug:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
+
+ Relates: #159
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 20 11:01:07 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ That triggers a heap buffer overflow:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Robert Scheck <robert@fedoraproject.org>
+Date: Sun Feb 19 22:50:30 2017 +0100
+
+ Add LMTP, POP3, NNTP, Sieve and PostgreSQL support to gnutls-cli
+
+ Add LMTP (RFC 2033), POP3 (RFC 2595), NNTP (RFC 4642), Sieve (RFC 5804) and PostgreSQL support to gnutls-cli ("--starttls-proto").
+
+ Signed-off-by: Robert Scheck <robert@fedoraproject.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 19 17:31:52 2017 +0100
+
+ README.md: added CII best practices badge [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Rical Jasan <ricaljasan@pacific.net>
+Date: Fri Feb 17 21:22:19 2017 -0800
+
+ tests: Improve port-checking infrastructure.
+
+ The test suite unnecessarily failed on systems without netstat because
+ it was assumed to be present. Instead of simply checking for its
+ presence and indicating an unsupported test, however, the ss utility
+ can be used as a drop-in replacement. When netstat/net-tools is not
+ present, the ss utility from iproute2 still stands a fair chance of
+ existing, and they also have similar enough semantics that they can be
+ used interchangeably in the test suite.
+
+ The functions in tests/scripts/common.sh that used netstat
+ (wait_for_port, wait_for_free_port) now use new functions,
+ check_if_port_in_use and check_if_port_listening, to abstract the call
+ to netstat/ss. The eval'd variable GETPORT also used netstat, and has
+ been updated accordingly.
+
+ The new port-checking functions use another new function,
+ have_port_finder, which takes care of the details of selecting ss
+ (preferred) or netstat, or fails otherwise.
+
+ Signed-off-by: Rical Jasan <ricaljasan@pacific.net>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Feb 12 19:48:19 2017 +0200
+
+ build: doc: install images also into htmldir
+
+ images are required also by the html documentation.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:37:42 2017 +0100
+
+ .gitlab-ci.yml: corrected coverage build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 18 07:23:18 2017 +0100
+
+ .gitlab-ci.yml: remove submodule update from main build
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 17:40:27 2017 +0100
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 17:38:23 2017 +0100
+
+ Makefile: improved symbols extraction
+
+ That is, do not include non-function names.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:35:41 2017 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:31:02 2017 +0100
+
+ tests: ignore sanity checks in broken cert test
+
+ This allows the existing reproducers which contain certificates which
+ are rejected by sanity checks, to still be used to detect regressions.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:26:56 2017 +0100
+
+ Added gnutls_x509_crt_set_flags()
+
+ This functions allows specifying flags to the certificate object.
+ In particular it allows the single flag GNUTLS_X509_CRT_FLAG_IGNORE_SANITY
+ which allows to ignore sanity checks at the import of the certificate.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:20:44 2017 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:14:38 2017 +0100
+
+ Introduced GNUTLS_E_CERTIFICATE_TIME_ERROR error code
+
+ This error code indicates an issue in the time fields of certificate.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 11:49:48 2017 +0100
+
+ x509/output: properly indicate error in Time fields
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 11:33:56 2017 +0100
+
+ x509/time: refuse importing certificates with invalid Time fields
+
+ That will refuse to import certificates which their time field
+ is not in GMT, or contain fractional seconds.
+
+ Resolves: #169
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 11:26:33 2017 +0100
+
+ _gnutls_x509_generalTime2gtime: refuse to parse fractional seconds
+
+ Fractional seconds in GeneralizedTime are prohibited by RFC5280.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 11:25:15 2017 +0100
+
+ tests: enhanced test suite to include invalid X509v3 cert
+
+ That certificate contains a GeneralizedTime with fractional
+ seconds.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 15:10:40 2017 +0100
+
+ gnutls_x509_crt_list_import: fixed leak on import failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 10:39:21 2017 +0100
+
+ tests: enhanced test suite to include creation of invalid certificates
+
+ That is, check whether the creation of invalid V2 or V1 certificates
+ will be detected, and that the correct error codes are returned.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 10:06:58 2017 +0100
+
+ gnutls_x509_crt_sign2: refuse to sign invalid X.509 certificates
+
+ That is, do not sign X.509 certificates which have fields that
+ shouldn't be present on their corresponding version.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 10:04:52 2017 +0100
+
+ gnutls_x509_crt_import: reject X.509v1 certificates with invalid fields
+
+ Refuse to import X.509v1 certificates which have fields that didn't
+ exist in X.509v1 specification. That is the issuerUniqueID and
+ subjectUniqueID fields.
+
+ Resolves: #168
+ Resolves: #167
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 17 09:56:24 2017 +0100
+
+ tests: enhanced test suite to include invalid V1 certs
+
+ That is, added X.509v1 certificates with attributes that shouldn't
+ have been presented (valid for X.509v2 only).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 15 18:42:22 2017 +0100
+
+ gnutls.pc: do not include libidn2 in Requires.private
+
+ The libidn2 versions available do not include libidn2.pc,
+ thus the inclusion was causing problems when using pkg-config.
+ Instead we include -lidn2 in Libs.private.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 12 11:01:46 2017 +0100
+
+ .gitlab-ci.yml: Re-organized stages
+
+ The less CPU intensive tasks were moved to earlier stage, and the
+ CPU intensive tasks are only spawned only after basic syntax and
+ ABI checks have succeeded.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 12 09:42:15 2017 +0100
+
+ gnutls.h: corrected typo [ci skip]
+
+Author: Marcin Cieślak <saper@saper.info>
+Date: Thu Feb 9 00:26:16 2017 +0000
+
+ <alloca.h> only if HAVE_ALLOCA_H
+
+ FreeBSD does know alloca() but has no such header
+
+ Signed-off-by: Marcin Cieślak <saper@SAPER.INFO>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 5 11:41:41 2017 +0100
+
+ doc: document the intention of the priority string usage [ci skip]
+
+ This documents the gnutls_set_default_priority() function, and
+ how it is intended to be combined with an application that utilizes
+ priority strings.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 24 15:51:17 2016 +0100
+
+ doc update
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 08:57:16 2016 +0100
+
+ tests: modified tests for the disablement of 3DES
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 24 15:50:11 2016 +0100
+
+ Removed support for the 3DES cipher by default
+
+ That is a legacy cipher that is no longer needed to be
+ included as backup cipher.
+
+ Resolves #120
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 2 22:59:43 2017 +0100
+
+ x509: optimize subject alternative name access
+
+ That reads SAN and IAN early on import, significantly reducing
+ the running time of functions which iterate over the alternative
+ names of a certificate, e.g., gnutls_x509_crt_check_hostname().
+
+ Relates #165
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 4 14:28:30 2017 +0100
+
+ .travis.yml: list all logs on failure
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 4 14:01:36 2017 +0100
+
+ tests: enable all IDNA tests when compiled with libidn2
+
+ Keep IDNA2003-only tests on the ifdef HAVE_LIBIDN.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 4 07:50:03 2017 +0100
+
+ .travis.yml: updated instructions for travis builds
+
+ Removed unbound and other minor fixes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 3 23:28:01 2017 +0100
+
+ extras/hex.h: do not use strlen as variable name
+
+ That is, do not utilize a standard C function name as variable name.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 3 23:11:27 2017 +0100
+
+ gnutls_pkcs11_obj_list_import_url4: always return an initialized pointer
+
+ When returning success, but no elements, gnutls_pkcs11_obj_list_import_url4,
+ could have returned zero number of elements with a pointer that was uninitialized.
+ Ensure that an initialized (i.e., null in that case), pointer is always returned.
+ Reported by Jeremy Harris.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 3 00:08:19 2017 +0100
+
+ .gitlab-ci.yml: use libidn2 on windows builds
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 2 11:26:18 2017 +0100
+
+ gnutls_heartbeat_allowed: corrected type on dummy wrapper
+
+ That is, when compiling without heartbeat support, compilation
+ could fail due to the dummy wrapper not returning the right
+ type.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 2 08:27:14 2017 +0100
+
+ Address test suite failure due to timezone differences.
+
+ Reported by Thorsten Glaser and Andreas Metzler.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 31 17:06:16 2017 +0100
+
+ doc update [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 31 07:38:50 2017 +0100
+
+ gnutls_heartbeat_allowed: corrected return type
+
+ This reflects better the fact that this function returns
+ a boolean.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 28 09:26:05 2017 +0100
+
+ _idn2_to_unicode_8z8z: do not err on mixed IDNA domains
+
+ That is allow domains of the form 'großes.xn--fa-hia.de'. The
+ drawback is that we may not err early on invalid formatted
+ names. We however delegate any such decisions to libidn2.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 27 10:07:28 2017 +0100
+
+ README.md: added link to travis build for 3.5.x [ci skip]
+
+ In addition to adding a link to travis build for 3.5.x branch removed
+ link on 3.4.x branch. It is no longer active.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 26 14:49:33 2017 +0100
+
+ heartbeat extension: doc update
+
+ Document how to calculate the total TLS data transmitted.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 26 13:21:39 2017 +0100
+
+ str-idna: improved error handling
+
+ In addition to detecting input with invalid characters in _idn2_to_unicode_8z8z(),
+ we also add support for case insensitive punycode header.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 25 15:45:57 2017 +0100
+
+ Updated auto-generated files
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 25 03:35:54 2017 +0100
+
+ str-idna: cleanups in IDNA handling
+
+ Ensure safe operation even with broken libidn2, and make
+ sure that we properly allocate memory to caller, even on complex
+ library configuration.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 14:13:21 2017 +0100
+
+ fuzz: added run-afl helper script
+
+ This script which allows running the fuzzying tests
+ locally using american fuzzy lop.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 13:50:59 2017 +0100
+
+ fuzz: Added IDNA encoding/decoding fuzzying units
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 13:43:54 2017 +0100
+
+ Move IDNA functionality to str-idna.c from str-unicode.c
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 08:57:52 2017 +0100
+
+ tests: use the exported API for IDNA testing
+
+ In addition group together the tests which require libidn2 >= 0.14.
+ This allows the tests to succeed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 08:55:06 2017 +0100
+
+ tools: depend on gnutls_idna_map() instead of using directly libidn/libidn2
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 08:50:54 2017 +0100
+
+ Exported gnutls_idna_map() and gnutls_idna_reverse_map()
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 07:56:12 2017 +0100
+
+ .gitlab-ci.yml: added run with IDNA2003
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 18:59:51 2017 +0100
+
+ tests: simplified str-idna
+
+ This separates the directions that are tested (utf-8 -> punycode
+ and vice versa).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 07:52:23 2017 +0100
+
+ configure: added flag to force IDNA2003
+
+ That allows to compile with libidn even if libidn2 is present, and
+ can be used to check IDNA2003 support.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 21 23:14:46 2017 +0100
+
+ Add support for libidn2 (IDNA 2008 + TR46)
+
+ Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 25 08:55:40 2017 +0100
+
+ pkcs7 decryption: addressed memory leak in PBES1-DES-CBC-MD5 handling
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 25 09:46:00 2017 +0100
+
+ minitasn1: updated to libtasn1 4.10
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 25 03:24:34 2017 +0100
+
+ configure: do not disable valgrind tests unless explicitly specified
+
+ ... or unless we are in release build.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 24 16:28:41 2017 +0100
+
+ Makefile.am: increased the number of releases to perform ABI checks with
+
+ That is added 3.4.0, 3.4.17 and 3.5.8.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 20 16:55:26 2017 +0100
+
+ tests: verify that a written certificate will inherit its ID from privkey
+
+ That is, whether p11tool will do the right thing and figure the proper
+ ID to use for a certificate object, if the public key is available.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 20 16:33:03 2017 +0100
+
+ p11tool: re-use ID from corresponding objects when writing certificates
+
+ That is when writing a certificate which has a corresponding public key,
+ or private key in the token, ensure that we use the same ID for the
+ objects. That eases the work of someone writing objects to certificates,
+ and does not require him to manually detect the object IDs.
+
+ Resolves #160
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Jan 20 19:18:09 2017 +0200
+
+ .gitlab-ci.yml: add Fedora/x86_64/no-tools
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Jan 20 23:12:36 2017 +0200
+
+ valgrind: support separate builddir for suppressions.valgrind
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Jan 20 21:14:22 2017 +0200
+
+ configure: remove void statement
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Jan 20 23:39:41 2017 +0200
+
+ tests: skip tests that requires tools if tools are disabled
+
+ building with --disable-tools should not cause test failure.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 22 00:59:41 2017 +0100
+
+ doc: improved documentation on DH parameters [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 20 14:36:51 2017 +0100
+
+ Revert "tests: suite: pkcs11: skip if no softhsm"
+
+ This reverts commit 276a6ee44d80d4d3b144a78794020c177be8f0ea.
+ The reason is to avoid having changes in softhsm packaging, result
+ to skipping large parts of the test suite without someone noticing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:28:08 2017 +0100
+
+ _decode_pkcs8_dsa_key: ensure that the P value is non-zero
+
+ When decoding a DSA private key, and constructing the public key
+ ensure that P is non-zero, and thus can be used as modulus.
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=393
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:24:19 2017 +0100
+
+ tests: added private key causing FPE
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=393
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:20:28 2017 +0100
+
+ _gnutls_decrypt_pbes1_des_md5_data: ensure that encrypted data size is a multiple of blocksize
+
+ That prevents incorrect data reaching nettle which has only
+ assertion checks (leading to an abort).
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=389
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:14:29 2017 +0100
+
+ tests: added PKCS#8 key which causes undefined behavior on import
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=389
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:08:49 2017 +0100
+
+ tests: added certificate which reproduces a leak in gnutls_x509_ext_import_aia
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=385
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 19 09:08:04 2017 +0100
+
+ x509: eliminated memory leak on gnutls_x509_ext_import_aia
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=385
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 17 15:08:29 2017 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 18 13:51:32 2017 +0100
+
+ tests: added check which ensures a client cannot receive during handshake
+
+ Relates #158
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 18 09:51:35 2017 +0100
+
+ tests: added check which ensures a client cannot transmit during handshake
+
+ Relates #158
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 17 15:28:05 2017 +0100
+
+ tests: cleanup error reporting in handshake-false-start
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 18 13:47:02 2017 +0100
+
+ Refuse to receive data during handshake
+
+ This prevents buggy applications from receiving non-authenticated data
+ that may have arrived during the handshake.
+
+ Relates #158
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 17 15:05:35 2017 +0100
+
+ Refuse to send data during handshake
+
+ That prevents buggy applications from transmitting sensitive data during
+ handshake.
+
+ Resolves #158
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 15 10:40:02 2017 +0100
+
+ Disable AVX support when it is not supported by the CPU
+
+ This mostly affects virtual systems. Reported by Frank Chen.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 17 13:34:33 2017 +0100
+
+ opencdk: improved error code checking in the stream reading functions
+
+ This amends 49be4f7b82eba2363bb8d4090950dad976a77a3a
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 16 17:09:36 2017 +0100
+
+ minitasn1: updated to latest git version
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 16 13:01:56 2017 +0100
+
+ doc: removed references to OpenPGP functions and enumerations
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 15 11:11:19 2017 +0100
+
+ doc: removed documentation related to OpenPGP and guile
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 6 08:26:17 2017 +0100
+
+ doc: removed documentation related to OpenPGP
+
+ Also added section explaining why OpenPGP is being deprecated.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 6 08:14:09 2017 +0100
+
+ openpgp.h: all openpgp functionality was marked as deprecated
+
+ This is to prevent new applications using that functionality.
+ As the OpenPGP certificate for HTTPS (or TLS in general) never got
+ any traction, GnuTLS is the only implementation supporting it,
+ and the quality of the OpenPGP supporting code is questionable,
+ we deprecate that code with the intention to drop it completely
+ when an opportunity is given.
+
+ Relates #102
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 9 08:36:02 2017 +0100
+
+ tests: added missing file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 9 08:18:33 2017 +0100
+
+ CONTRIBUTING.md: Improve instructions on git-template [ci skip]
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jan 5 10:35:29 2017 +0200
+
+ tests: remove bash usage
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jan 5 14:01:30 2017 +0200
+
+ tests: suite: chain: support separate builddir
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jan 5 10:34:07 2017 +0200
+
+ tests: skip tests that requires tools if tools are disabled
+
+ building with --disable-tools should not cause test failure.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Jan 3 16:46:46 2017 +0200
+
+ gitignore: update [ci skip]
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Jan 3 16:45:19 2017 +0200
+
+ gitignore: sort()
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 15:22:13 2017 +0100
+
+ opencdk: added error checking in the stream reading functions
+
+ This addresses an out of memory error. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 15:03:12 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ This triggers an out of memory error. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:56:50 2017 +0100
+
+ opencdk: cdk_pk_get_keyid: fix stack overflow
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:48:38 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ This triggers a memory error. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:47:11 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ This triggers a memory error. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:42:03 2017 +0100
+
+ opencdk: read_attribute: added more precise checks when reading stream
+
+ That addresses heap read overflows found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:34:05 2017 +0100
+
+ tests: added test case with invalid openpgp cert
+
+ This triggers a memory error. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 14:31:26 2017 +0100
+
+ tests: openpgp-cert-parser: simplified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:46:26 2017 +0100
+
+ auth rsa: eliminated memory leak on pkcs-1 formatting attack path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:42:25 2017 +0100
+
+ tests: added reproducer for server issues
+
+ This allows to reproduce issues found on server side, by adding
+ a transcript in server-interesting. Currently it contains values
+ found using oss-fuzz.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:32:17 2017 +0100
+
+ _decode_pkcs8_dsa_key: fixed memory leak on error path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:28:23 2017 +0100
+
+ decode_private_key_info: eliminate memory leaks on error path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:26:07 2017 +0100
+
+ _gnutls_x509_read_dsa_params: update params structure parameters size on successful read
+
+ That will allow proper deinitialization of the parameters even if
+ the structure fill up doesn't succeed.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:18:03 2017 +0100
+
+ tests: added test with private key that causes memory leak
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=371
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:10:54 2017 +0100
+
+ _gnutls_pkcs12_string_to_key: avoid division by zero when salt_size = 0
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 4 09:07:10 2017 +0100
+
+ tests: added test with PKCS#8 key that signals FPE
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=376
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sat Dec 31 05:07:47 2016 +0200
+
+ tests: skip tests that requires tools if tools are disabled
+
+ building with --disable-tools should not cause test failure.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Jan 3 14:56:05 2017 +0200
+
+ tests: cert-tests: pkcs12 drop builddir usage
+
+ sync with other tests
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Jan 3 14:40:36 2017 +0200
+
+ tests: suite: pkcs11: skip if no softhsm
+
+ similar to other tests
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 16:10:07 2017 +0100
+
+ gnutls_x509_ext_import_policies: fixed memory leak on error path
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 15:53:27 2017 +0100
+
+ tests: added test case with invalid X.509 cert
+
+ This triggers a memory leak. Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=294
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 15:49:37 2017 +0100
+
+ x509 output: fixed memory leak in AIA extension printing
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 15:46:41 2017 +0100
+
+ tests: added test case with invalid X.509 cert
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=300
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 15:00:59 2017 +0100
+
+ doc: document how to enhance the testsuite with issues found
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 14:37:18 2017 +0100
+
+ status_request: eliminated leak on error path
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=269
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 13:49:18 2017 +0100
+
+ proc_server_kx: eliminated leak on error path
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=272
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 14:49:03 2017 +0100
+
+ tests: added reproducer for client issues
+
+ This allows to reproduce issues found on client handling, by adding
+ a transcript in client-interesting. Currently it contains values
+ found using oss-fuzz.
+
+ The client3.disabled transcript is disabled because it depends
+ on a fix in nettle.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 13:39:43 2017 +0100
+
+ tests: do not run key-tests under leak sanitizer
+
+ The reason is that we cannot distinguish between a memory leak on
+ application failure (which is followed by exit- thus should be ignored)
+ and an address sanitizer issue (which should never be ignored).
+ As such we disable leak detection with asan and rely on valgrind.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 13:20:16 2017 +0100
+
+ tests: illegal-rsa: don't hide stderr
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 10:47:24 2017 +0100
+
+ tests: added suite for checking PKCS#7 structure import
+
+ The initial (problematic) structures have been obtained from oss-fuzz
+ project.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 3 11:39:13 2017 +0100
+
+ fuzz: added basic Makefile to assist in reproducing [ci skip]
+
+ Also updated README.md
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 17:24:41 2017 +0100
+
+ Simplified contribution policy [ci skip]
+
+ Also added a template to assist in the required steps to contribute.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 17:05:29 2017 +0100
+
+ _gnutls_x509_get_signature: fix memory leak on error path
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 17:04:29 2017 +0100
+
+ tests: added test case with invalid X.509 certificate
+
+ This certificate causes a memory leak while printing.
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=280
+
+ Relates #156
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 15:07:48 2017 +0100
+
+ valgrind: use different exit code to signify error
+
+ This allows the test suite to differentiate between valgrind and expected
+ errors from tools.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 15:01:26 2017 +0100
+
+ tests: cert-tests: force asan to return an error code other than one on failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 15:00:24 2017 +0100
+
+ gnutls_pkcs8_info: addressed memory leak on error path
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 14:55:14 2017 +0100
+
+ certtool: pkcs8_info_int: fix memory leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 13:44:46 2017 +0100
+
+ wrap_nettle_mpi_modm: bail on a modulus that is zero
+
+ Relates #156
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 13:32:41 2017 +0100
+
+ tests: added test for invalid private keys
+
+ Also force asan to return an error code other than one (the normally
+ expected for invalid keys).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 12:02:53 2017 +0100
+
+ x509: address leak in print_altname - cert printing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 12:03:35 2017 +0100
+
+ tests: added certificate to reproduce memory leak
+
+ Found by oss-fuzz project:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=299
+
+ Relates #156
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 11:05:21 2017 +0100
+
+ tests: added test case with invalid PKCS#8 data
+
+ Issue found using oss-fuzz:
+ https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=363
+
+ Relates #156
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 11:20:45 2017 +0100
+
+ nettle: added a safety net on wrap_nettle_cipher_setiv()
+
+ Return error if attempting to set invalid IV size.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 11:51:10 2017 +0100
+
+ pkcs7 decrypt: require a valid IV size on all ciphers
+
+ That is, do not accept the IV size present in the structure as valid
+ without checking.
+
+ Relates #156
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 13:26:29 2017 +0100
+
+ fuzz: added a PBES1 PKCS#8 private key file into corpus
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 13:23:01 2017 +0100
+
+ pkcs8: pkcs8_key_info() will correctly detect non-encrypted files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 13:19:49 2017 +0100
+
+ certtool: don't print PKCS#8 information when outputting DER data
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Sun Jan 1 09:15:09 2017 -0500
+
+ Corrected a leak in OpenPGP sub-packet parsing.
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 10:13:48 2017 +0100
+
+ doc: fixed copyright date in gnutls.texi
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 2 08:43:47 2017 +0100
+
+ gnutls_rnd: document the available values of level [ci skip]
+
+ This enables using the function by only checking the man page.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 16:45:19 2016 +0100
+
+ pkcs11 verification: ensure that an issuer we retrieve is not blacklist
+
+ It may happen in p11-kit trust module that a trusted certificate is
+ both in the trusted set, and the blacklisted set. To avoid accepting
+ a certificate when in both sets, we always check whether a trusted
+ issuer certificate is in the blacklisted set.
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Fri Dec 30 21:17:22 2016 -0500
+
+ Attempt to fix a leak in OpenPGP cert parsing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 14:57:57 2016 +0100
+
+ tests: enable all the ciphersuite in openssl cli for DSS checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 11:48:44 2016 +0100
+
+ certtool: improved error reporting on file error
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 13:27:10 2016 +0100
+
+ tests: don't check against 3DES if disabled in openssl
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 13:25:23 2016 +0100
+
+ tests: do not pass the -dhparams to openssl 1.1.0; it doesn't work
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 12:14:44 2016 +0100
+
+ tests: simplified DH params format
+
+ Also switch to RFC7919 DH params.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 12:13:20 2016 +0100
+
+ tests: corrected type in openssl compat tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 12:12:33 2016 +0100
+
+ tests: added common variable for DH parameters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 10:36:37 2016 +0100
+
+ tests: fixed paths in compat tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 09:04:59 2016 +0100
+
+ tests: better termination checking in compat tests
+
+ This ensures that the exit code of all spawned processes is
+ checked.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 31 10:12:34 2016 +0100
+
+ cfg.mk: exclude devel/ subdirectory from syntax checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 30 15:50:45 2016 +0100
+
+ certtool: properly report unencrypted PKCS#8 keys in --p8-info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 30 15:41:53 2016 +0100
+
+ fuzz: added decrypted PKCS#8 keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 30 15:23:17 2016 +0100
+
+ fuzz: added PKCS#8 keys with low iteration count
+
+ This makes sure that the fuzzer will not timeout while
+ trying to decode keys.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 11:01:37 2016 +0100
+
+ submodules: use the github mirror of openssl
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Mon Dec 26 13:15:25 2016 -0500
+
+ Do not infinite loop if an EOF occurs while skipping a PGP packet
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Tue Dec 27 09:45:31 2016 -0500
+
+ Added a fuzzer for OpenPGP cert parsing
+
+ Signed-off-by: Alex Gaynor <alex.gaynor@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 09:59:34 2016 +0100
+
+ fuzz: document the convention for initial values
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 28 09:58:20 2016 +0100
+
+ fuzz: Added initial values for DN, PKCS8 and X.509 tests
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Mon Dec 26 15:59:03 2016 +0000
+
+ Added a parser for PKCS7 importing and printing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 08:38:41 2016 +0100
+
+ fuzz: added X.509 DN parser
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 08:35:45 2016 +0100
+
+ fuzz: added PKCS#8 private key parser
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 21 08:18:24 2016 +0100
+
+ configure: introduced --with-priority-string option
+
+ This allows specifying the priority string to be used with
+ gnutls_set_default_priority() on configure time.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 21:35:53 2016 +0100
+
+ priorities: reset the profile flags when appending new flags
+
+ That is, to avoid causing issues to applications calling gnutls_*priority_set()
+ multiple times with different parameters. In that case if multiple profiles are
+ used the outcome could be undefined. Now, the last call will prevail.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 21:39:02 2016 +0100
+
+ gnutls_session_set_verify_cert: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 21:26:09 2016 +0100
+
+ Revert "priorities: set the additional verify flags instead of appending them"
+
+ This reverts commit aaf49747f981f6c17cdc9ea7495a8948a5015ae2.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 21:19:05 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 19:01:31 2016 +0100
+
+ tests: added check for certtool loading CA certificates from PKCS#11
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 15:52:49 2016 +0100
+
+ certtool: document that --load-ca-certificate can be used with PKCS#11 URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 15:44:20 2016 +0100
+
+ certtool: load_ca_cert() can load a CA from URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 11:36:13 2016 +0100
+
+ certtool: unified the CA certificate loading process
+
+ That is, combined how CA certificates are loaded for --verify-chain,
+ --verify and --p7-verify. It is based on the trust list high level
+ functions, something that allows PKCS#11 URLs to be specified in
+ --load-ca-certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 16:15:50 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 16:21:30 2016 +0100
+
+ .gitlab-ci.yml: changed buildroot to fedora25
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 11:01:10 2016 +0100
+
+ tests: added check for multiple calls to gnutls_priority_set_direct()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 10:49:34 2016 +0100
+
+ priorities: set the additional verify flags instead of appending them
+
+ That is, to avoid causing issues to applications calling gnutls_*priority_set()
+ multiple times with different parameters. In that case if multiple profiles are
+ used the combo could be undefined.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 19 10:36:01 2016 +0100
+
+ verify: print certificate on sec param failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 15 15:08:31 2016 +0100
+
+ x509: corrected leak in certificate printing
+
+ The leak could be triggered if the certificate policies to be imported are
+ invalid.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 15 15:02:18 2016 +0100
+
+ gnutls_x509_ext_import_proxy: fix issue reading the policy language
+
+ If the language was set but the policy wasn't, that could lead to
+ a double free, as the value returned to the user was freed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 15 14:50:36 2016 +0100
+
+ tests: added certificate which was causing issues in gnutls_x509_crt_print()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 15 14:47:13 2016 +0100
+
+ tests: improved certder to easily load certificates from a directory
+
+ That allows to place certificates in certs-interesting/ and these
+ will be loaded and checked upon the new "cert" test case.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 15 14:06:06 2016 +0100
+
+ doc update
+
+Author: Alexander Kanavin <alex.kanavin@gmail.com>
+Date: Wed Dec 14 17:42:45 2016 +0200
+
+ Do not add cli-args.h to cli-args.stamp Makefile target
+
+ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Thu Dec 15 08:08:45 2016 -0500
+
+ Describe the integration
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Thu Dec 15 07:27:47 2016 -0500
+
+ Move to the devel dir
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Tue Dec 13 20:14:33 2016 -0500
+
+ Added a server fuzzer
+
+Author: Alex Gaynor <alex.gaynor@gmail.com>
+Date: Mon Dec 12 08:09:49 2016 -0500
+
+ Migrated fuzzers from the oss-repo to here.
+
+ Also added a new private_key_parser fuzzer.
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 18:07:05 2016 +0300
+
+ Drop _gnutls_epoch_get_compression
+
+ This function is unused since long ago, let's drop it.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 17:51:56 2016 +0300
+
+ Rework setting next compression method
+
+ Only update compression method if all internal check succeed and next
+ epoch will use this it. Also while we are at at, actually check for
+ _gnutls_set_compression() return value.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 17:51:56 2016 +0300
+
+ Rework setting next cipher suite
+
+ Only update cipher_suite if all internal check succeed and next epoch
+ will use this ciphe suite. Also while we are at at, actually check for
+ _gnutls_set_cipher_suite() return value.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Mon Nov 28 13:16:13 2016 +0300
+
+ Cache MAC algorithm used for PRF function
+
+ Instead of spreading checks all over the GnuTLS, cache used PRF after
+ setting the cipher suite and reference the value later. Like in
+ _gnutls_PRF_raw the GNUTLS_MAC_MD5_SHA1 means MD5+SHA1 combo.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 04:11:11 2016 +0300
+
+ Use MAC_MD5_SHA1 instead of MAC_UNKNOWN to specify TLS 1.0 PRF
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 03:52:06 2016 +0300
+
+ Rewrite SSL/TLS signature verification to use combined MD5+SHA1 digest
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 03:52:06 2016 +0300
+
+ Rewrite SSL/TLS signing code to use combined MD5+SHA1 digest
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 03:15:49 2016 +0300
+
+ Add special MD5+SHA1 digest to simplify TLS signature code
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 14 10:52:27 2016 +0100
+
+ _gnutls_pkcs_raw_decrypt_data: merge all errors during decryption to GNUTLS_E_DECRYPTION_FAILED
+
+ This makes the function's return values simpler to handle.
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Wed Dec 14 00:46:16 2016 +0300
+
+ configure.ac: remove autogen'erated files only if necessary
+
+ Currently autogen'erated files will be removed on each call to
+ configure. However this would break the build if one of previous
+ make invocations have created corresponding stamp files.
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 14 09:50:24 2016 +0100
+
+ bumped versions and added news entry for 3.6.0 [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 14 09:46:18 2016 +0100
+
+ README.md: added information on the 3.5.x builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 13 11:41:12 2016 +0100
+
+ tests: added test for PKCS#8 encrypted key decoding
+
+ This also verifies that the return value when attempting to
+ decrypt without a password is GNUTLS_E_DECRYPTION_FAILED.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 13 11:27:38 2016 +0100
+
+ pkcs8: ensure that the correct error code is returned on decryption failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 10 13:15:16 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 15:44:47 2016 +0100
+
+ doc: updated to documentation of certtool [ci skip]
+
+ This corrects options which incorrectly mentioned they support URLs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 11:54:30 2016 +0100
+
+ x509: better documented gnutls_trust_list_flags_t
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 15:06:55 2016 +0100
+
+ tests: disable ASAN leak checks on suite tests
+
+ These detect memory leaks in the tools in src/ which are
+ not critical nor there is serious reason to address.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 12:03:33 2016 +0100
+
+ tests: disable ASAN leak checks on certificate tests
+
+ These detect memory leaks in the tools in src/ which are
+ not critical nor there is serious reason to address.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 09:54:14 2016 +0100
+
+ tests: enhanced long-session-id test
+
+ This ensures that no leaks exist during exit (to avoid asan failures),
+ and that we test for the specific error code that gnutls_handshake()
+ is expected to return.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 09:52:20 2016 +0100
+
+ handshake: return GNUTLS_E_ILLEGAL_PARAMETER on invalid ID size
+
+ This is a more sensible error code to return on invalid packet.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 9 09:15:59 2016 +0100
+
+ tests: eliminate compilation warning in crq-basic [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 15:41:40 2016 +0100
+
+ .gitlab-ci.yml: do not enable IDN support in minimal build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 2 14:57:41 2016 +0100
+
+ configure.ac: use AC_CONFIG_LINKS to copy autogenerated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 2 09:22:38 2016 +0100
+
+ Added autogen pre-generated files into repository
+
+ This allows building gnutls from git in systems without using
+ autogen.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 14:28:46 2016 +0100
+
+ configure: added option to enable maintainer mode
+
+ That makes normal builds, not regenerate Makefiles or configure,
+ allowing for faster CI builds on second stage.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 15 09:03:59 2016 +0100
+
+ .gitlab-ci.yml: split the CI run into stages
+
+ In addition avoid re-generating images for operating systems
+ on every build and use pre-built images, which are generated in
+ the gnutls-build-images sub-project. That allows for faster and
+ more reliable (independent of network) CI runs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 21:40:14 2016 +0100
+
+ .gitlab-ci.yml: use local libopts on x86
+
+ This works around autogen failures on x86-64 centos7 CI hosts.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 16:35:24 2016 +0100
+
+ doc: updated documentation on multithreading [ci skip]
+
+ Resolves #154
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 16:27:36 2016 +0100
+
+ doc: list gnutls_init_flags_t [ci skip]
+
+ Suggested by Tyler Burns.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 15:54:07 2016 +0100
+
+ tests: make conditional (to HAVE_LIBIDN) any IDN related checks
+
+ This allows the test suite to successfully complete even when compiled
+ without libidn.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 15:44:28 2016 +0100
+
+ str: do not call gnutls_assert in inline function
+
+ This allows the build to succeed when compiled without libidn.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 13:09:35 2016 +0100
+
+ tests: disable leak checks in rsa-md5-collision.sh
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 14:04:07 2016 +0100
+
+ tests: split and enhanced UTF-8 name checks from hostname-check
+
+ That is, added checks to ensure that non-ASCII DNS names in certificates
+ fail, and that properly encoded IDNA2003 names, succeed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 13:54:53 2016 +0100
+
+ tests: added check with failed verification on invalid UTF-8
+
+ That is, check whether raw UTF-8 in the certificate will fail
+ verification. Raw UTF-8 is prohibited by IETF PKIX (RFC5280) on a
+ certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 13:40:41 2016 +0100
+
+ tests: updated cert with UTF8 names to contain proper IDNA2003 encoded names
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 13:28:00 2016 +0100
+
+ gnutls_x509_crt_check_email type changed to unsigned
+
+ This reflects the documented returned value type (bool), and
+ allows the compiler to warn on accidental checks for negative
+ value.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 13:20:05 2016 +0100
+
+ x509: do not attempt to ACE encode values stored in certificates
+
+ The email and hostname values are required to be in ASCII form by PKIX.
+ We instead ignore these names, if their values are outside the ASCII
+ printable character set.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 08:08:28 2016 +0100
+
+ .gitlab-ci.yml: removed libintl references
+
+ They are no longer shipped in the build systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 07:32:18 2016 +0100
+
+ tests: added missing test in dist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 07:23:18 2016 +0100
+
+ tests: corrected typos in starttls.sh
+
+ This allows to detect chat in most systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 8 07:17:34 2016 +0100
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 15:43:21 2016 +0100
+
+ tests: reduced the intermediate steps in rsa-md5-collision
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 13:24:34 2016 +0100
+
+ configure: break after finding the first libtspi
+
+ It may happen that multiple versions are available on a system,
+ and by using the first one we ensure, that we are using the
+ 64-bit version on 64-bit system, instead of falling back to
+ the 32-bit.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 13:20:08 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 10:56:30 2016 +0100
+
+ tests: added operational -sign/verify- tests in keygen app
+
+ This will check that a generated key is immediately usable for
+ operations.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 10:27:01 2016 +0100
+
+ gnutls_x509_privkey_cpy: use _gnutls_pk_params_copy
+
+ This ensures that all fields of parameters are copied. Inspired
+ by patch of Dmitry Eremin-Solenikov.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 10:30:13 2016 +0100
+
+ tests: enhanced keygen to include check of gnutls_x509_privkey_cpy
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 08:58:30 2016 +0100
+
+ tests: added tests for CRL generation APIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 09:05:01 2016 +0100
+
+ x509 crl: document the nextUpdate field limitation
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Tue Dec 6 22:41:28 2016 +0300
+
+ Don't trash DER CRQ output with text data
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 7 08:59:03 2016 +0100
+
+ x509 crl: Allow generation of CRLs not to specify a nextUpdate
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 6 20:03:31 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 6 13:07:57 2016 +0100
+
+ tests: updated overhead calculation for new code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 11:57:56 2016 +0100
+
+ DTLS: more precise overhead calculation
+
+ That takes into account space available due to padding, and
+ allows it to be included for use in the gnutls_get_data_mtu().
+
+ Resolves #140
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 09:54:45 2016 +0100
+
+ tests: added check for MTU calculation on DTLS 1.2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 5 10:36:04 2016 +0100
+
+ src: clean all stamp files on 'make clean'
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 5 10:33:07 2016 +0100
+
+ configure: search 64-bit paths for libtspi before 32-bit paths
+
+ That is, because 64-bit systems may have both 64-bit and 32-bit paths
+ while 32-bit systems only the latter.
+
+Author: James Bottomley <James.Bottomley@HansenPartnership.com>
+Date: Sat Dec 3 14:36:40 2016 -0800
+
+ tpm: fix handling of keys requiring authorization
+
+ There are several problems with the key handling in the tpm code.
+
+ The first, and most serious, is that we should make sure we understand
+ the authorization requirements of a key *before* using it. The reason
+ for this is that the TPM has a dictionary attack defence and is
+ programmed to lock up after a certain number of authorization failures
+ (which can be very small). If we try first without authorization, we
+ may lock up the TPM. The fix for this is to check whether
+ authorization is required and supply it before using the key.
+
+ Secondly, if the key does require authorization but no password is
+ supplied we should return immediately, since we know the TPM will give
+ us an authorization error anyway.
+
+ Thirdly, we should unconditionally read the policy of the key rather
+ than checking if a policy exists: Policies are tied to key objects, so
+ if there is an old policy in s->tpm_key_policy, but we're creating a
+ new key, the key it belonged to will be closed, meaning the policy
+ will be invalid. Fix this by always setting the policy each time we
+ get a new key object.
+
+ Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 4 09:56:13 2016 +0100
+
+ In import_tpm_key_cb() fix the wrong password loop
+
+ When calling import_tpm_key() once it initializes the key, but
+ a second call fails due to the key being already initialized. Ensure
+ that failure of import_tpm_key() leaves the key on a clear state.
+
+ Reported by James Bottomley <James.Bottomley@HansenPartnership.com>.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 4 18:48:55 2016 +0100
+
+ src gl: updated
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 2 15:59:17 2016 +0100
+
+ gl: removed iconv module
+
+ It is no longer used by the library.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 4 10:11:19 2016 +0100
+
+ configure.ac: detect trousers library on debian
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Dec 3 14:29:51 2016 +0100
+
+ Prevent unwanted linkage to -lhogweed
+
+ Specify action-if-found for AC_CHECK_LIB when checking for !SuiteB
+ curves to keep autoconf from adding -lhogweed to LIBS. This caused
+ linkage of e.g. openssl wrapper and C++ library to -lhogweed. The issue
+ only shows up if --disable-libdane is specified, since the dane autoconf
+ test resets LIBS.
+
+Author: James Bottomley <James.Bottomley@HansenPartnership.com>
+Date: Fri Dec 2 15:28:08 2016 -0800
+
+ Fix inability to find libtspi (trousers) on openSUSE
+
+ For distro reasons, the path on openSUSE is /lib[64]/libtspi.so.1
+ which the current code doesn't find. Fix this by having it search all
+ viable system library locations (/lib /lib64 /usr/lib and
+ /usr/lib/lib64)
+
+ Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 2 16:27:58 2016 +0100
+
+ x509: fixed output of pubkey
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 16:41:55 2016 +0100
+
+ doc: document the fact that certificates and CRLs are unusable after generation
+
+ They must be exported and re-imported if intended to be used for
+ signing or verification.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 16:32:04 2016 +0100
+
+ doc: no longer list SHA1 as a safe choice in X.509 signing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 16:19:31 2016 +0100
+
+ certtool: prevent-null termination of buffers allocated with fread_file()
+
+ We do not know whether their allocated size allows for that additional
+ null, and we do not need the null termination.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 08:40:13 2016 +0100
+
+ gnutls_x509_crl_verify: always return zero on success
+
+ Also document that in previous versions a positive number could
+ be returned on success. Reported by Adrien Beraud.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 14:09:15 2016 +0100
+
+ tests: corrected space-tab issue
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 10:04:45 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 09:55:51 2016 +0100
+
+ Improved messages and violation handling in signature key usage checks
+
+ This will now tolerate violations in server certificate, if
+ %DEBUG_ALLOW_KEY_USAGE_VIOLATIONS is set.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 09:48:56 2016 +0100
+
+ Removed redundant certificate key usage checks.
+
+ There were redundant checks when a certificate was obtained, as
+ well as prior to performing operations with certificates/pubkeys.
+ Kept the checks prior to operations.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 09:45:26 2016 +0100
+
+ _gnutls_map_pk_get_pk -> _gnutls_map_kx_get_pk
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 14:18:51 2016 +0100
+
+ gnutls_kx_get: allow calling the function during handshake
+
+ Previous this function would return garbage during handshake, because
+ parameters were not considered established, however there are valid
+ uses of this function during it. For that reason this function is
+ modified to return a correct value even during handshake (after
+ a hello is being exchanged).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 14:14:42 2016 +0100
+
+ _gnutls_check_key_usage: check for invalid key exchange algorithm
+
+ Reported by Dmitry Eremin-Solenikov.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 14:56:41 2016 +0100
+
+ tests: added checks on signature key usage violations
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 1 09:10:41 2016 +0100
+
+ .gitlab-ci.yml: added docker tag on mingw builds
+
+ That ensures that these builds are done on the gitlab.com runners
+ which run as privileged containers (and thus have access to mount).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 09:20:26 2016 +0100
+
+ privkey: set the key parameters algorithm prior to returning success
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 09:15:06 2016 +0100
+
+ When decoding a public key ensure that algorithm is written in the params struct
+
+ Reported by Dmitry Eremin-Solenikov.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 08:54:09 2016 +0100
+
+ cfg.mk: disable checks for public submodule updates in CI
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 30 08:44:40 2016 +0100
+
+ .gitlab-ci.yml: do not require update to /proc/sys/fs/binfmt_misc to succeed
+
+ In some CI systems, it is not possible to write to this filesystem, and
+ they already have the wine executable registered. In the case we cannot
+ write proceed to running the check and hope for the best.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 29 16:00:30 2016 +0100
+
+ tests: use datefudge in rsa-md5-collision check
+
+ This makes sure that any failure detected is not because of
+ expired certificates, but because of MD5 being disabled.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 29 15:51:18 2016 +0100
+
+ tools: use stamp files to allow parallel build of autogen files
+
+ Autogen seems to output on the creates files gradually, something that
+ makes 'make' believe that the command is complete prior to the output
+ file being fully populated. The current approach uses stamp files to
+ ensure that no incomplete files are used for compilation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 29 13:44:01 2016 +0100
+
+ guile: do not use +COMP-DEFLATE in priorities test
+
+ This allows the test to work even in the cases where gnutls
+ is compiled without zlib support.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 18:19:43 2016 +0100
+
+ moved all syntax check exceptions in cfg.mk
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 29 07:57:26 2016 +0100
+
+ .gitlab-ci.yml: added zlib dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 12:48:25 2016 +0100
+
+ .gitlab-ci.yml: fixed artifacts paths for Debian build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 10:26:14 2016 +0100
+
+ tests: str-unicode: check whether exceptions are tolerated on decryption
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 10:01:02 2016 +0100
+
+ tests: added exception and join control characters in str-unicode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 09:38:38 2016 +0100
+
+ unistring: added property-join-control
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 17:49:10 2016 +0100
+
+ unistring: added default_ignorable_code_point and not_a_character tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 17:23:51 2016 +0100
+
+ unistring: added NFKC normalization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 15:29:43 2016 +0100
+
+ unistring: included all possible categories for simplicity and extensibility
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 14:55:37 2016 +0100
+
+ tests: enhanced str-unicode with more char sets
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 14:20:11 2016 +0100
+
+ gnutls_utf8_password_normalize: perform more strict check on input characters
+
+ That is, ensure that the input characters are in the valid class of characters
+ for the PRECIS FreeformClass.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 13:11:44 2016 +0100
+
+ tests: fixed str-unicode tests with control characters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 13:02:48 2016 +0100
+
+ gnutls_utf8_password_normalize: avoid use of strlen()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 28 11:03:28 2016 +0100
+
+ tests: added pkcs12 file with long password
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 16:09:20 2016 +0100
+
+ renamed system/iconv.c -> str-iconv.c
+
+ We no longer use the system's functionality for converting between
+ charsets (we use libunistring), hence it is no longer suitable for
+ the wrappers to stay in system/.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 11:58:14 2016 +0100
+
+ x509: when printing ACE DNSnames ensure the actual name is also printed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 11:47:53 2016 +0100
+
+ tests: added unit tests of of _gnutls_idna_reverse_map
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 11:34:19 2016 +0100
+
+ introduced _gnutls_idna_reverse_map()
+
+ This function allows mapping ACE formatted domains to UTF-8.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 10:05:28 2016 +0100
+
+ Combined checks for printable characters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 09:58:58 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 08:44:59 2016 +0100
+
+ tests: updated crt_apis to include setting UTF-8 SAN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 08:17:13 2016 +0100
+
+ tests: updated crq_apis to include setting UTF-8 SAN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 09:48:56 2016 +0100
+
+ gnutls_idna_map: check for printable data prior to mapping
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 10:53:23 2016 +0100
+
+ gnutls_x509_aia_set: IDNA encode when needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 16 14:48:59 2016 +0100
+
+ When writing alternative names to certificates ensure we write in ACE format
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 10:39:10 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 16:30:49 2016 +0100
+
+ tests: added pkcs7 verification with struct generated from openssl (with keyid)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 15:44:35 2016 +0100
+
+ tests: added pkcs7 verification with struct generated from openssl
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 25 10:23:00 2016 +0100
+
+ doc: added certificate for ECC with any purpose
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 16:40:15 2016 +0100
+
+ pkcs7: return GNUTLS_E_PK_SIG_VERIFY_FAILED on hash mismatch
+
+ In addition introduce a new error code to warn about no embedded data.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 16:33:18 2016 +0100
+
+ pkcs7: only print signer's issuer DN when DN has contents
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 14:51:15 2016 +0100
+
+ pkcs7: added recursive discovery of structure's signer
+
+ This uses the PKCS#7 certificate list as a pool of certificates
+ to generate a certificate chain that leads to our root CAs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 15:11:31 2016 +0100
+
+ pkcs7: on data verification failure log the signer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 13:17:41 2016 +0100
+
+ tests: added complex verification example using PKCS#7
+
+ That uses multiple intermediate certificates from the PKCS#7 structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 14:32:28 2016 +0100
+
+ doc: updated gnutls_x509_trust_list_verify_crt2()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 13:14:16 2016 +0100
+
+ pkcs7: pass the verification flags down to gnutls_x509_trust_list_verify_crt2, in find_signer()
+
+ This allows for flags like GNUTLS_VERIFY_DISABLE_TIME_CHECKS to apply when
+ verifying PKCS#7 structures.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 09:54:17 2016 +0100
+
+ pkcs7: corrected iteration over stored certificates
+
+ This allows to use all possibly stored certificates on chain discovery,
+ not only the first.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 09:53:58 2016 +0100
+
+ pkcs7: added debug logging on verification discovery
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 14:54:46 2016 +0100
+
+ errors.h: added _gnutls_reason_log
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 09:49:13 2016 +0100
+
+ errors.h: added _gnutls_cert_log
+
+ This log function allows to easily log the name of a certificate.
+
+Author: Andreas Schneider <asn@samba.org>
+Date: Thu Nov 24 17:31:45 2016 +0100
+
+ certtool: One if check is enough
+
+ Signed-off-by: Andreas Schneider <asn@samba.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 24 08:37:47 2016 +0100
+
+ corrected log message [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 21:09:03 2016 +0100
+
+ gnutls_idna_map was prefixed with underscore to avoid clashes with exported symbols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 14:37:47 2016 +0100
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 14:30:48 2016 +0100
+
+ avoid the use of c_isascii() and use c_isprint()
+
+ That latter detects correctly the printable characters we are
+ interested in.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 15:45:22 2016 +0100
+
+ tests: added unit tests for gnutls_idna_map()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 23 13:12:08 2016 +0100
+
+ IDNA code re-organization
+
+ That introduces the internal function gnutls_idna_map(), which
+ utilizes libidn and libunistring to convert hostnames to IDNA ACE
+ form.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:57:01 2016 +0100
+
+ tests: updated outputs to reflect new fingerprint/keyid formats
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:56:41 2016 +0100
+
+ tests: made tmp files unique
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:43:25 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:42:14 2016 +0100
+
+ Align the printing of a certificate's fingerprint with the key ID printing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:35:58 2016 +0100
+
+ Print a key's or certificate's key ID with SHA256 in addition to SHA1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 16:18:01 2016 +0100
+
+ certtool: address compiler warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 22 09:31:19 2016 +0100
+
+ doc: document the RFC7613 normalization of passwords [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 21:16:28 2016 +0100
+
+ unistring: include only the required categories
+
+ In addition fix the license text of the included library.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 16 15:50:39 2016 +0100
+
+ server_name: log server name sent
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 16 16:47:15 2016 +0100
+
+ x509/output: improve log message on embedded null
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 12:00:28 2016 +0100
+
+ build-aux: added unused-parameter.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 11:36:43 2016 +0100
+
+ .gitlab-ci.yml: explicitly specify --with-included-unistring when needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 11:32:09 2016 +0100
+
+ hooks.m4: corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 10:52:23 2016 +0100
+
+ .gitlab-ci.yml: ignore syntax-check issues caused by included unistring
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 10:11:32 2016 +0100
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 09:38:38 2016 +0100
+
+ unconditionally include unistring code
+
+ That simplifies internationalization support, at the cost of
+ including a version of libunistring, which is used on systems
+ which do not ship it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 21 09:20:36 2016 +0100
+
+ lib: added unistring sub-library
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 20 17:11:57 2016 +0100
+
+ updated auto-generated files for gnutls_utf8_password_normalize()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 20 17:08:55 2016 +0100
+
+ tests: enhanced str-unicode with GNUTLS_UTF8_IGNORE_ERRS flag
+
+ That is, enhanced to check the tolerable variant of gnutls_utf8_password_normalize()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 18:26:21 2016 +0100
+
+ .gitlab-ci.yml: added build without libunistring
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 10:42:32 2016 +0100
+
+ doc: mention the RFC7613 normalization and the libunistring dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 20 17:03:02 2016 +0100
+
+ tolerate non-valid UTF8 passwords when decrypting
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 14:42:26 2016 +0100
+
+ tests: addressed compiler warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 14:40:19 2016 +0100
+
+ _gnutls_utf8_to_ucs2: normalize to NFC UTF16 output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 14:31:24 2016 +0100
+
+ openssl_hash_password: normalize the password prior to use
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 12:55:22 2016 +0100
+
+ TPM: normalize the password prior to use
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 10:53:40 2016 +0100
+
+ _gnutls_calc_srp_sha: normalize the password prior to use
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 10:50:42 2016 +0100
+
+ gnutls_x509_crq_set_challenge_password: normalize the password prior to use
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 10:48:04 2016 +0100
+
+ PKCS#7/8: normalize the password according to rfc7613
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 10:53:37 2016 +0100
+
+ gnutls.pc: use the LT version of the lib variables
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 8 15:24:26 2016 +0100
+
+ Use libunistring when present instead of iconv()
+
+ That allows us to rely to a single provider for unicode
+ functionality.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 8 15:24:00 2016 +0100
+
+ tests: added unit tests for gnutls_utf8_password_normalize()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 8 13:00:16 2016 +0100
+
+ Added function for UTF-8 normalization based on RFC7613
+
+ This introduces gnutls_utf8_password_normalize() and a dependency on libunistring.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 17:12:02 2016 +0100
+
+ tests: added test suite with PKCS#8 files that have invalid encryption
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 16:30:46 2016 +0100
+
+ PKCS#5,7 decryption: verify the correctness of padding
+
+ That is, for block ciphers (i.e., cbc), verify that all the padding bytes
+ match the expected contents according to RFC2898.
+
+ Relates #148
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 15:17:26 2016 +0100
+
+ PKCS#5,7 decryption: added sanity check on padding size
+
+ Relates #148
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 15:01:18 2016 +0100
+
+ PKCS#5,7 decryption: fail without leak on unknown MAC
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 14:54:00 2016 +0100
+
+ PKCS#5,7 decryption: fail early on invalid block sizes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 14:47:13 2016 +0100
+
+ PKCS#5,7 decryption: enforce limits in the support parameter sizes
+
+ This allows to detect invalid parameters early rather than later.
+ Relates #148
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 14:03:58 2016 +0100
+
+ updated auto-generated files for new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 10:03:29 2016 +0100
+
+ pkcs7 output: use the new functions for DN output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 09:52:16 2016 +0100
+
+ tests: account for the strict RFC4514 compliance reversal
+
+ Test the new functions only for the strict RFC4514 compliance to
+ output strings, and test the old functions for the legacy format.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 19:05:27 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 18:52:03 2016 +0100
+
+ x509 output: use the new functions for DN output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 18:31:37 2016 +0100
+
+ cleanups in _gnutls_buffer_to_datum()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 18:42:59 2016 +0100
+
+ certtool: use the new APIs for DN extraction
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 13:31:34 2016 +0100
+
+ _gnutls_x509_get_dn: when no data ensure we return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE
+
+ This aligns with the previous (prior to RFC4514 improvements) behavior of the function.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 16:20:01 2016 +0100
+
+ Introduced new functions to allow multiple DN parsing modes
+
+ The old DN parsing functions are changed to return the original
+ non-fully compliant with RFC4514 string format, while the new
+ ones return the compliant string by default. This allows applications
+ which relied on the previous format to continue functioning without
+ changes.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 9 17:19:48 2016 +0100
+
+ .gitlab-ci.yml: include root dir log files in all builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 11:06:26 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 14 12:57:53 2016 +0100
+
+ gl: removed invalid module name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 13 17:08:35 2016 +0100
+
+ tools: added explicit socket flag to skip TLS initialization
+
+ This allows proper error recovery when SOCKET_FLAG_RAW is specified
+ and initialize_session() fails.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 13 16:41:43 2016 +0100
+
+ gnutls-cli-debug: terminate sessions which cannot be re-used
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 13 16:15:42 2016 +0100
+
+ sockets: only use gnutls_bye on a valid socket session
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 10 06:39:32 2016 +0100
+
+ p11tool: --initialize will no longer reset user PIN
+
+ That is because it only resetted the user PIN and not the admin PIN,
+ while at the same time it had problems to cope with the case where
+ the URL changed between token initialization and PIN setting (which
+ is the case if --label is provided to --initialize).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 10 06:34:50 2016 +0100
+
+ p11tool: added options to initialize a user and admin's PIN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 11 09:01:39 2016 +0100
+
+ gnutls_store_pubkey: document the default hosts format
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 7 09:17:22 2016 +0100
+
+ _wrap_nettle_pk_verify: use FAIL_IF_LIB_ERROR prior to returning success
+
+ This will prevent verification to succeed if the system is in
+ error state.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 7 09:11:24 2016 +0100
+
+ fips140-2: moved PCT-test in wrap_nettle_generate_keys
+
+ This allows it to run in any potential scenario, i.e., any
+ call of _gnutls_pk_generate_keys().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 5 19:18:08 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 6 10:03:35 2016 +0100
+
+ .gitlab-ci.yml: use included libtasn1 in CI systems which do not have 4.9
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 3 10:31:27 2016 +0200
+
+ bumped the version of the minimum required libtasn1
+
+ We now require the latest version that supports OIDs
+ with elements that are longer than 32-bits.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 11:16:12 2016 +0200
+
+ tests: added check for the decoding of certificates with long OIDs
+
+ That is, OIDs which have an element which exceeds 2^32.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 10:42:58 2016 +0100
+
+ symbol-check: do not compare against symbols not exported by us
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 09:49:41 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 09:34:55 2016 +0100
+
+ tests: updated known ciphersuites test for CHACHA20-POLY1305 in the SECURE set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 09:10:18 2016 +0100
+
+ priorities: added CHACHA20-POLY1305 to SECURE set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 08:15:24 2016 +0100
+
+ released 3.5.6
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 07:58:48 2016 +0100
+
+ bumped versions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 4 07:56:33 2016 +0100
+
+ symbols.last: updated auto-generated file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 19 10:27:26 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 10:18:09 2016 +0100
+
+ tests: added test to ensure that gnutls_rnd() is not called during initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 24 08:30:06 2016 +0200
+
+ doc: explicitly state that rng self_test mustn't require rng initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 14:10:08 2016 +0200
+
+ deprecated _gnutls_rnd() in favor of exported gnutls_rnd()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 14:16:51 2016 +0200
+
+ rng: split initialization in preinit and init
+
+ This makes gnutls to initialize its random generator on the
+ first call to gnutls_rnd(). That prevents blocking due to
+ getrandom() on a constructor; that change allows to use gnutls-linked
+ applications even in early boot in systems where getrandom() blocks
+ waiting for entropy.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 11:40:12 2016 +0100
+
+ _gnutls_rnd_check: call _rnd_system_entropy_check directly
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 2 18:07:13 2016 +0100
+
+ x509: removed unused IDNA file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 2 13:24:59 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 2 08:29:25 2016 +0100
+
+ handshake: log advertized version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 2 08:13:38 2016 +0100
+
+ algorithms.h: removed exported prototype from internal header
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 1 18:39:38 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 17:23:16 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 16:59:20 2016 +0100
+
+ tests: added decoding of multi-value DN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 14:21:37 2016 +0100
+
+ x509_dn: forbid non-supported escaped chars on DN encoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 14:07:13 2016 +0100
+
+ tests: enhanced RFC4514 with arbitrary escaped strings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 14:07:27 2016 +0100
+
+ x509_dn: allow arbitrary escaped strings
+
+ In addition fail encoding on unescaped '+'. We do not support it
+ for DN encoding.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 14:46:49 2016 +0200
+
+ tests: modified to account for backwards-encoded DN (according to RFC4514)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 13:18:17 2016 +0100
+
+ tests: removed old README file
+
+ The description in the file had no relevance to the existing tests.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 13:00:14 2016 +0100
+
+ gnutls_x509_crt_set_*dn, gnutls_x509_dn_set_str: honor the reverse property of RFC4514
+
+ When converting an RFC4514 string to a DN ensure that the elements
+ are encoded in reverse order, as required by the RFC.
+
+ Resolves #111
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 15:35:44 2016 +0200
+
+ Encode string DNs backwards according to RFC4514
+
+ This makes the output string from functions such as gnutls_x509_crt_get*dn()
+ to comply with RFC4514 requirements in DN element order.
+
+ Relates #111
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 14:41:10 2016 +0100
+
+ Updated issue templates [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 31 14:35:22 2016 +0100
+
+ Added issue templates [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 29 23:45:18 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 29 23:31:00 2016 +0200
+
+ nettle: renamed system random generator-related files for clarity
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 14:34:10 2016 +0200
+
+ tests: introduced checks for gnutls_rnd() in multi-threaded scenario
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 14:33:53 2016 +0200
+
+ tests: introduced sanity checks in rng-fork
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 24 08:30:29 2016 +0200
+
+ drbg-aes-self-test: corrected free call
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 27 21:04:49 2016 +0200
+
+ tests: check for gnutls 3.3.x compatibility
+
+ That is, check whether the status request extension is not sent
+ by the server, if the server does not hold a status response. We
+ require that behavior to be backwards compatible with gnutls 3.3.x.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 26 17:51:11 2016 +0200
+
+ Reverted the behavior of sending a status request extension even without a response
+
+ That is, we no longer reply to a client's hello with a status request, with
+ a status request extension. Although that behavior which was introduced
+ in 6b76e0c899b1ff08df9bd9b41588f771f050be89 is legal, it creates incompatibility
+ issues with gnutls 3.3.x branch. That is because versions prior 3.3.26
+ translates the presence of the extension as a guarrantee that the status
+ response data will be sent. Even though, that is false assumption we
+ replicate the previous behavior to allow such clients to connect to
+ a gnutls 3.5.x server.
+
+ Relates !66
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Thu Oct 27 18:42:38 2016 +0300
+
+ tests: do not enable testpkcs11.sh twice
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Oct 22 14:24:16 2016 +0300
+
+ starttls: search for chat in sbin if it is not present in PATH
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Fri Oct 21 04:17:36 2016 +0300
+
+ Fix autoconf warnings in libopts.m4
+
+ Without this patch Autoconf will spam console with the following kind of
+ messages:
+
+ configure.ac:650: warning: AC_LANG_CONFTEST: no AC_LANG_SOURCE call detected in body
+ ../../lib/autoconf/lang.m4:193: AC_LANG_CONFTEST is expanded from...
+ ../../lib/autoconf/general.m4:2740: _AC_RUN_IFELSE is expanded from...
+ ../../lib/m4sugar/m4sh.m4:639: AS_IF is expanded from...
+ ../../lib/autoconf/general.m4:2759: AC_RUN_IFELSE is expanded from...
+ ../../lib/m4sugar/m4sh.m4:639: AS_IF is expanded from...
+ ../../lib/autoconf/general.m4:2042: AC_CACHE_VAL is expanded from...
+ src/libopts/m4/libopts.m4:386: LIBOPTS_RUN_FOPEN_TEXT is expanded from...
+ src/libopts/m4/libopts.m4:425: INVOKE_LIBOPTS_MACROS is expanded from...
+ src/libopts/m4/libopts.m4:560: AM_COND_IF is expanded from...
+ src/libopts/m4/libopts.m4:581: LIBOPTS_CHECK is expanded from...
+ configure.ac:650: the top level
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Oct 22 02:18:40 2016 +0300
+
+ cfg.mk: fix m4 files removal
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 17:45:03 2016 +0200
+
+ tests: better check for gnutls_ecc_curve_get result
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 17:30:43 2016 +0200
+
+ Terminate handshake if only unknown or disabled signatures are advertized by the peer
+
+ That is, do not attempt to proceed assuming that the peer supports SHA-1.
+
+Author: Dmitry Baryshkov <dbaryshkov@gmail.com>
+Date: Sat Oct 22 03:28:14 2016 +0300
+
+ Fix compilation of tests if nettle is not installed in standard path
+
+ Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 25 08:03:32 2016 +0200
+
+ gnutls-cli-debug: corrected TLS1.2 detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 24 08:33:42 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 22 09:41:45 2016 +0200
+
+ modified the gnutls_certificate_set_key* change
+
+ While the change was fully backwards compatible for applications that were
+ adding a single certificate, and applications that were checking for negative
+ errors codes, many applications do not. As this may cause incompatibility issues
+ with software properly utilizing the previously documented API, the change
+ is reverted, and applications need to explicitly enable a flag (GNUTLS_CERTIFICATE_API_V2)
+ in the credentials structure for the set_key functions to return an index.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 19 23:06:59 2016 +0200
+
+ tests: removed nohats.ca from testdane
+
+ The host seems to be unreliable.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 16:43:47 2016 +0200
+
+ .travis.yml: use as many jobs as CPUs in OSX
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 16:14:32 2016 +0200
+
+ .travis.yml: do not run the public submodule checks of maint.mk
+
+ These seem to be problematic to detect modification and are preventing
+ the CI from operating.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 13:16:50 2016 +0200
+
+ .travis.yml: simplified the submodule checkout
+
+ The default submodule initialization in travis caused the MacOSX builds to fail.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 13:15:19 2016 +0200
+
+ Added casts to prevent compiler warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 13:14:57 2016 +0200
+
+ corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 12:10:56 2016 +0200
+
+ README.md: corrected link to travius build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 20 15:58:38 2016 +0200
+
+ .travis.yml: added support for compiling in macosx
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 11:02:30 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 11:01:43 2016 +0200
+
+ tests: added checks for the new GNUTLS_NO_TICKETS flag
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 21 10:26:13 2016 +0200
+
+ gnutls_init: added GNUTLS_NO_TICKETS flags
+
+ These flags allow the callers to disable the automatically enabled
+ session tickets. This could be done only with GNUTLS_NO_EXTENSIONS
+ which also disabled other useful extensions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 20 09:26:10 2016 +0200
+
+ tests: added pkcs11-privkey-export
+
+ This checks whether the public parts of RSA private and public keys
+ can be properly extracted from a PKCS#11 module.
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Wed Oct 19 13:41:55 2016 +0200
+
+ Expose CKA_PUBLIC_EXPONENT and CKA_MODULUS for private keys too
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Wed Oct 19 09:17:52 2016 +0200
+
+ tests/pkcs11: Return also CKA_CLASS
+
+Author: Jakub Jelen <jjelen@redhat.com>
+Date: Tue Oct 18 15:28:39 2016 +0200
+
+ tests/pkcs11: Expose SUBJECT for certificates, PUBLIC_EXPONENT and MODULUS for public keys to widen compatibility
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 15:42:52 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 13:45:34 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 09:24:02 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 10:13:56 2016 +0200
+
+ certtool: allow setting key purposes for non-CA certificates
+
+ That is, allow setting code signing, or time stamping key purpose
+ in certificates that are not marked as CA. The previous restriction
+ served no purpose.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 10:01:49 2016 +0200
+
+ certtool: introduce key purpose checks in p7 direct verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 09:22:59 2016 +0200
+
+ x509: introduced gnutls_x509_crt_check_key_purpose()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 15:07:03 2016 +0200
+
+ gnutls_x509_crt_verify_data2: introduce constraints checks on the provided certificate
+
+ That is check the provided certificate for validity in time and key usage.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 18 10:02:29 2016 +0200
+
+ tests: introduced verification constraints checks for PKCS#7 structures
+
+ That is, key purpose checks and more elaborate time checks.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 12:00:41 2016 +0200
+
+ gnutls-serv: use the included known DH parameters by default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 17 11:54:51 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 12:02:31 2016 +0200
+
+ certtool: manpage update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 12 08:34:13 2016 +0200
+
+ getfuncs-map.pl: ignore the ffdhe exported parameters
+
+ That is ignore the new variables exported which are not functions, and
+ thus cannot be detected by getfuncs-map.pl.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 19:26:44 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 20:10:37 2016 +0200
+
+ tests: crl-test: use a unique temp file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 20:01:27 2016 +0200
+
+ tests: added sanity check for included primes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 19:36:26 2016 +0200
+
+ doc: discuss the set_known_dh_params and use it in the examples
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 19:25:52 2016 +0200
+
+ tests: check gnutls_psk_set_server_known_dh_params
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 19:22:25 2016 +0200
+
+ tests: check gnutls_anon_set_server_known_dh_params
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 19:12:16 2016 +0200
+
+ tests: check gnutls_certificate_set_known_dh_params
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 16:42:28 2016 +0200
+
+ DH: introduced gnutls_*_set_known_dh_params()
+
+ That is, the functions gnutls_certificate_set_known_dh_params(),
+ gnutls_anon_set_server_known_dh_params(),
+ gnutls_psk_set_server_known_dh_params().
+ These functions allow to statically set the DH parameters, based
+ on the RFC7919 FFDHE parameters. This can simplify server configuration
+ by allowing DH without loading parameters from file.
+
+ Relates #37
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 16:18:22 2016 +0200
+
+ certtool: --get-dh-params will output the FFDHE primes instead of the SRP primes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 16:05:57 2016 +0200
+
+ DH: export the FFDHE Diffie-Hellman values
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 16:13:29 2016 +0200
+
+ .gitlab-ci.yml: use fedora's mingw-cmocka packages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 16:12:44 2016 +0200
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 15:04:41 2016 +0200
+
+ tests: added check for PKCS#7 catalog file parsing and data extracting
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 15:46:05 2016 +0200
+
+ tests: updated pkcs7 text outputs to account for certtool update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 14:55:57 2016 +0200
+
+ certtool: --p7-info will include the PKCS#7 encoded data in PEM format
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 14:50:25 2016 +0200
+
+ tests: replaced large test2.cat with a smaller file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 13:13:26 2016 +0200
+
+ certtool: improve text on missing options for cert generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 12:57:31 2016 +0200
+
+ Revert "certtool: improve text on missing options for cert generation"
+
+ This reverts commit 7daed1fd0602bce7495d252f1a9b638fc41e38d3.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 10:22:07 2016 +0200
+
+ handshake: set a maximum number of warning messages that can be received per handshake
+
+ That is to avoid DoS due to the assymetry of cost of sending an alert vs the cost
+ of processing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 10:08:35 2016 +0200
+
+ record: disallow parsing of alert messages prior to session start
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 10:07:58 2016 +0200
+
+ tests: added check to verify that the server will bail out after receiving only alerts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 14 09:59:22 2016 +0200
+
+ tests: added check to verify that the server will bail out after many alerts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 17:01:16 2016 +0200
+
+ certtool: improve text on missing options for cert generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 16:55:00 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 16:51:19 2016 +0200
+
+ tools: removed redudant messages on PIN re-use
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 16:48:52 2016 +0200
+
+ p11tool: avoid asking the security officer PIN twice on initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 16:41:04 2016 +0200
+
+ p11tool: improved messages on token initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 16:37:45 2016 +0200
+
+ p11tool: corrected check of PIN existance in token initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 13:10:52 2016 +0200
+
+ doc: set a default handshake timeout on example server
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 13:09:35 2016 +0200
+
+ serv: set a timeout value in handshake
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 08:56:45 2016 +0200
+
+ tests: added check for Encrypt-then-MAC under DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 13 08:54:52 2016 +0200
+
+ tests: cleanups in tls-etm.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 12 13:36:01 2016 +0200
+
+ gnutls_pkcs7_get_embedded_data: added GNUTLS_PKCS7_EDATA_GET_RAW flag
+
+ This flag allows the export of the stored embedded data with any wrapping
+ encoding included. This in particular, it allows to read the data from the
+ microsoft catalog PKCS#7 structures, which store as embedded data elements
+ of a SEQUENCE, but only authenticate the inner parts without the bytes
+ forming the SEQUENCE header.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 21:33:24 2016 +0200
+
+ configure: automatically disable non-suiteb curves
+
+ That is, if the installed nettle doesn't provide the
+ nettle_secp_192r1 symbol.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 20:41:18 2016 +0200
+
+ doc update
+
+Author: Colin Walters <walters@verbum.org>
+Date: Tue Oct 11 11:28:39 2016 -0400
+
+ priorities: Do read crypto policy files with mtime of zero
+
+ In a default Fedora Atomic Host installation,
+ `/etc/crypto-policies/backends/gnutls.config` is a symlink to the
+ default in `/usr/share/`. On an OSTree-managed system, files in
+ `/usr` have an mtime of zero (to help deduplication).
+
+ The simple fix here is to still try to read the first time, even if
+ the file has an mtime of zero.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 14:11:27 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 13:55:56 2016 +0200
+
+ certtool: corrected use of gnutls_pkcs7_get_embedded_data()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 13:06:48 2016 +0200
+
+ pkix.asn: simplified ASN.1 description by eliminating pkcs-7-ContentType
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 13:03:45 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 11 11:30:28 2016 +0200
+
+ certtool: print the enacapsulated content OID on verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 15:25:31 2016 +0200
+
+ tests: added checks for the decoding of various PKCS#7 structures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 15:19:16 2016 +0200
+
+ pkcs7: print the eContent type in output functions if it does not match the defaults
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 12:06:37 2016 +0200
+
+ pkcs7: allow unknown and legacy signature data OIDs to be imported
+
+ This allows to decode very old PKCS#7 structures where the content is not
+ an octet string. In addition, it introduces gnutls_pkcs7_get_embedded_data_oid()
+ to obtain the OID of the signature data.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 19:07:41 2016 +0200
+
+ certtool: --p7-info can be combined with --p7-show-data to display embedded data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 10 09:48:05 2016 +0200
+
+ lib: link with LTLIBDL instead of LIBDL
+
+ It fixes compilation issues on some systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 20:01:06 2016 +0200
+
+ released 3.5.5
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 19:27:39 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 19:04:30 2016 +0200
+
+ doc: mention gnutls_session_ext_register and its supplemental data equivalent
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 18:56:52 2016 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 14:21:09 2016 +0200
+
+ TLS extensions: only cache the extension IDs from exts that the server supports
+
+ That avoids imposing any artificial limits on the number of extensions that
+ a server can handle.
+
+ Resolves #136
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Oct 9 14:05:07 2016 +0200
+
+ tests: check the registration of multiple extensions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 8 07:24:02 2016 +0200
+
+ doc: added gnutls_datum_t and giovec_t to indexes
+
+ Resolves #137
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 15:24:25 2016 +0200
+
+ pkcs7: removed any limits in hex encoding of attributes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 16:10:19 2016 +0200
+
+ certtool: lift any limits in print_raw()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 7 14:17:52 2016 +0200
+
+ certtool: added safety net when generating a certificate request
+
+ That is, do not allow specifying --generate-request --load-pubkey without
+ specifying --load-privkey. Previously if --load-pubkey would have been
+ used, it would have been ignored, causing confusion to the users.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 6 08:50:39 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 20:10:46 2016 +0200
+
+ Makefile.am: improved the files-update output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 20:09:21 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 13:51:05 2016 +0200
+
+ _gnutls_utf8_to_ucs2: force NFC normalization form in windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 11:04:54 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 11:41:23 2016 +0200
+
+ tests: added checks for gnutls_session_supplemental_register
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 11:33:55 2016 +0200
+
+ Added session-specific supplemental data handling
+
+ This allows a caller to add supplemental data handling which will
+ only be made available for a specific session.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 10:43:29 2016 +0200
+
+ tests: added checks for gnutls_session_ext_register
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 30 18:53:09 2016 +0200
+
+ Added session-specific TLS extensions
+
+ This allows a caller to add extensions which will be made available
+ for a specific session.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Oct 5 14:30:33 2016 +0200
+
+ guile: Implement session record ports using the Guile 2.2 API.
+
+ This allows the Guile bindings to be built and used with
+ Guile >= 2.1.4, which introduced a new port API.
+
+ * guile/src/core.c (USING_GUILE_BEFORE_2_2): New macro.
+ (session_record_port_type) [!USING_GUILE_BEFORE_2_2]: New definition.
+ (read_from_session_record_port, write_to_session_record_port)
+ (make_session_record_port) [!USING_GUILE_BEFORE_2_2]: New functions.
+ Conditionalize the other same-named functions on
+ USING_GUILE_BEFORE_2_2.
+ (scm_init_gnutls_session_record_port_type): Use
+ 'read_from_session_record_port' when !USING_GUILE_BEFORE_2_2.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Oct 5 14:30:32 2016 +0200
+
+ guile: Test 'set-session-transport-fd!'.
+
+ * guile/tests/session-record-port.scm: Use 'set-session-transport-fd!'
+ on the server side.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Oct 5 14:30:31 2016 +0200
+
+ guile: Guile 2.x 'uniform-vector-read!' replacement returns 0 upon EOF.
+
+ This problem was never hit in practice because our tests always got the
+ non-EOF case.
+
+ * guile/modules/gnutls/build/tests.scm (uniform-vector-read!) [guile-2]:
+ Return 0 upon EOF.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 10:01:20 2016 +0200
+
+ win32: install the .def files in libdir instead of bindir
+
+ Suggested by Eli Zaretskii.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 08:48:57 2016 +0200
+
+ certtool: include arpa/inet.h unconditionally
+
+ That is because we use inet_pton() which is either provided by the
+ OS, or by gnulib.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 08:46:08 2016 +0200
+
+ gnutls-cli: fix compilation warning in win32
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 08:44:05 2016 +0200
+
+ Fixed the version in libgnutls-openssl.def file
+
+ Previously the version set in that file would have
+ been (incorrectly) equal to the version of the main library.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 5 08:34:51 2016 +0200
+
+ tests: avoid using %zd for formatted output
+
+ It is not supported by windows.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 4 16:20:44 2016 +0200
+
+ tests: skip tests which depend on libidn functionality if build without libidn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 4 15:55:08 2016 +0200
+
+ tests: fixed compilation of pkcs11-privkey-always-auth
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 4 15:10:22 2016 +0200
+
+ Fix build of system/keys-win.c with older mingw
+
+ Patch by Eli Zaretskii <eliz@gnu>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 14:48:49 2016 +0200
+
+ tests: introduced further parallelization in provable* tests
+
+ This runs independent verification steps in parallel, improving running time significantly.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 14:40:06 2016 +0200
+
+ tests: provable-dh-default check is too slow and is only run when the complete suite is requested
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 14:25:06 2016 +0200
+
+ tests: split provable-privkey into multiple checks
+
+ This allows the tests to be run in parallel.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 14:17:52 2016 +0200
+
+ tests: provable-dh was split into two programs
+
+ This allows the test to be run more efficiently when run
+ in parallel.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 30 16:48:54 2016 +0200
+
+ .gitlab-ci.yml: do not run the full test suite on valgrind test
+
+ This allows the CI test to run on reasonable time.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 30 14:16:01 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 13:00:36 2016 +0200
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 30 13:08:53 2016 +0200
+
+ devel/openssl: updated to 1.1.0 release
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 29 15:41:23 2016 +0200
+
+ aarch64: added optimized AES-CCM mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 21:43:05 2016 +0200
+
+ Imported Andy Polyakov's implementation of AES-GCM in aarch64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 11:55:37 2016 +0200
+
+ Imported Andy Polyakov's implementation of AES in aarch64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 29 13:36:55 2016 +0200
+
+ Added HMAC-SHA* optimizations for aarch64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 23 14:55:37 2016 +0200
+
+ Imported Andy Polyakov's implementations for SHA* in aarch64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 12:53:43 2016 +0200
+
+ fix zero-termination in _gnutls_server_name_set_raw() for large server names
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 12:56:07 2016 +0200
+
+ _gnutls_check_id_for_change: added check for NULL username
+
+ This is not required, but may prevent from issues if code-reorganizations
+ which may set a NULL username, occur.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 12:58:17 2016 +0200
+
+ gnutls_*_crt_print: better error checking
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 10:29:29 2016 +0200
+
+ tests: added test for CKA_ALWAYS_AUTHENTICATE handling in PKCS#11
+
+ This checks whether GnuTLS properly calls login prior to any sign
+ operations when the object is marked as CKA_ALWAYS_AUTHENTICATE.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 11:11:55 2016 +0200
+
+ pkcs11: improved debugging output in pkcs11_login
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 3 10:22:44 2016 +0200
+
+ name constraints: removed unused variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 30 13:25:41 2016 +0200
+
+ tools: clarify errors when reading files
+
+ Previously certtool and ocsptool would report:
+ ```
+ $ certtool --generate-request --load-privkey=foo --outfile=bar
+ Generating a PKCS #10 certificate request...
+ reading --load-privkey: foo
+ ```
+
+ And that doesn't make apparent what the issue was. Modified
+ to print:
+ ```
+ error reading --load-privkey: foo
+ ```
+
+ Report and initial patch by Thibault Nélis.
+
+ Resolves !97
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 28 07:41:13 2016 +0200
+
+ p11tool: doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 23:42:01 2016 +0200
+
+ Removed C99 constructions in for-loops
+
+ These constructions although valid for C99 they are
+ being rejected by various compilers. Get rid of them.
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Tue Sep 27 11:04:16 2016 +0200
+
+ certtool: print correct size of EC keys
+
+ Previously certtool complained about key size if --curve is given:
+
+ $ certtool --generate-privkey --ecc --curve secp256r1 --outfile key.pem
+ Generating a -2147483646 bit EC/ECDSA private key...
+ Note that ECDSA keys with size less than 256 are not widely supported.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 09:51:56 2016 +0200
+
+ p11tool: documented the p11-kit relevancy of distrust and stapled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 09:39:09 2016 +0200
+
+ pkcs11: forbid PKCS#11 extensions to be used in other than trust modules
+
+ That is, only use the CKA_X_DISTRUSTED and the extension override in
+ p11-kit trust modules, to avoid conflicts with potentially other
+ PKCS#11 extensions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 11:46:24 2016 +0200
+
+ .gitlab-ci.yml: enabled valgrind tests build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 27 11:44:16 2016 +0200
+
+ tests: allow handshake-large-packet to run under valgrind
+
+ That is, initialize the allocated buffers with a known value.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 14:24:31 2016 +0200
+
+ p11tool: introduced the --mark-distrusted and --distrusted options
+
+ This allows to mark objects as distrusted, as well as list all
+ distrusted certificates (blacklisted) for a p11-kit trust module as:
+ p11tool --list-all-certs --distrusted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 14:23:24 2016 +0200
+
+ pkcs11: introduced flag GNUTLS_PKCS11_OBJ_FLAG_MARK_DISTRUSTED
+
+ This allows to mark objects as distrusted, as well as to be
+ able to list distrusted objects.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 14:00:32 2016 +0200
+
+ pkcs11: only staple extensions from a trust module when they are from a non-distrusted certificate
+
+ That is, make sure that the API for stapling extensions is only used
+ for non-distrusted (blacklisted) certificates. The reason is to avoid
+ duplicate extension entries from the p11-kit trust database. These
+ come from blacklisted certificates, and we have no reason to support
+ stapled extensions with blacklisted certificates.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 13:47:19 2016 +0200
+
+ p11tool: allow to export a certificate with its stapled extensions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 26 08:12:52 2016 +0200
+
+ gnutls_oid_to_ecc_curve: fix null pointer dereference
+
+ This addresses issue where an unknown curve would cause a
+ null pointer dereference. This was introduced with the addition
+ of X25519. Reported by Theofilos Petsios.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 23 16:01:07 2016 +0200
+
+ Only send the status request extension on cert authentication
+
+ That is, do not both asking for it, or replying to it, if we are
+ not using any certificates.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 14:49:57 2016 +0200
+
+ gdoc: improved the detection and display of escaped characters (@%)
+
+ This allows to properly display strings like %COMPAT and @SYSTEM
+ in the manual and the manpages.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 13:46:19 2016 +0200
+
+ doc: gnutls_priority_init: fixed %COMPAT [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 12:08:45 2016 +0200
+
+ .gitlab-ci.yml: corrected debian build's dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 11:07:45 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 21 17:59:18 2016 +0200
+
+ On client side allow signing with the signature algorithm of our cert
+
+ That allows to sign for example with DSA-SHA1 as client even if we do not
+ allow DSA-SHA1 as signature algorithm for server's certificate. This allows
+ to use a deprecated certificate without enabling deprecated algorithms
+ globally.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 11:01:22 2016 +0200
+
+ _gnutls_session_get_sign_algo: always return GNUTLS_SIGN_UNKNOWN on failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 10:35:13 2016 +0200
+
+ tests: added check for server-side ECDSA keys
+
+ These tests check whether a server ECDSA key will be rejected by
+ the client in case the client has no ECDSA signature algorithms
+ available.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 09:54:12 2016 +0200
+
+ tests: added check for client-side DSA key
+
+ This checks whether a client can use and send a DSA key, even
+ if DSA is not enabled (which should prohibit the server from providing
+ a DSA certificate).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 22 09:21:06 2016 +0200
+
+ certtool: do not require a certificate to generate a PKCS#12 file
+
+ That is, allow generating PKCS#12 files with private keys only as well.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 20 09:00:23 2016 +0200
+
+ .gitlab-ci.yml: added debian build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 20 14:31:12 2016 +0200
+
+ README.md: depend on softhsm2 and net-tools on debian
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 15:36:21 2016 +0200
+
+ tests: mini-server-name: skip invalid UTF-8 check if compiled without libidn
+
+ This allows the test suite to run in systems without libidn. Reported
+ by Thomas Klausner.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 14:55:24 2016 +0200
+
+ tests: added the macros test_fail() and test_success()
+
+ These macros allow test programs which run multiple checks,
+ to report the name of the check failed. Modified mini-server-name
+ and x509-dn-decode to use the macro.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 18:55:59 2016 +0200
+
+ cfg.mk: removed invalid rule in web target
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 14:24:10 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 14:12:56 2016 +0200
+
+ added debugging message when session fails due to handshake hash buffer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 08:02:14 2016 +0200
+
+ tests: check whether large packets are allowed on the handshake
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 08:01:24 2016 +0200
+
+ Do not allow sending overflowed extensions field
+
+ That is, restrict the extensions to a 2^16 total size.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 19 07:42:41 2016 +0200
+
+ tests: minor improvements in mini-extension
+
+ This will improve recovery from error conditions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 16 13:12:50 2016 +0200
+
+ Increased the maximum size allowed for handshake messages to 128kb
+
+ This would allow the library to cope with larger packets, as well
+ as TLS 1.3 hellos. Suggested by Hubert Kario.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 17 12:52:41 2016 +0200
+
+ tests: added check for insecure key
+
+ That is, a check which verified whether a connection to a server with
+ a very small key will fail the certificate verification check.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 17 11:43:45 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 17 11:31:29 2016 +0200
+
+ Introduced separate error codes for invalid private and public keys
+
+ This allows functions like decryption and verification to report
+ the specific issue they encountered on public key error.
+ The new codes are GNUTLS_E_PK_INVALID_PUBKEY and GNUTLS_E_PK_INVALID_PRIVKEY
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 15 16:50:26 2016 +0200
+
+ .gitlab-ci.yml: no longer require gnutls-devel
+
+ This package is no longer needed to run abi-check.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 15 16:49:37 2016 +0200
+
+ Makefile: abi-check no longer require gnutls headers to be installed
+
+ This addresses the issue of requiring gnutls-devel in the CI system
+ to run abi-check.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 15:17:29 2016 +0200
+
+ doc: remove the conditional self_test functions
+
+ Also prevent them by re-entering the documented functions list
+ by restricting the header files that contribute functions to the
+ known list defined by $(HEADER_FILES).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 10:37:54 2016 +0200
+
+ Makefile.am: introduced 'make files-update' rule
+
+ This rule updates the makefiles in doc/ and the kept symbol list.
+ This allows for easier automation of the symbol change 'make dist'
+ breakages.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 10:33:00 2016 +0200
+
+ manpages: delete comparison temp file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 10:30:09 2016 +0200
+
+ Makefile.am: symbol changes were made more elaborate
+
+ During make dist, the makefile will report the appropriate
+ symbol change message with instructions and fail.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 10:02:48 2016 +0200
+
+ updated doc and symbol files for gnutls_certificate_set_ocsp_status_request_function2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 10:00:42 2016 +0200
+
+ Makefile.am: print the symbols.last diff on make dist
+
+ This allows to manually verify the contents before overriding
+ the old file.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 17:23:07 2016 +0200
+
+ doc: allow creation of gnutls.epub without running epub-fix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 15:50:52 2016 +0200
+
+ .gitlab-ci.yml: use nproc as argument to 'make -j'
+
+ That way, we use as many make processes, as the number of
+ CPUs in the CI system.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 15:31:13 2016 +0200
+
+ .gitlab-ci.yml: added build which runs 'make dist'
+
+ This tests whether the manpages, info, html, pdf and epub
+ manual are properly generated, and whether any new functions
+ were included into makefiles.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 15:30:07 2016 +0200
+
+ doc: fixed the epub documentation generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 20:18:03 2016 +0200
+
+ gnutls_certificate_set_ocsp_status_request_file: mention version it was enhanced
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 20:11:28 2016 +0200
+
+ doc: corrected typo
+
+Author: Alex Monk <krenair@gmail.com>
+Date: Mon Sep 12 18:24:49 2016 +0100
+
+ Add ECDHE-* to the priority string docs for key exchange algorithms
+
+ GNUTLS_KX_ECDHE_PSK was added in 2.99.3 (released 2011-06-18)
+ The other two were added in 2.99.2 (released 2011-05-26)
+
+ Signed-off-by: Alex Monk <krenair@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 08:54:42 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 08:49:10 2016 +0200
+
+ .gitlab-ci.yml: added check for position dependent code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 08:46:51 2016 +0200
+
+ Makefile.am: added check for position dependent code
+
+ This check will verify that the generated library doesn't contain
+ position dependent code. It depends on elf utilities.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 13 08:38:36 2016 +0200
+
+ openssl asm: reverted to AESNI-x86 code to gnutls 3.4.x code
+
+ The newer code was creating position dependent code.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 11:59:37 2016 +0200
+
+ tests: added checks to verify server understanding of UTF8 hostnames
+
+ This verifies whether a server can understand and serve requests
+ which contain UTF-8 server names.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 11:51:07 2016 +0200
+
+ tests: set_key: fixed the time override
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 11:23:25 2016 +0200
+
+ tests: set_key: enabled failure_mode test
+
+ Also eliminated memory leaks related to it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 10:50:43 2016 +0200
+
+ Added IDNA support in server side
+
+ Any server names provided to server side by the gnutls_certificate_set_*
+ functions, are converted to IDNA format for comparison with client provided
+ values.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 10:52:18 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 10:48:10 2016 +0200
+
+ .gitlab-ci.yml: restrict the freebsd builds to local branches only
+
+Author: Alex Monk <krenair@gmail.com>
+Date: Sun Sep 11 22:10:14 2016 +0100
+
+ Add SIGN-ECDSA-SHA* to the priority strings docs
+
+ There were added in version 2.99.2, 2011-05-26
+
+ Signed-off-by: Alex Monk <krenair@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 10:22:37 2016 +0200
+
+ gnutls_certificate_set_*key: ensure proper cleanup on key mismatch failures
+
+ That is, ensure that we keep no local references that are shared with
+ the caller, and that we properly free all initialized values.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 12 10:23:48 2016 +0200
+
+ tests: check key mismatch on gnutls_certificate_set_*key
+
+ That is, check whether these functions can successfully
+ recover from such condition, without leaks or double freeing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 8 15:32:06 2016 +0200
+
+ tests: added unit testing for gnutls_certificate_set_ocsp_status_request_function2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 8 15:14:37 2016 +0200
+
+ tests: added unit tests for gnutls_certificate_set_x509_key()
+
+ In addition these tests verify that the expected index is returned
+ and that can be used with gnutls_certificate_get_crt_raw() afterwards.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 8 15:03:00 2016 +0200
+
+ tests: enhanced set_x509_key tests to include index verification
+
+ That is, verify that correct indexes are returned, and these
+ can be used with gnutls_certificate_get_crt_raw() afterwards.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 8 13:48:30 2016 +0200
+
+ tests: enhanced set_x509_key_file tests to include index verification
+
+ That is, verify that correct indexes are returned, and these
+ can be used with gnutls_certificate_get_crt_raw() afterwards.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 17:55:38 2016 +0200
+
+ tests: more checks for functionality of gnutls_certificate_set_ocsp_status_request_file
+
+ This introduces checks for the cases where gnutls_certificate_set_ocsp_status_request_file()
+ is called with multiple indexes, to set an OCSP response for different
+ certificates. The tests then verify whether the expected OCSP response
+ is received.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 14:49:35 2016 +0200
+
+ Added gnutls_certificate_set_ocsp_status_request_function2
+
+ That introduces a new function to allow setting an OCSP status
+ request handling function per certificate. Furthermore it repurposes
+ the flag parameters to an index option on gnutls_certificate_set_ocsp_status_request_file.
+
+ The changes above allow setting a different OCSP status response
+ file per certificate, and a different function. The indexes they
+ rely on to associate with existing certs are the indexes returned
+ by the gnutls_certificate_set_key() and friends functions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 13:38:19 2016 +0200
+
+ All the key and chain set functions return an index
+
+ When setting key and certificate material to a gnutls_certificate_credentials_t
+ structure, the corresponding set functions will return an index.
+ That index could be used later either on the get functions, or
+ when setting corresponding data (e.g., an OCSP response).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 13:29:54 2016 +0200
+
+ doc: clarifications in gnutls_certificate_set_ocsp_status_request_function()
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Sep 11 16:00:57 2016 +0200
+
+ Typo fixes found by lintian.
+
+ incosistent, ommited
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 20:24:43 2016 +0200
+
+ .gitlab-ci.yml: added code-coverage output to clang build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 19:40:25 2016 +0200
+
+ .gitlab-ci.yml: the code-coverage command will always succeed
+
+ This works around random failures while calculating the code coverage.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 19:37:45 2016 +0200
+
+ .gitlab-ci.yml: moved commonly installed packages into the before_script field
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 12:57:04 2016 +0200
+
+ .gitlab-ci.yml: added syntax check build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 12:51:11 2016 +0200
+
+ cfg.mk: revived 'make release'
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 12:21:59 2016 +0200
+
+ several spacing fixes to keep syntax-check happy
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:51:37 2016 +0200
+
+ avoid the usage of '-a' and '-o' bash options
+
+ This keeps syntax-check happy.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:44:58 2016 +0200
+
+ avoid the usage of strncpy
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:40:51 2016 +0200
+
+ removed signal.h from files that wasn't used at
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:38:35 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:38:08 2016 +0200
+
+ gnutls_x509_cidr_to_rfc5280: removed double semi-colon
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:37:32 2016 +0200
+
+ removed c-ctype.h from files that wasn't used at
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:36:27 2016 +0200
+
+ configure.ac: quote parameters when needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:35:51 2016 +0200
+
+ removed assert.h from files that wasn't used at
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:34:53 2016 +0200
+
+ POTFILES: added libdane files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:25:15 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 11 11:23:15 2016 +0200
+
+ tests/tools: avoid non-null check before free()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 23:02:13 2016 +0200
+
+ latex manual: added backwards compatibility options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 11:04:51 2016 +0200
+
+ .gitlab-ci.yml: windows DLL builds now include all required dependencies
+
+ Also improved naming conventions for builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 07:49:59 2016 +0200
+
+ inet_ntop4: casted signed/unsigned comparison
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 07:48:22 2016 +0200
+
+ system.h: undefine macros before defining them
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 10 07:44:21 2016 +0200
+
+ _gnutls_fbase64_decode: use memsub macro instead of casts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 9 15:04:52 2016 +0200
+
+ gnutls-cli: use gnutls_set_default_priority if no priorities are given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 9 15:01:05 2016 +0200
+
+ gnutls-serv: removed '...' from documentation
+
+ That caused caused problems in generated manpage.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 9 13:59:05 2016 +0200
+
+ configure: better document the random generator variant used
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 8 07:30:33 2016 +0200
+
+ released 3.5.4
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 22:44:08 2016 +0200
+
+ .gitlab-ci.yml: corrected wrong operation in minimal build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 22:25:47 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 22:20:10 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 13:17:56 2016 +0200
+
+ bumped versions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 13:16:41 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 09:30:18 2016 +0200
+
+ tests: do not run pkcs12-utf8 under windows
+
+ This test required to pass UTF8 data under command line, and that
+ doesn't seem to work under windows.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 7 08:45:24 2016 +0200
+
+ _gnutls_ucs2_to_utf8: corrected use of WideCharToMultiByte in windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 18:45:17 2016 +0200
+
+ tests: added debugging info in conv-utf8
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 16:45:19 2016 +0200
+
+ tests: don't build cmocka tests with libutils - they conflict
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 15:58:59 2016 +0200
+
+ .gitlab-ci.yml: keep config.log in windows builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 15:14:01 2016 +0200
+
+ .gitlab-ci.yml: corrected typo for libidn installation in windows64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 14:52:54 2016 +0200
+
+ .gitlab-ci.yml: install our internal cmocka for windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 13:18:10 2016 +0200
+
+ tests: added unit tests of _gnutls_utf8_to_ucs2 and _gnutls_ucs2_to_utf8
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 11:40:36 2016 +0200
+
+ libgnutls.map: export _gnutls_utf8_to_ucs2 and _gnutls_ucs2_to_utf8 for testing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 14:49:07 2016 +0200
+
+ pkcs12: enhanced to allow encrypting using UCS2 passwords
+
+ That is use _gnutls_utf8_to_ucs2() to convert the provided
+ password to UCS2.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 15:56:19 2016 +0200
+
+ _gnutls_ucs2_to_utf8: fixed null termination check in windows code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 14:48:24 2016 +0200
+
+ Added _gnutls_utf8_to_ucs2()
+
+ This function allows to convert between UTF8 to UCS2 big-endian.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 14:23:13 2016 +0200
+
+ tests: added tests for PKCS#12 decoding with UTF8 passwords
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 14:34:07 2016 +0200
+
+ pkcs7 encryption: corrected memory leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 14:54:30 2016 +0200
+
+ Makefile: local-code-coverage-output always succeeds
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Fri Sep 2 10:30:54 2016 +0200
+
+ x509: Adjust IP name constraints behavior
+
+ - Modified IPv4/IPv6 interaction in name constraints -- IPv4 and IPv6 no have empty intersection (previously: were treated independently).
+ - Current behavior is more conservative -- in case of IPv4 constraint cert, subcerts will not be able to have IPv6 addresses.
+ - Tests updated accordingly.
+ - Behavior now matches NSS.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 09:05:59 2016 +0200
+
+ tests: added checks to verify behavior in writing pkcs11 objects
+
+ That is, verify that private keys are marked as private by default,
+ and public objects are marked as non-private by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 09:00:20 2016 +0200
+
+ p11tool: eliminated memory leak in --list options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 6 08:49:01 2016 +0200
+
+ p11tool: do not mark written objects as private by default
+
+ That is, when --mark-private or --no-mark-private are not specified,
+ set non-private for public objects and private for private ones.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 18:16:57 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 18:15:25 2016 +0200
+
+ minitasn1: updated to latest git version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 18:08:50 2016 +0200
+
+ _gnutls_encode_ber_rs_raw: simplified
+
+ That is, use a single allocation for temporary data.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 13:05:17 2016 +0200
+
+ .gitlab-ci.yml: use fedora24 with address sanitizer
+
+ The fix in fbb9618b25b77c65e24a6ce224d53bc9a0b81457 addresses
+ the problems with asan in fedora24.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 13:01:31 2016 +0200
+
+ tests: use LSAN_OPTIONS instead of ASAN_OPTIONS
+
+ New versions of address sanitizer do not parse this file
+ otherwise.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 09:48:24 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 09:41:30 2016 +0200
+
+ tests: corrected detection of 64-bit systems in softhsm.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 09:37:51 2016 +0200
+
+ tests: added check for PKCS#11 signature validity
+
+ That is, tests whether our generated DSASignatureValue with PKCS#11
+ contains r, s values that are non-negative, i.e., are zero padded
+ when necessary. This utilizes _gnutls_decode_ber_rs_raw().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 5 09:29:24 2016 +0200
+
+ Introduced helper function _gnutls_decode_ber_rs_raw()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 3 11:39:57 2016 +0200
+
+ _gnutls_encode_ber_rs_raw: zero-pad values when necessary
+
+ This addresses issue when encoding values obtained via
+ PKCS#11 which may not be necessarily padded.
+
+ Resolves #122
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 3 10:23:49 2016 +0200
+
+ tests: template-test: use uniform way to detect 32-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 1 12:35:55 2016 +0200
+
+ .gitlab-ci.yml: use the gitlab.com shared runners
+
+ This removes the need to administer custom runners (except for
+ the FreeBSD runner which cannot run under Linux), makes the
+ testing on other platforms such as Debian simpler, and allows
+ merge requests to pass through the CI.
+
+Author: David Woodhouse <dwmw2@infradead.org>
+Date: Tue Aug 30 15:26:27 2016 +0100
+
+ Import DTLS sliding window validation from OpenConnect ESP code
+
+ In this implementation, the end of the sliding window is always advanced
+ to the latest received packet, and we accept up to 64 packets before
+ that one. We no longer refuse to accept packets because they are
+ *too* far ahead of what we've already seen.
+
+ Some of the test cases are fixed up accordingly.
+
+ This matches the code in OpenConnect esp-seqno.c at commit 314ac65.
+
+Author: Jussi Kukkonen <jussi.kukkonen@intel.com>
+Date: Wed Aug 31 11:04:06 2016 +0300
+
+ tools: Use correct include dir with minitasn
+
+ This allows compiling certtool without libtasn headers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 29 14:16:16 2016 +0200
+
+ nettle: removed unused variable in windows rng
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 29 13:52:24 2016 +0200
+
+ tests: don't run danetool.sh when not compiled with dane support
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 29 13:48:04 2016 +0200
+
+ tests: mini-dtls-record: modified expected order to account for new SW behavior
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 29 13:02:54 2016 +0200
+
+ dtls: ensure that the DTLS window doesn't get stalled
+
+ That is ensure that it is forwarded at least one place if more than 16
+ packets have been received since the first one.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 29 13:25:23 2016 +0200
+
+ tests: enhance the DTLS window unit test to account for lost packets
+
+ This adds tests for cases where many lost packets are encountered,
+ such as 50% of the packets received, as well as 3 consequent packets
+ being lost.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 16:52:19 2016 +0200
+
+ README.md: added coverage report [ci skip]
+
+Author: David Woodhouse <dwmw2@infradead.org>
+Date: Sun Aug 28 21:42:34 2016 +0100
+
+ gnutls_pkcs12_simple_parse: set the key value to null on failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 28 00:55:30 2016 +0200
+
+ tests: added basic operational check of gnutls_ocsp_resp_get_single()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 28 00:40:49 2016 +0200
+
+ gnutls_ocsp_resp_get_single: reorganized function to eliminate memory leaks
+
+ Simplified and optimized the function operation, by removing
+ unecessary memory allocations, as well as eliminate memory leaks
+ on certain error cases.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 27 17:00:22 2016 +0200
+
+ ocsp: corrected the comparison of the serial size in OCSP response
+
+ Previously the OCSP certificate check wouldn't verify the serial length
+ and could succeed in cases it shouldn't.
+
+ Reported by Stefan Buehler.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 11:35:50 2016 +0200
+
+ tools: eliminated memory leaks in deinitialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 11:28:51 2016 +0200
+
+ tools: allow socket_bye() to be used for non-polite terminations
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 26 11:14:19 2016 +0200
+
+ tests: added suppressions.valgrind in ocsp-tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 25 15:48:03 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 25 15:46:06 2016 +0200
+
+ tests: added check for the decoding of pbes1-des-md5 key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 25 17:27:16 2016 +0200
+
+ pkcs8: cleaned up PKCS#8 decoding from common code with PKCS#7
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 25 15:40:28 2016 +0200
+
+ pkcs8: added support for decryption with PBES1-DES-CBC-MD5
+
+ While this is a legacy (and insecure) cipher combination it is the
+ default output of openssl up until the 1.0.2 version. We introduce
+ this option to allow decrypting private keys from these versions of
+ openssl.
+
+Author: raspa0 <raspa0@protonmail.com>
+Date: Thu Aug 25 10:58:22 2016 +0200
+
+ fix memleak in pkcs11_get_random
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 25 09:57:55 2016 +0200
+
+ ocsptool: reduce memory leaks on execution
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 14:09:13 2016 +0200
+
+ tests: enable ocsp-must-staple-connection check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 16:17:20 2016 +0200
+
+ doc: be more explicit about the usage of gnutls_global_init/deinit [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 14:41:33 2016 +0200
+
+ tests: don't use piped tee in pkcs8-decode
+
+ It would prevent error codes from being detected in the tests.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 14:04:52 2016 +0200
+
+ ocsptool: corrected bug in session establishment
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 13:57:00 2016 +0200
+
+ tests: ocsp-tls-connection: no longer check for netcat; it was not needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 13:39:43 2016 +0200
+
+ tests: added decoding of key with pbes2 and SHA256 PRF
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 13:32:04 2016 +0200
+
+ Added support for decrypting PKCS#8 files which use HMAC-SHA256 as PRF
+
+ This improves compatibility with new openssl versions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 24 10:49:13 2016 +0200
+
+ Ported openssl format fix from openconnect
+
+ Patch by David Woodhouse
+
+Author: raspa0 <raspa0@protonmail.com>
+Date: Wed Aug 24 06:15:03 2016 +0000
+
+ src/pkcs11.c: fix mech_list out-of-bounds check
+
+Author: Philippe Proulx <eeppeliteloop@gmail.com>
+Date: Mon Aug 15 01:13:16 2016 -0400
+
+ gnutls_record_recv(): doc: push -> pull
+
+ Signed-off-by: Philippe Proulx <eeppeliteloop@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 16:32:34 2016 +0200
+
+ rnd-linux: added check for SYS_getrandom being defined
+
+ This allows to compile the getrandom() code in old Linux systems
+ which do not have the system call defined.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 16:29:09 2016 +0200
+
+ libdane: include minitasn1 headers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 17:11:53 2016 +0200
+
+ gnutls-cli: do not exit if fast open is not supported
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 13:21:07 2016 +0200
+
+ gnutls-cli: added bufferring in starttls read of packets
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 13:34:44 2016 +0200
+
+ tests: added basic test of STARTTLS over FTP for gnutls-cli
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 09:03:41 2016 +0200
+
+ tests: added basic starttls functionality testing on gnutls-cli
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 09:13:50 2016 +0200
+
+ gnutls-cli: exit with error code 2 on starttls errors
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 08:57:23 2016 +0200
+
+ tests: fixed fastopen.sh to operate from cmd
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 08:47:57 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 08:46:04 2016 +0200
+
+ gnutls-cli: fixed the behavior when --starttls or --starttls-proto is given
+
+ The change of moving the handshake process as part of the socket establishment
+ broke the starttls functionality in gnutls-cli. This change fixes that functionality.
+ Reported by Andreas Metzler.
+
+Author: SUMIT AGGARWAL <aggarwal.s@samsung.com>
+Date: Fri Aug 19 11:58:39 2016 +0200
+
+ Fix HANDLE_LEAK and memory leak issues.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 22 08:18:15 2016 +0200
+
+ gnutls-cli: print 'Handshake was completed'
+
+ The change of moving the handshake process as part of the socket
+ establishment, prevented the text 'Handshake was completed' from
+ being printed as part of a successful handshake. That message was
+ used by applications like gnus which use gnutls-cli. This patch
+ reverts that change and prints that message on successful handshakes.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 10 14:43:03 2016 +0200
+
+ tests: openpgp-certs tests were moved to cert-tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 10 14:07:03 2016 +0200
+
+ gnutls_key_generate: fail if the state of the library is invalid
+
+ Suggested by Stephan Mueller.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 10 13:35:33 2016 +0200
+
+ tests: mini-dtls-hello-verify: ignore SIGPIPE to avoid unexpected crashes
+
+ Resolves: #119
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 12:00:57 2016 +0200
+
+ gnutls_safe_renegotiation_status: changed return type to unsigned
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 11:12:16 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 10:54:09 2016 +0200
+
+ tests: removed unused variables from tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 10:45:00 2016 +0200
+
+ doc update
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Thu Jun 23 12:11:18 2016 +0200
+
+ tests: Add tests for X509 IP constraints
+
+ - Add dedicated test file name-constraints-ip for IP tests.
+ - Test the following:
+ * Generation and saving of valid name constraints.
+ * Trying to save invalid IP constraints.
+ * Reading the saved constraints.
+ * constraints_check() calls for both IPv4 and IPv6.
+ * IP constraints intersection (simple, empty, mediocre, complicated).
+ * IPv4/IPv6 constraints interaction and various corner cases.
+ - IPs/CIDRs are printed in logs in case of failure.
+ - Add 2 new chain tests (positive, negative).
+ - Add generated test executable to ignored files.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jun 29 11:25:59 2016 +0200
+
+ x509: Add support for IP constraints
+
+ - IP constraints are now checked against the subject alternative
+ name field.
+ - Implemented IP name constraints merging.
+ - Added IP constraints validity checking during loading and getting
+ the name constraints object from the user.
+ - Add a convenience function name_constraints_node_new that allocates
+ a name constraints node and sets its fields. Use this new function
+ where applicable.
+ - Add documentation for is_nc_empty, _gnutls_name_constraints_node_free,
+ _gnutls_name_constraints_intersect.
+ - Small improvements elsewhere (polishing).
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Aug 3 19:40:55 2016 +0200
+
+ tests: Add more IP conversion unit tests
+
+ - Renamed ip-in-cidr test to ip-utils.
+ - Added built binary to .gitignore.
+ - Added new tests for gnutls_x509_cidr_to_rfc5280.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 2 15:28:52 2016 +0200
+
+ tests: added unit test for ip_in_cidr function
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jun 29 11:23:40 2016 +0200
+
+ x509: Separate out IP handling functions
+
+ - Moved IP/CIDR to string conversion functions into separate
+ header and export privately for the use in tests.
+ - Placed ip_in_cidr() into separate header for easy testing
+ - Add publicly available function to convert text CIDR to RFC5280
+ format for the use in name constraints extension.
+ - certtool: Use GnuTLS exported CIDR functions instead of local ones.
+ - Export mask_to_prefix, mask_ip for internal GnuTLS use.
+ - Introduce new error value (malformed cidr) and add to description
+ functions in errors.c.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Thu Jun 23 12:33:15 2016 +0200
+
+ tests: Add corner case tests for name constraints, improve doc
+
+ - Added corner case test suite for DNS name constraints.
+ - Documentation update in chain tests.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Fri Jul 8 11:59:47 2016 +0200
+
+ Add more ignored files
+
+ * .tmp and .swp for text editor files
+ * Makefile.user created by Qt Creator
+ * gl/tests/ctype.h as it is generated from ctype.h.in
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Stefan Sørensen <stefan.sorensen@spectralink.com>
+Date: Mon Aug 8 13:31:18 2016 +0200
+
+ Change ca3 and related certificate to include an intermediate CA in the chain.
+
+ Also update a bunch of test-cases to support chains with an intermediate CA.
+
+ Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 10:14:08 2016 +0200
+
+ Revert "tests: check gnutls_certificate_get_x509_crt with more than one certificates"
+
+ This reverts commit f7d884720b128ef86f6b9dc9fc498be89faf1732.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 09:35:03 2016 +0200
+
+ tests: do not run srp test when no SRP support is compiled in
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 8 11:49:04 2016 +0200
+
+ tests: moved child status error checking code in utils.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 07:46:42 2016 +0200
+
+ latex: updated sources for new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 07:28:27 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 9 07:23:36 2016 +0200
+
+ released 3.5.3
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 8 16:30:10 2016 +0200
+
+ gnutls_transport_set_fastopen: added flags options
+
+ This will allow minor modifications to the semantics of the function
+ in the future, without introducing a new API.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 8 16:22:42 2016 +0200
+
+ doc update
+
+Author: Stefan Sørensen <stefan.sorensen@spectralink.com>
+Date: Mon Aug 8 13:31:15 2016 +0200
+
+ Fix gnutls_pkcs12_simple_parse to always extract the complete chain
+
+ gnutls_pkcs12_simple_parse was only collecting extra certificates that was
+ possible elements of the certificate chain when the extra_certs argument was
+ not NULL. Fix by allways collecting all the certificates, any unneeded
+ certificates are released before returning if extra_certs is NULL anyway.
+
+ Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 8 16:08:29 2016 +0200
+
+ tests: check gnutls_certificate_get_x509_crt with more than one certificates
+
+ This would detect the issue in the "Fix invalid pointer operation in gnutls_certificate_get_x509_crt"
+
+Author: Stefan Sørensen <stefan.sorensen@spectralink.com>
+Date: Mon Aug 8 13:31:17 2016 +0200
+
+ tests: Use common ca3 test certificates in x509cert, x509dn and x509self tests.
+
+ Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
+
+Author: Stefan Sørensen <stefan.sorensen@spectralink.com>
+Date: Mon Aug 8 13:31:16 2016 +0200
+
+ tests: Remove zero-termination of gnutls_datum encapsulated certificates
+
+ This allows for memcmp comparison with certificates after processing.
+
+ Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
+
+Author: Stefan Sørensen <stefan.sorensen@spectralink.com>
+Date: Mon Aug 8 13:31:14 2016 +0200
+
+ Fix invalid pointer operation in gnutls_certificate_get_x509_crt
+
+ The access to the allocated crt_list variable was missing a pointer
+ dereference, leading to memory corruption for any certificate list with more
+ than one element.
+
+ Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 12:56:21 2016 +0200
+
+ tests: added check for errors when importing illegal RSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 12:45:03 2016 +0200
+
+ x509: call the fixup functions after loading private keys
+
+ That way we can better report errors which relate to illegal
+ parameters being detected.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 12:06:39 2016 +0200
+
+ nettle: use rsa_*_key_prepare on key import
+
+ Previously we calculated the size of the key directly, but
+ by using the rsa_*_key_prepare we benefit from any checks that
+ may be introduced in the future. Specifically any checks for invalid
+ public keys (e.g., keys that may crash the underlying gmp functions).
+
+ This patch avoids calling rsa_private_key_prepare every time we construct
+ a nettle private key struct, because this function requires a bigint
+ multiplication. We call that function once on private key import.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 11:53:19 2016 +0200
+
+ tests: added missing backslash in key-tests Makefile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 8 08:25:31 2016 +0200
+
+ Revert "nettle: use rsa_*_key_prepare"
+
+ This reverts commit c801a15bca9ea8f3f7abd4be48bebd36c54eeba2.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 11:41:47 2016 +0200
+
+ gnutls.h: moved all compatibility defines outside the enum
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 7 11:31:36 2016 +0200
+
+ prepared for release 3.5.3
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 5 15:55:47 2016 +0200
+
+ tests: use gnutls_record_set_timeout instead of kill child processes
+
+ That way we avoid issues like #118 which are caused by killing the child
+ process, and we also avoid deadlocks by making sure that recv will terminate
+ after a long delay.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 5 15:52:17 2016 +0200
+
+ tests: mini-record modify in a way to be more fail safe
+
+ That is, do not kill the child, but instead switch the roles of
+ child and parent, and add a timeout on recv to avoid infinite delays.
+
+ Relates: #118
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 5 15:20:48 2016 +0200
+
+ pkcs11: is_object_pkcs11_url -> is_pkcs11_url_object
+
+ Renamed function for clarity.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 5 09:46:14 2016 +0200
+
+ tests: ignore sigpipe in mini-record
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 5 09:30:14 2016 +0200
+
+ gnutls_fips140_mode_enabled: changed return type to unsigned
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 4 13:58:54 2016 +0200
+
+ doc: updated contribution guide with more info on test suite [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 4 10:22:50 2016 +0200
+
+ gnutls_pkcs11_privkey_status: return type changed to unsigned
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 4 09:57:04 2016 +0200
+
+ doc: added section on SCTP protocol [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 2 13:46:05 2016 +0200
+
+ tests: client-fastopen: removed seccomp conditional
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 2 13:34:18 2016 +0200
+
+ fastopen: improved error checking at connect()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 1 10:48:46 2016 +0200
+
+ nettle: use rsa_*_key_prepare
+
+ Previously we calculated the size of the key directly, but
+ by using the rsa_*_key_prepare we benefit from any checks that
+ may be introduced in the future. Specifically any checks for invalid
+ public keys (e.g., keys that may crash the underlying gmp functions).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 29 15:00:06 2016 +0200
+
+ gnutls_transport_set_fastopen: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 29 13:47:27 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 29 12:19:25 2016 +0200
+
+ getrandom: use SYS_getrandom instead of __NR_getrandom
+
+ These are identical definitions, but according to syscall()
+ SYS_getrandom is the expected value.
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jul 27 15:41:08 2016 +0200
+
+ x059: Fix asymmetry in name constraints intersection
+
+ - In _gnutls_name_constraints_intersect, if *_nc had a node of some type not present in _nc2, this was preserved. However, if it was vice versa (_nc2 having a type not present in *_nc), this node was discarded.
+ - This is now fixed.
+ - Removed redundant return value check that was accidentally left when refactoring from set_datum to explicit NULL setting.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Tue Jul 26 17:44:53 2016 +0200
+
+ tests: Add and improve chain tests
+
+ - Add a new chaintest testing the symmetry of merging name constraints of different types.
+ - Rename old name_constraints_but_no_name test to match other name constraints tests.
+ - Improve chain description of older name constraints tests.
+
+ Signed-off-by: Martin Ukrop <mukrop@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 14:34:15 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:41:11 2016 +0200
+
+ configure: do not generate makefiles in removed dirs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:37:31 2016 +0200
+
+ tests: updated paths for new location of p12 files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:34:34 2016 +0200
+
+ tests: safe renegotiation tests are run from top dir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:30:18 2016 +0200
+
+ tests: srp tests moved outside subdir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:24:55 2016 +0200
+
+ tests: moved sha2 tests into cert-tests/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:20:25 2016 +0200
+
+ tests: moved ecdsa tests to key-tests/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:13:39 2016 +0200
+
+ tests: moved dsa tests into key-tests/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:08:57 2016 +0200
+
+ tests: moved pkcs8 tests to key-tests/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:04:31 2016 +0200
+
+ tests: key-tests: moved data files into data/ subdir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 12:59:33 2016 +0200
+
+ tests: moved pkcs12 tests into cert-certs/ subdir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 11:23:43 2016 +0200
+
+ more files to ignore
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Thu Jul 28 09:55:27 2016 +0200
+
+ Require compiler to support C99
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 13:59:26 2016 +0200
+
+ doc update
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Jul 9 13:03:55 2016 +0200
+
+ Add test for gnutls_x509_crt_list_import2 with flag GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Jul 9 12:24:33 2016 +0200
+
+ gnutls_x509_crl_list_import2 was ignoring the passed flags if all CTLs in the list fit within the initially allocated memory.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:51:40 2016 +0200
+
+ gnutls_certificate_get_peers may return an unsorted list
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Jul 9 11:53:52 2016 +0200
+
+ gnutls_x509_crt_list_import2 was ignoring the passed flags if all certificates in the list fit within the initially allocated memory.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:37:00 2016 +0200
+
+ x509: parse_tlsfeatures: move limit check at the point of addition
+
+ This prevents appending failures when verifying chains on certificates
+ which use the maximum allowed number of features. Suggested by Tim
+ Kosse.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:33:06 2016 +0200
+
+ tests: removed irrelevant comment
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:31:25 2016 +0200
+
+ correct the sign type of integers in debug message
+
+ Suggested by Tim Kosse
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:29:18 2016 +0200
+
+ verify_crt: simplified error setting
+
+ based on suggestion by Tim Kosse.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 28 10:12:46 2016 +0200
+
+ verify_crt: removed text on parameter no longer being present
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 23:36:20 2016 +0200
+
+ x509: avoid using int declaration within a for-loop
+
+ This addresses compilation problem with old compilers,
+ and brings consistency as this type of declaration is not
+ used in gnutls' code.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 23:32:28 2016 +0200
+
+ gnutls_global_init/deinit: don't use any locking during constructor
+
+ This ensures that there is no deadlock on unexpected errors, such
+ as missing symbols (e.g., on lazy linking). Reported by Ludovic Courtès.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 23:27:07 2016 +0200
+
+ rnd-linux: use better define check for linux systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 13:10:28 2016 +0200
+
+ gnutls_prf: document when its output matches gnutls_prf_rfc5705
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 11:05:59 2016 +0200
+
+ doc: gnutls_session_set_id: added since
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 10:38:47 2016 +0200
+
+ .gitlab-ci.yml: keep the guile logs as artifacts on test suite failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 27 09:20:52 2016 +0200
+
+ doc update
+
+Author: David Walker <david.walker@vcatechnology.com>
+Date: Wed Jul 20 12:43:26 2016 +0100
+
+ Add extra dependency flags
+
+ This fixes the build when the dependencies are split up during a cross-compile
+
+ Resolves: #113
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 15:14:33 2016 +0200
+
+ moved system-keys-win.c and system-key-dummy.c under system/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 25 15:47:19 2016 +0200
+
+ split system.c to various files under system/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 25 16:26:39 2016 +0200
+
+ gnutls.h: giovec_t is a typedef to iovec where that is available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 13:37:43 2016 +0200
+
+ tests: added unit test for linux _rnd_get_system_entropy
+
+ This tests whether the function can operate as expected while being
+ interrupted by signals.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 12:03:54 2016 +0200
+
+ getrandom: loop around getrandom to get the requested number of bytes
+
+ This simplifies and enhanced the previous error handling code.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 11:45:30 2016 +0200
+
+ README.ci-runners: document asan and ubsan tags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 15:17:35 2016 +0200
+
+ tests: removed pkcs1-padding from subdirs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 15:10:49 2016 +0200
+
+ .gitignore: more tests files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 14:59:34 2016 +0200
+
+ configure.ac: don't generate makefiles of moved tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 14:57:44 2016 +0200
+
+ tests: pkcs1-pad: moved to cert-tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 14:55:25 2016 +0200
+
+ tests: userid test moved to cert-tests/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 14:51:59 2016 +0200
+
+ tests: rsa-md5-collision: run from top-level
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 14:29:45 2016 +0200
+
+ doc: updated documentation for gnutls_transport_set_int*
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 13:59:04 2016 +0200
+
+ doc: added section on reducing round-trips
+
+ That discusses TCP fast open with gnutls_transport_set_fastopen(), and false start.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 11:38:32 2016 +0200
+
+ tests: added test of gnutls_transport_set_fastopen
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jul 25 13:05:30 2016 +0200
+
+ tests: added test of TCP fast open using gnutls-cli and gnutls-serv
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jul 25 13:08:28 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 10:33:24 2016 +0200
+
+ tools: TLS handling has been incorporated into socket_open()
+
+ This is of particular usage to the server IP address loop, since
+ we can detect fast open errors and retry handshake to the next IP
+ address.
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jul 25 13:04:11 2016 +0200
+
+ gnutls-cli: added example usage of TCP fastopen
+
+ It is enabled with the new --fastopen option.
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Mon Jul 25 13:00:12 2016 +0200
+
+ Support TCP Fast Open
+
+ This introduces a new function gnutls_transport_set_fastopen().
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Signed-off-by: Tim Ruehsen <tim.ruehsen@gmx.de>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 11:09:56 2016 +0200
+
+ .gitlab-ci.yml: added asan tag for builds which require asan
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 26 11:08:12 2016 +0200
+
+ tests: pkcs11-privkey-fork: added explicit pkcs11 deinitialization
+
+ Also ignore known leaks for p11-kit.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 25 11:43:08 2016 +0200
+
+ mention ubsan in README [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 20:14:39 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 14:11:25 2016 +0200
+
+ tests: added checks for OCSP response file support
+
+ That is, check the usability of the APIs for setting and using
+ an ocsp response. This improves and makes more generic the
+ test suite API and test_cli_serv() in particular.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 15:36:55 2016 +0200
+
+ dtls: added a null pointer check in record_overhead
+
+ According to my reading this check is unnecessary as in
+ no case a null pointer can be encountered. However gcc6
+ warns about a null pointer derefence and thus adding it,
+ to be safe.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 14:43:49 2016 +0200
+
+ gnutls_x509_crt_check_hostname*: use unsigned a return value
+
+ This is to prevent issues to callers who may check for negative
+ error values.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 11:17:08 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 11:08:32 2016 +0200
+
+ introduced: GNUTLS_E_UNAVAILABLE_DURING_HANDSHAKE
+
+ This error code is returned when the session resumption parameters
+ are requested during a handshake. That is, to increase the clarity
+ when requesting these parameters while false start is active and
+ the handshake is not complete even if gnutls_handshake() has returned.
+
+ Relates #114
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 18:58:24 2016 +0200
+
+ tests: added check of the return values of resumption data functions during false start
+
+ Relates #114
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 22 10:57:37 2016 +0200
+
+ doc: mention that the session data functions will fail prior to handshake completion
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jul 20 14:52:00 2016 +0200
+
+ x509: Fix DNS name constraints checking
+
+ - If the intersection of name constraints of the given type was empty, the results allowed all names instead of none.
+ - Fixed by adding an universal excluded name constraint in case the intersection for the particular type is empty.
+ - Moved the logic of creating a name constraint node copy from _gnutls_name_constraints_intersect to name_constraints_intersect_nodes (previously name_constraints_match), as intersecting IP addresses will require further processing (not just taking one of the compared nodes as was the implementation till now).
+ - GNUTLS_SAN_MAX added in order to comfortably iterate over SAN type enum.
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jul 20 14:29:40 2016 +0200
+
+ tests: Add DNS name constraints tests
+
+ - One chaintest with empty permitted intersection.
+ - Merge testset with 2 permitted constraints with empty intersection (intersected list is completely empty).
+ - Merge testset with 3 permitted constraints, 2 of which have empty intersection.
+ - Merge testset with 2 permitted constraints with empty intersection and one constraints of different type that remains (intersected list is not empty).
+ - Enhance failing function with suite number for easier comprehension.
+
+Author: Martin Ukrop <mukrop@redhat.com>
+Date: Wed Jul 20 14:28:20 2016 +0200
+
+ tests: Tidy up old X509 name constraints tests
+
+ - Use convenience functions for error checking and failure reporting.
+ - Drop explicit (de)initialization (prevents some not reed reachable memory due to PKCS11 subsystem not being deinitialized in the destructor).
+ - Use variables to count set permitted/excluded constraints instead of hard-coded numbers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 16:07:56 2016 +0200
+
+ doc: clarify return codes in verification functions [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 16:02:42 2016 +0200
+
+ gnutls_certificate_verify_peers2: document that hostname comparison follows RFC6125
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 11:53:46 2016 +0200
+
+ rnd-getentropy: better handling of error printing with errno
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 21 11:51:05 2016 +0200
+
+ rnd-linux: make getrandom back-end robust against EINTR failures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 20 13:36:38 2016 +0200
+
+ gnutls_init: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 20 13:31:18 2016 +0200
+
+ tests: verify that GNUTLS_NONBLOCK is available as a definition
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 20 13:23:16 2016 +0200
+
+ gnutls.h: define elements of gnutls_init_flags_t
+
+ That is, define all the elements that were available prior
+ the move from #define to enum, to allow code relying on
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 20 13:07:44 2016 +0200
+
+ gnutls.h: documented the version various gnutls_init flags were introduced
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 20 11:27:35 2016 +0200
+
+ Moved the gnutls_x509_dn API functions to x509_dn.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 15:12:13 2016 +0200
+
+ tests: enhanced DN decoding tests with complex encoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 14:43:52 2016 +0200
+
+ RFC4514 DN decoding: allow decoding of raw ('#') items
+
+ In addition allow escaping prefix or suffix spaces as well as
+ the hash.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 14:21:16 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 14:10:08 2016 +0200
+
+ tests: enhanced DN decoding tests with encoding
+
+ This adds unit tests for gnutls_x509_dn_set_str().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 14:09:06 2016 +0200
+
+ Added gnutls_x509_dn_set_str()
+
+ This allows initializing a gnutls_x509_dn_t structure via a DN string.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 13:45:08 2016 +0200
+
+ tests: utils: use vasprintf() where available
+
+ This allows printing long strings.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 19 13:35:13 2016 +0200
+
+ tests: added checks for the RFC4514 decoding via gnutls_x509_dn_get_str()
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jul 19 12:08:23 2016 +0200
+
+ Remove redundant if expression from tests/mini-loss-time.c
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Tue Jul 19 11:08:10 2016 +0200
+
+ Fix tests/slow/cipher-openssl-compat.c for OpenSSL 1.1.0
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 18 18:02:25 2016 +0200
+
+ cfg.mk: no longer save config.rpath
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 18 16:36:27 2016 +0200
+
+ removed auto-generated files from the repository
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 17 09:37:22 2016 +0200
+
+ tests: removed an skipped failures due to bugs in softhsm 2.0.0
+
+ These are no longer an issue as the CI has been updated to softhsm
+ 2.1.0, which addresses them, and they prevented catching the
+ GNUTLS-SA-2016-2 regression.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 16 18:12:27 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 16 17:19:02 2016 +0200
+
+ Dropped support for EGD random generator
+
+ This removes rarely tested code for systems which no longer exist
+ and simplifies code for Linux random generator.
+
+ Resolves #112
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 21:55:04 2016 +0200
+
+ configure: prevent a version of getentropy() in a linux libc to be used
+
+ For now, we auto-detect and switch between getrandom() and /dev/urandom
+ when the former is not available. With the complexity of dealing with
+ libc's that have the feature but kernel not supporting it, or vice versa
+ it is best keep things simple.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 21:38:02 2016 +0200
+
+ rnd-linux: added sanity check in getrandom output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 18:57:01 2016 +0200
+
+ nettle: split the rnd-common to rnd-windows, rnd-getentropy, and rnd-linux
+
+ That is, to the windows random generator as well as the getentropy()
+ generator in BSDs, as well as the getrandom(), /dev/urandom,
+ and EGD generators on Linux systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 18:51:14 2016 +0200
+
+ rnd-common: added faster detection of getrandom based on GRND_NONBLOCK
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 15:31:16 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 14:58:07 2016 +0200
+
+ urandom: use st_ino and st_rdev to determine device uniqueness
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 14:34:38 2016 +0200
+
+ Added auto-detection of getrandom() system call in Linux systems
+
+ In addition use getrandom() via the syscall interface if it doesn't
+ exist in Libc. The reason for the latter is that getrandom() support
+ for glibc is in limbo for several years, and for auto-detection is that
+ even if it is going to be present in libc we will not be able to guarrantee
+ that the system call is available just because it is present in glibc.
+ For that we detect on initialization whether getrandom() can obtain
+ random data, and if yes, we continue using that.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 15 13:58:16 2016 +0200
+
+ tests: seccomp examples: use cert-common.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 14 10:00:19 2016 +0200
+
+ tests: enhanced arbitrary extension tests with octet_string encoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 14 09:43:28 2016 +0200
+
+ certtool: added the ability to encode arbitrary extensions
+
+ That is, added the ability to encode as an octet string any
+ specified extension data.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 14 09:21:16 2016 +0200
+
+ .gitlab-ci.yml: added expiration time of a week for failure artifacts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 16:36:39 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 16:31:47 2016 +0200
+
+ tests: added basic testing of gnutls_x509_crq_set_extension_by_oid()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 16:13:12 2016 +0200
+
+ tests: added checks on certificate and request generation with arbitrary extensions
+
+ This tests the add_extension and add_critical_extension options of certtool.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 11:43:10 2016 +0200
+
+ certtool: added options to set arbitrary extensions to certificates and requests
+
+ This allows setting arbitrary extensions using the following new template options:
+ add_extension = "5.6.7.8 0x0001020304050607AAABCD"
+ add_critical_extension = "9.10.11.12.13.14.15.16.17.1.5 0xCAFE"
+
+ The "0x" prefix can be omitted.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 11:41:14 2016 +0200
+
+ added gnutls_x509_crq_set_extension_by_oid()
+
+ This is a function to add an arbitrary extension into a
+ certificate request.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 13 13:20:10 2016 +0200
+
+ doc: mention the need of libtasn1-tools in Fedora based systems [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 13 12:11:57 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 10:54:09 2016 +0200
+
+ doc: mention libcmocka dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 9 14:52:42 2016 +0200
+
+ tests: added unit testing for DTLS sliding window implementation
+
+ This was taken from the unit testing of AF_KTLS.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 10 23:14:03 2016 +0200
+
+ dtls: imported Fridolin's DTLS sliding window implementation
+
+ This simplifies the current code, and reduces the memory needed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 10 22:42:21 2016 +0200
+
+ dtls: moved DTLS window handling to separate file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 12 18:37:53 2016 +0200
+
+ ex-client-x509: removed unused call to gnutls_session_set_ptr()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 12 14:48:14 2016 +0200
+
+ libtasn1: updated to allow large OIDs to be used even on 32-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 17:44:28 2016 +0200
+
+ doc: updated contribution guide
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 17:43:04 2016 +0200
+
+ doc: updated contribution guide
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 11 17:19:16 2016 +0200
+
+ tests: link the resume tests to gnulib due to their missing memmem()
+
+ This fixes compilation of gnutls in solaris. Reported by Dagobert Michelsen.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 8 14:26:38 2016 +0200
+
+ NEWS: corrected release date [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 7 22:55:48 2016 +0200
+
+ .gitlab-ci.yml: keep the artifacts on failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 7 21:00:56 2016 +0200
+
+ write_nss_key_log: write the premaster secret while it is still valid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 7 20:55:03 2016 +0200
+
+ updated libtasn1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 6 08:43:58 2016 +0200
+
+ released 3.5.2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 18:40:32 2016 +0200
+
+ cfg.mk: reduced the generated changelog size
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 18:37:15 2016 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 12:03:51 2016 +0200
+
+ tests: ignore any memory leaks from libcrypto
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 11:33:54 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 1 13:51:18 2016 +0200
+
+ asm: updated openssl and the asm sources for AES-GCM from openssl 1.0.2h
+
+ This improves the performance of AES-GCM significantly by taking
+ advantage of AVX and MOVBE instructions where available. This
+ utilizes Andy Polyakov's code under BSD license.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 11:44:59 2016 +0200
+
+ tests: when testing with openssl disallow any CPU optimizations
+
+ This ensures that we test our optimized code (which is mostly
+ openssl based), with code that is not identical.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 1 14:29:40 2016 +0200
+
+ tests: added openssl compatibility tests for AES-GCM cipher
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 5 11:41:20 2016 +0200
+
+ dane: corrected the license of libdane files
+
+ The license was always LGPL version 2.1, and these
+ files mentioned LGPL version 3. Reported by Thomas
+ Petazzoni.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 4 17:29:30 2016 +0200
+
+ tests: ignore leaks due to p11-kit in test suite
+
+ This addresses issue in "pkcs11-privkey-fork" which failed
+ when compiled under asan due to leaks in p11-kit after fork.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 4 15:28:27 2016 +0200
+
+ tests: added check to ensure that pkcs11 objects will be reopened on fork
+
+ This checks whether C_Initialize() and C_OpenSession() will be called
+ again when using a PKCS#11 module.
+
+ Resolves #95
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 4 15:19:32 2016 +0200
+
+ pkcs11: on object import always check for a support public key algorithm
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 1 15:29:58 2016 +0200
+
+ gnutls_aead_cipher_decrypt: corrected the return value of ptext_len
+
+ That is, do not account the tag_size into the plaintext.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 15:29:44 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 15:22:22 2016 +0200
+
+ configure: check for libdl irrespective of FIPS140 configuration
+
+ This allows to link to libdl for the tests that require it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 13:44:57 2016 +0200
+
+ tests: account pkcs11/pkcs11-mock-ext.h in Makefile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 13:41:51 2016 +0200
+
+ tests: link pkcs11-import-url-privkey with libdl
+
+ That is because it uses dlopen().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 10:47:02 2016 +0200
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 09:34:33 2016 +0200
+
+ tests: avoid compiler warning from pkcs11-pubkey-import
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 09:30:47 2016 +0200
+
+ tests: added check to verify the tolerance of broken C_GetAttributes
+
+ That is, test gnutls_pkcs11_obj_list_import_url4() when importing
+ private keys from tokens that return CKR_OK on sensitive objects,
+ and tokens that return CKR_ATTRIBUTE_SENSTIVE.
+
+ Relates #108
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 30 09:11:40 2016 +0200
+
+ pkcs11_get_attribute_avalue: correctly handle a -1 value length from C_GetAttributeValue
+
+ That is, work-around modules which do not return an error on sensitive
+ objects.
+
+ Relates #108
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 29 18:52:22 2016 +0200
+
+ pkcs11_get_attribute_avalue: do not assign values on failure
+
+ When C_GetAttributeValue() returns size but does not return data
+ then pkcs11_get_attribute_avalue() would set the return data pointer
+ to a free'd value. This is against the convention expected by callers,
+ i.e, set data to NULL. Reported by Anthony Alba in #108.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 29 17:25:06 2016 +0200
+
+ tests: use datefudge in name-constraints test
+
+ This avoids the expiration of the used certificate to affect the test.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 28 09:17:13 2016 +0200
+
+ tests: link libpkcs11mock1 with gnulib
+
+ This allows it to use gnulib for strndup where it is needed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 28 09:15:55 2016 +0200
+
+ p11tool: do not return from void functions
+
+ This fixes a compilation issue with solaris compiler. Reported
+ by Peter Eriksson.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 24 11:01:35 2016 +0200
+
+ doc: mention the boolean functions in the gnutls API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 24 10:55:37 2016 +0200
+
+ tests: removed remainders of pkcs11 tests from suite/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 24 08:37:03 2016 +0200
+
+ gnutls_pkcs11_crt_is_known: changed to unsigned type
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 23 23:24:19 2016 +0200
+
+ tests: pkcs11-is-known: check that no flags enforce compare
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 23 23:13:50 2016 +0200
+
+ gnutls_pkcs11_crt_is_known: always assume GNUTLS_PKCS11_OBJ_FLAG_COMPARE unless GNUTLS_PKCS11_OBJ_FLAG_RETRIEVE_DISTRUSTED is given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 23 23:06:29 2016 +0200
+
+ tests: moved pkcs11-softhsm test suite into pkcs11/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 23 22:40:26 2016 +0200
+
+ find_cert_cb: minor cleanups in find_cert_cb
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 23 22:25:06 2016 +0200
+
+ tests: added more unit tests for gnutls_pkcs11_crt_is_known()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 18:04:45 2016 +0200
+
+ dn2: updated to account for serial number being printed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 18:01:15 2016 +0200
+
+ tests: corrected create-chain.sh to remove the ocsp_signing_key from generated certs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 18:00:03 2016 +0200
+
+ tests: replaced tls feature extension checks
+
+ The previous checks had incorrect key purpose check on the final
+ (root) certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 17:31:30 2016 +0200
+
+ enhanced debugging messages for cert verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 17:09:54 2016 +0200
+
+ x509: print serial number in compact output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 16:49:42 2016 +0200
+
+ tests: include softhsm.h into dist files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 15:27:05 2016 +0200
+
+ pkcs11: correctly encode the serial number when searching for certificate
+
+ In gnutls_pkcs11_crt_is_known() corrected the encoding of the
+ serial number to TLV DER from LV DER. This is the encoding we
+ use when storing that number.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 15:50:51 2016 +0200
+
+ pkcs11: correctly account check_found_cert()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 22 13:50:48 2016 +0200
+
+ gnutls-cli-debug: replaced draft-ietf-tls-chacha20-poly1305-04 with RFC7905
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 20 12:07:03 2016 +0200
+
+ gnutls-cli: benchmark the memcpy performance to compare with ciphers
+
+ Also ensure that we use different memory areas for each operation
+ to avoid measuring better performance due to caching.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 16 11:53:55 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 19 15:48:21 2016 +0200
+
+ doc: corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 19 13:06:15 2016 +0200
+
+ Sync with TP.
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Jun 18 18:36:13 2016 +0200
+
+ Typo fixes (found by lintian): extention, reencode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 16 11:51:42 2016 +0200
+
+ tests: added check for handshake packet reconstruction
+
+ This tests whether a split handshake packet is properly reconstructed
+ if the parts are switched.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 16 11:37:30 2016 +0200
+
+ dtls: corrected reconstruction of handshake packets received out of order
+
+ That is, when the handshake packet is split into multiple different
+ chunks and received out of order, make sure that reconstruction occurs
+ properly. Reported by Guillaume Roguez.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 16 10:08:34 2016 +0200
+
+ Corrected the writing of serial number in PKCS#11 modules
+
+ That is previously the serial number was written in raw format, but
+ in PKCS#11 the serial number must be set encoded as integer. Report
+ and fix by Stanislav Zidek.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 15 13:50:54 2016 +0200
+
+ ext: ecc: replaced SUPPORTED ECC POINT FORMATS with better formatted name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 15 09:21:10 2016 +0200
+
+ tests: disable SRP-base64 encode/decoded tests when SRP is disabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 19:46:55 2016 +0200
+
+ .gitlab-ci.yml: restrict windows build checks to tests/ subdir [ci skip]
+
+ That is because there is an issue with the gnulib self tests when
+ run under windows.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 16:43:50 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 16:35:55 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 16:32:21 2016 +0200
+
+ released 3.5.1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 16:31:35 2016 +0200
+
+ tests: added missing files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 15:24:48 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 15:23:04 2016 +0200
+
+ tests: fixed the path of cert-tests files and added missing files in Makefile.am
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 15:17:33 2016 +0200
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 10:21:54 2016 +0200
+
+ tests: verify the resilience of the TLSFeature handling functions on large number of features
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 10:02:56 2016 +0200
+
+ tlsfeature: impose a maximum number of supported TLS features
+
+ This avoids many allocations and simplifies handling of the features.
+ The currently set maximum number of TLS features aligns with the
+ maximum number of supported TLS extensions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 09:51:01 2016 +0200
+
+ tests: added unit test for gnutls_x509_tlsfeatures_check_crt
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:07:44 2016 +0200
+
+ During PKIX chain verification check the TLSFeatures compliance
+
+ This verifies whether a chain complies with RFC7366 p.4.2.2 requirements.
+ That is whether the issuer's features are a superset of the certificate
+ under verification.
+
+ This enhances gnutls_x509_crt_get_tlsfeatures() to allow appending
+ of TLSFeatures, and introduces gnutls_x509_tlsfeatures_check_crt().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 15:10:27 2016 +0200
+
+ verify_crt: moved all verification state into a common structure
+
+ This allows for easier extension of state.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 09:28:28 2016 +0200
+
+ tests: added chain verification with TLS features
+
+ That adds checks for the RFC7633 requirements for intermediate
+ and CA certificates (p. 4.2.2).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 14:37:49 2016 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 14:37:12 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 14:01:56 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 13:49:28 2016 +0200
+
+ tests: verify the operation of honor_crq_ext template option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 13:41:24 2016 +0200
+
+ tests: common.sh will export the required TZ for datefudge tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 13:24:03 2016 +0200
+
+ tools: avoid using deprecated types
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 13:23:03 2016 +0200
+
+ certtool: allow copying specific certificate request extensions to certificate
+
+ This introduces the honor_crq_extension multi-line template option.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 13:13:32 2016 +0200
+
+ tests: added check on gnutls_x509_crt_set_crq_extension_by_oid()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 11:19:50 2016 +0200
+
+ Added gnutls_x509_crt_set_crq_extension_by_oid()
+
+ This allows copying specific OIDs from a certificate
+ request to the certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 09:59:20 2016 +0200
+
+ tests: moved check for datefudge in scripts/common.sh
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 09:55:04 2016 +0200
+
+ tests: cert-tests: moved all data files in separate subdir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 14 09:36:29 2016 +0200
+
+ tests: cert-tests: moved templates into subdir
+
+Author: Daniel P. Berrange <berrange@redhat.com>
+Date: Fri Jun 10 13:41:22 2016 +0100
+
+ tests: test trailing comma in system priorities
+
+ Add tests which verify behaviour when the list of system
+ priorities has a trailing ','. Avoid crash in test suite
+ if the test unexpectedly succeeds when expected_str is
+ NULL.
+
+ Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 10 13:56:23 2016 +0200
+
+ tests: added check of DTLS rehandshake for upgrade
+
+ That is check whether anon -> cert renegotiation works.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 10 13:43:36 2016 +0200
+
+ tests: added check of DTLS rehandshake when using PKIX certs
+
+ This complements the existing DTLS rehandshake test using anonymous
+ ciphersuites.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 18:55:02 2016 +0200
+
+ tests: document some details in system-prio-file [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:40:49 2016 +0200
+
+ doc: mention the usage of the _gnutls_resolve_priorities function in testsuite
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:38:29 2016 +0200
+
+ doc: mention the fallback keyword support in manual
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:36:12 2016 +0200
+
+ tests: added checks for system priority file fallback mechanism
+
+Author: Daniel P. Berrange <berrange@redhat.com>
+Date: Fri Jun 3 16:57:02 2016 +0100
+
+ gnutls_priority_init: multiple @KEYWORD lookups with fallback
+
+ The support for using "@KEYWORD" as a priority string is very
+ useful to separate selection of priorities from application
+ specific code or config files. It is, however, not general
+ enough to fully serve all reasonable use cases.
+
+ For example, consider an application sets
+
+ gnutls_priority_set_direct(session, "@SYSTEM", NULL);
+
+ The system administrator can modify the global priorities
+ file to change what "@SYSTEM" resolves to for all apps using
+ GNUTLS. As soon as one application wishes to have a slightly
+ different configuration from others on the host, you have to
+ go back and start modifying application specific configuration
+ files once more. This is bad for the system administrator as
+ it means there's no longer one single place where they can
+ see the priority configuration for all apps.
+
+ They may try to get around this problem by configuring the
+ app to use a different keyword, instead of a full priority
+ string, eg "@LIBVIRT". So the global priorities file can
+ now define entries for both "SYSTEM" and "LIBVIRT". This
+ has still placed a burden on the administrator change the
+ config in two places - both libvirt config files and the
+ global priorities file.
+
+ What is more desirable is if applications were able to provide
+ a list of keywords that would be tried in order, picking the
+ first that existed. For example, libvirt could be written to
+ request the following by default
+
+ gnutls_priority_set_direct(session, "@LIBVIRT,SYSTEM", NULL);
+
+ With this, gnutls would first try to find the "LIBVIRT" keyword
+ in the global configuration file, and if that is not present,
+ then it would fallback to trying to find the "SYSTEM" keyword.
+
+ This provides nice "out of the box" behaviour for system
+ administrators, whereby the app would be using "SYSTEM" initially
+ and if the admin wishes to give the app a custom configuration,
+ they can simply modify the global priorities file to add in the
+ application specific keyword "LIBVIRT". There is never a need
+ for the sysadmin to modify any application specific configuration
+ files any more. It is exclusively controlled in one place via the
+ global priorities file.
+
+ Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:20:22 2016 +0200
+
+ tests: enhanced system priority file testing
+
+ This checks whether appending to system priority options work.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:21:57 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 17:01:06 2016 +0200
+
+ doc: remove all references to openpgp auth example
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 9 16:48:14 2016 +0200
+
+ doc update
+
+Author: Daniel P. Berrange <berrange@redhat.com>
+Date: Fri Jun 3 14:59:11 2016 +0100
+
+ _gnutls_resolve_priorities: always try to re-read sys priority file
+
+ Previously if the system priority file was edited, that would
+ take effect on the very next TLS session an application created.
+
+ As of:
+
+ commit 006b89d4464ae1bb6d545ea5716998654124df45
+ Author: Nikos Mavrogiannopoulos <nmav@redhat.com>
+ Date: Fri Apr 1 10:46:12 2016 +0200
+
+ priorities: preload the system priorities on library loading time
+
+ It is required to restart every application after changing the
+ system priority file to get changes to take effect.
+
+ Further, for applications running in a chroot, it will no longer
+ honour a system priority file that may exist inside the chroot,
+ always using the originally cached data from outside the chroot.
+
+ This patch changes the caching so that we always try to reload
+ the cache of system priorities. A mtime check is used to avoid
+ actually re-reading the file unless its content has obviously
+ changed. If the file no longer exists, the cache will not be
+ invalidated. This ensures that the current priority file is
+ always honoured, whether inside a chroot or not, while at the
+ same time allowing apps to work in a chroot when no system
+ priority file is present.
+
+ Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 8 19:38:07 2016 +0200
+
+ doc: remove references to GNUTLS_KEYLOGFILE
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 6 19:33:34 2016 +0200
+
+ tests: renamed rehandshake checks for clarity
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 6 18:47:28 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 6 18:43:12 2016 +0200
+
+ keylogfile: only consider the SSLKEYLOGFILE variable
+
+ In addition do not check the environment in the constructor
+ but instead use static variables to save the key file name.
+ The GNUTLS_KEYLOGFILE environment variable is no longer used
+ since there is no reason to have a separate one.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 6 18:39:18 2016 +0200
+
+ lib: eliminated the use of deprecated variables
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 4 11:42:21 2016 +0200
+
+ doc: removed OpenPGP examples
+
+ Relates #102
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 4 11:36:34 2016 +0200
+
+ pkcs12: corrected return type of gnutls_pkcs12_bag_get_type()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 17:07:28 2016 +0200
+
+ tests: move pkcs11-cert-import-url4-exts with the other pkcs11 tests
+
+ This prevents a build failure in windows.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 15:01:59 2016 +0200
+
+ doc clarify the version since when GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT is accepted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 14:53:04 2016 +0200
+
+ tests: corrected typo in crl-test
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 14:24:32 2016 +0200
+
+ tests: check gnutls_pkcs11_obj_list_import_url4() with GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 14:50:45 2016 +0200
+
+ gnutls_pkcs11_obj_list_import_url4: accepts the GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT flag
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 14:41:25 2016 +0200
+
+ gnutls_pkcs11_obj_list_import_url3: rewritten to use gnutls_pkcs11_obj_list_import_url4
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 14:29:45 2016 +0200
+
+ pkcs11: use ctx as variable name for ck_object_handle_t for clarity
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 3 13:47:44 2016 +0200
+
+ pkcs11: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 2 14:37:11 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 2 14:28:52 2016 +0200
+
+ _gnutls_check_key_purpose: in CA certificates treat the SGC key purpose as GNUTLS_KP_TLS_WWW_SERVER
+
+ This is a hack for certain very old CA certificates lurking around which instead
+ of having the GNUTLS_KP_TLS_WWW_SERVER have some old OIDs for that purpose. Consider
+ these OIDs equivalent to GNUTLS_KP_TLS_WWW_SERVER in marked as CA certificates.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 2 09:22:26 2016 +0200
+
+ gnutls-cli: --save-ocsp will work even if verification fails
+
+ That is, allow saving the response even if the OCSP response caused
+ a verification error. That way the response can be examined for possible
+ issues.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 2 09:20:13 2016 +0200
+
+ ocsp: attempt harder to figure an OCSP staple issuer
+
+ That is, check initially against the trust list set on the credentials,
+ and if verification is not possible attempt with all certificates in
+ the chain as possible issuers. The reason of this enhancement is the
+ few servers have an OCSP response signed not by their direct CA but
+ rather by one of the higher level CAs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 14:10:59 2016 +0200
+
+ tests: added comprehensive OCSP test suite with MUST-staple PKIX extension
+
+ This includes the tests:
+ - Server with valid certificate - no staple
+ - Server with valid certificate - valid staple
+ - Server with valid certificate - invalid staple
+ - Server with valid certificate - unrelated cert staple
+ - Server with valid certificate - expired staple
+ - Server with valid certificate - old staple
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 10:09:54 2016 +0200
+
+ tests: utils: added c_print()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 10:33:15 2016 +0200
+
+ ext: status_request: added more descriptive name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 14:15:49 2016 +0200
+
+ ocsp: fail certificate verification on expired or too old revocation data info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 14:13:52 2016 +0200
+
+ ocsp: Introduced GNUTLS_CERT_INVALID_OCSP_STATUS
+
+ This verification status flag indicates an OCSP status response
+ being stapled but it being invalid for some reason (e.g., unable
+ to parse or doesn't contain the expected certificate).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 1 14:38:32 2016 +0200
+
+ doc: improved OCSP description and mention RFC7633
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:52:06 2016 +0200
+
+ tests: added basic check for gnutls_url_is_supported
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:47:34 2016 +0200
+
+ gnutls_url_is_supported: type changed to unsigned
+
+ In addition function documentation was updated.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:42:22 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:37:34 2016 +0200
+
+ pubkey_to_bits: return type was changed to unsigned
+
+ This function did not return signed data, so the "int" return
+ type was confusing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 16:16:38 2016 +0200
+
+ crypto-selftests: removed unneeded cast
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 13:49:13 2016 +0200
+
+ several sign-related API changes
+
+ This replaces the usage of "int" in functions which could only
+ have accepted an "unsigned" value. Also functions which return
+ unsigned values are explicitly tagged as such. The ABI remains
+ the same with these changes.
+
+ This allows easier catching of sign/unsigned related errors from
+ the calling applications.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 11:40:00 2016 +0200
+
+ x509: simplified _gnutls_x509_get_tbs()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 10:08:14 2016 +0200
+
+ x509: replace the bool type with the unsigned type
+
+ This allows to rely on gcc warnings for improper checks and
+ conversions. Unfortunately gcc does warn on invalid checks for
+ the bool type (e.g., b<0).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 10:00:18 2016 +0200
+
+ configure: enable the type-limits gcc warnings
+
+ In addition remove the unsafe-loop-optimizations warning
+ as they were not helpful.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 31 08:59:47 2016 +0200
+
+ certtool: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 22:28:23 2016 +0200
+
+ DCO: added Tim Kosse [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 15:19:15 2016 +0200
+
+ tools: modify canonicalize_host to not depend on in6_addr
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 15:17:06 2016 +0200
+
+ tests: added unit tests for gnutls_x509_tlsfeatures_t handling funcs
+
+ This includes DER import/export as well as feature appending.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 14:19:20 2016 +0200
+
+ tests: tlsfeature-test will ignore the 'Algorithm Security Level' line in comparisons
+
+ That is to allow depending on the certificate output validation without
+ relying on "moving" parameters such as the Algorithm Security Level.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 13:47:14 2016 +0200
+
+ tests: verify whether the TLSFeatures extension is copied
+
+ Verify whether the TLSFeatures extension is copied from the certificate
+ request to the generated certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 13:34:17 2016 +0200
+
+ doc: updated since version of tlsfeature functionality and documented new functions
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Fri Jan 15 14:45:03 2016 +0100
+
+ tests: add testcase to check for missing status request
+
+ That is verify whether the OCSP MUST-staple extension, as can be
+ deduced from RFC7633, is accounted during handshake.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Fri Jan 15 14:45:42 2016 +0100
+
+ Reset extensions_sent_size only at start of handshake
+
+ That is, do not reset it when completing it so that we can
+ use the negotiated extensions even after the handshake is
+ complete.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sun Dec 20 15:09:24 2015 +0100
+
+ Account the TLSFeature certificate extension in certificate verification
+
+ That is, account for the OCSP-Must staple extension. If we have sent an OCSP
+ status request and have not gotten anything, but the certificate has the
+ Status Request TLSFeature extension present, fail to verify the certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 12:57:55 2016 +0200
+
+ tools: allow specifying a hostname with a port attached
+
+ That is: gnutls-cli www.example.com:443 is equivalent to
+ gnutls-cli www.example.com -p 443
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 12:35:45 2016 +0200
+
+ tests: check the generation and printing of TLS feature PKIX extension
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 11:23:39 2016 +0200
+
+ doc: document tls_feature option in the sample template
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 10:55:46 2016 +0200
+
+ TLS extensions: use more human-friendly names
+
+ This is required to provide better output to gnutls_ext_get_name()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 10:50:38 2016 +0200
+
+ exported function to convert TLS extension numbers to strings
+
+ The exported function is gnutls_ext_get_name()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 10:45:46 2016 +0200
+
+ x509/output: print the extension name of TLSFeatures
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Thu Jan 7 11:27:13 2016 +0100
+
+ Implement setting the TLS features extension on certificates via certtool's template file.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 30 10:20:00 2016 +0200
+
+ libgnutls.map: exported the tlsfeatures-related functions
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Fri Jan 15 11:34:31 2016 +0100
+
+ Add functions to get/set the tlsfeatures to certificate requests.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Mon May 30 09:57:42 2016 +0200
+
+ Added gnutls_x509_crt_set_tlsfeatures
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Mon May 30 09:52:15 2016 +0200
+
+ Added functions to add features and convert tlsfeatures back to DER
+
+ That adds:
+ gnutls_x509_ext_export_tlsfeatures
+ gnutls_x509_tlsfeatures_add
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Fri Jan 15 13:48:10 2016 +0100
+
+ Move call to terminate() until after printing the error message.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Fri Jan 15 12:04:00 2016 +0100
+
+ Fix the description of two testcases.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Mon May 30 09:45:29 2016 +0200
+
+ Added functions to parse the TLSFeatures X.509 extension.
+
+ In addition provide function to enumerate the features it lists,
+ and output information with the output functions.
+ This adds:
+ gnutls_x509_tlsfeatures_init
+ gnutls_x509_tlsfeatures_deinit
+ gnutls_x509_tlsfeatures_get
+ gnutls_x509_ext_import_tlsfeatures
+ gnutls_x509_crt_get_tlsfeatures
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun May 29 11:53:22 2016 +0200
+
+ Typo fix: auxilary -> auxiliary [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 28 22:26:48 2016 +0200
+
+ tests: added DTLS 0.9 check with AES-128-GCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 28 19:57:09 2016 +0200
+
+ gl: secure_getenv() will behave as getenv on windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 28 19:32:12 2016 +0200
+
+ tests: corrected definition of CryptSignHash in mock crypt32
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 28 09:55:53 2016 +0200
+
+ Rely on gnulib's secure_getenv()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 28 09:55:07 2016 +0200
+
+ x86-common: use secure_getenv()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 27 22:48:48 2016 +0200
+
+ configure.ac: check for secure_getenv where available and always enable system extensions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 27 22:34:53 2016 +0200
+
+ tests: keylog-env will check for SSLKEYLOGFILE as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 27 22:26:02 2016 +0200
+
+ env: use secure_getenv when reading environment variables
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 27 22:21:50 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 27 22:19:40 2016 +0200
+
+ Append keys on keylogfile
+
+ Also consider the SSLKEYLOGFILE variable, since the format is
+ identical and we are always appending keys.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 26 11:05:40 2016 +0200
+
+ tests: ssl2-hello check is made conditional
+
+ It is only run if ENABLE_SSL2 is defined.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 26 11:04:27 2016 +0200
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 26 11:02:34 2016 +0200
+
+ tests: added SSL2.0 client hello parsing check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 26 10:58:19 2016 +0200
+
+ tests: added small text clarifying the purpose of the cert-common.h header
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 24 13:45:32 2016 +0200
+
+ tests: add an upper limit in the run of compat tests
+
+ This allows the test suite to recover from the case of DTLS implementations
+ that do not properly retransmit and block on lost packets.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 24 13:27:12 2016 +0200
+
+ doc: advise against using the TPM-specific API
+
+ It is restricted to TPM 1.2, and there are fine PKCS#11 wrappers that
+ will provide identifical functionality.
+
+ Relates #101
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 24 10:08:14 2016 +0200
+
+ .gitlab-ci.yml: corrected typo preventing the no-SSL 3.0 test part to be properly run
+
+ Also test the --disable-ssl2-support option.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 24 09:58:12 2016 +0200
+
+ Amend the "Allow for conditional compilation of SSL 3.0 protocol patch"
+
+ That is fix bug introduced by an incorrect #ifdef, and unconditionally
+ provide access to certificate callbacks.
+
+ This amends 89faab9e9e9123f39e8c0c6f8da1f67de423254a
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 24 09:17:53 2016 +0200
+
+ doc: updated text on priority strings
+
+ Refer to RFC7685 for the TLS padding extension (%DUMBFW),
+ and mention the default behavior for the TLS client hello record version.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 23 11:33:53 2016 +0200
+
+ pkcs11: added sanity check to find_obj_url_cb() for object validity
+
+ Also avoid unnecessary recursion.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 21 06:24:47 2016 +0200
+
+ tests: run compatibility checks in parallel for various modifiers
+
+ That is, the various %NO_ETM, %COMPAT, ... modifiers are checked
+ in parallel in the testcompat suite, reducing the overall running
+ time significantly.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 21 05:39:21 2016 +0200
+
+ tests: enhance TLS version checks with DTLS
+
+ That is we check whether DTLS-1.0 and DTLS-1.2 can be negotiated
+ using the NORMAL priority string. We also add a custom check for
+ DTLS-0.9 as this is not fully supported for negotiation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 17:44:46 2016 +0200
+
+ tests: use /bin/bash in tests which require common.sh
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 15:04:22 2016 +0200
+
+ .gitlab-ci.yml: minimal build disables SSL2 client hello
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 15:03:41 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 15:01:49 2016 +0200
+
+ Allow for conditional compilation of SSL 2.0 client hello support
+
+ This allows to completely remove SSL 2.0 support by calling configure
+ with the '--disable-ssl2-support' option.
+
+ Relates #97
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 14:54:38 2016 +0200
+
+ Amend: Allow for conditional compilation of SSL 3.0 protocol
+
+ This patch makes conditional several more SSL 3.0-only parts of codebase.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 14:47:27 2016 +0200
+
+ CONTRIBUTING.md: link to milestones instead of all issues
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 14:42:12 2016 +0200
+
+ tests: mini-x509-cas: use cert-common.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 14:41:08 2016 +0200
+
+ CONTRIBUTING.md: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 12:07:57 2016 +0200
+
+ tests: do not use pkglib to generate libpkcs11mock1.so
+
+ This resulted in the test library being installed. Install we use noinst
+ for the library, but pass -rpath to LDFLAGS as a hack to for libtool
+ to generate the shared version.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 19 12:08:13 2016 +0200
+
+ configure.ac: increased stack size usage to reduce warnings
+
+ Also remove gcc flags from the banned list that no longer pose
+ and issue.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 20 07:45:46 2016 +0200
+
+ announce.txt: updated list email address
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 19 10:56:52 2016 +0200
+
+ priority: CCM ciphersuites was promoted over the CBC ones
+
+ Also make explicit the prioritization rules for the default set
+ of ciphers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 19 09:24:13 2016 +0200
+
+ gnutls-cli: allow operation with stdin input
+
+ That is once commands from stdin are given, they are not only sent to server,
+ but we also wait for a response prior to exiting.
+
+ Resolves #96
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 14:00:06 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 22:24:33 2016 +0200
+
+ tests: ocsp-tls-connection: use /bin/bash since we rely on the $RANDOM variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 22:20:47 2016 +0200
+
+ tests: use _putenv() for setting environment on windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 21:15:38 2016 +0200
+
+ tests: added check to verify that keylog file is being written
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 16:38:13 2016 +0200
+
+ doc: documented the GNUTLS_KEYLOGFILE environment variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 16:31:28 2016 +0200
+
+ Write session keys into a file when GNUTLS_KEYLOGFILE is exported
+
+ That is the file pointed from the variable is written to, and contain
+ the session parameters in the following format (identical to NSS key
+ log format):
+
+ CLIENT_RANDOM <space> <64 bytes of hex encoded client_random> <space> <96 bytes of hex encoded master secret>
+
+ and for the old RSA ciphersuites also in the format:
+ RSA <space> <16 bytes of hex encoded encrypted pre master secret> <space> <96 bytes of hex encoded master secret>
+
+ Resolves #64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 13:39:06 2016 +0200
+
+ systemkey: corrected help output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 18 13:36:11 2016 +0200
+
+ doc: document the systems supported via systemkeys API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 14:13:26 2016 +0200
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 10:35:39 2016 +0200
+
+ gnutls-cli: corrected check for OCSP verification success
+
+Author: Thomas Klute <thomas2.klute@uni-dortmund.de>
+Date: Fri Apr 29 02:50:31 2016 +0200
+
+ Test case for gnutls-cli --ocsp
+
+ This new test case checks if gnutls-cli accepts OCSP responses for a
+ valid and a revoked server certificate when establishing TLS
+ connections. Uses the OpenSSL OCSP responder.
+
+ Signed-off-by: Thomas Klute <thomas2.klute@uni-dortmund.de>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 09:23:22 2016 +0200
+
+ INSTALL.md: no longer reference libgcrypt
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 09:16:32 2016 +0200
+
+ doc: updated README files
+
+ This makes the names a bit more reasonable, drops the very generic
+ INSTALL file, and also allows the github repository to print the
+ correct README file.
+
+ README -> INSTALL.md
+ README-alpha.md -> README.md
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 08:56:59 2016 +0200
+
+ tests: renamed cert-callback checks for simplicity
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 08:55:50 2016 +0200
+
+ tests: added check with the legacy cert verification callback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 08:54:43 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 17 08:43:58 2016 +0200
+
+ tests: cert-callbacks check now checks the server-side callback operation as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 16 18:08:27 2016 +0200
+
+ tests: dtls-stress: fix debug argument accounting
+
+ It was not being considered when it was not the last argument.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 16 18:05:34 2016 +0200
+
+ tests: re-disabled dtls-nb check; it had random failures
+
+ This was disabled for quite long time already, and needs to
+ be investigated.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 16 13:47:23 2016 +0200
+
+ tests: added DTLS test suite when in session resumption
+
+ While there is already a test suite for DTLS lost packets/rearranges
+ it does not cover the session resumption flights. This patch
+ enhances the test suite with these checks.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 10:44:42 2016 +0200
+
+ dtls-stress: added session resumption option
+
+ This allows to perform tests on DTLS resumed sessions for
+ retransmitions due to lost packets.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 11:34:32 2016 +0200
+
+ tests: dtls: removed excessive debugging output from test
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 11:08:57 2016 +0200
+
+ tests: dtls-stress: corrected parsing of -d option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 10:49:42 2016 +0200
+
+ record.c: removed superfluous debugging
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 10:40:38 2016 +0200
+
+ gnutls_assert_val: corrected regression from 78ee98e06c7862df38131b12083adc1a0c5eea4a
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 15 09:30:02 2016 +0200
+
+ gnutls_assert_val: was modified to be in line with gnutls_assert()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 13:03:27 2016 +0200
+
+ .gitlab-ci.yml: added new build target without SSL 3.0
+
+ Also disable SSL3.0 in the minimal library compilation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:58:27 2016 +0200
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:57:47 2016 +0200
+
+ tests: added key exchange checks for all DTLS protocols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:48:45 2016 +0200
+
+ doc: prefer the usage of VERS-ALL in documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:47:18 2016 +0200
+
+ ext master secret: don't enable when SSL 3.0 is the only protocol
+
+ That is on server side only. On client side this logic was already
+ present.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:18:44 2016 +0200
+
+ tests: separated the key exchange checks
+
+ That is introduce separate checks for each key exchange on every TLS version.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 11:12:56 2016 +0200
+
+ doc: mention the TLS 1.2 restriction of sign algo functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 10:28:49 2016 +0200
+
+ Allow for conditional compilation of SSL 3.0 protocol
+
+ This allows to completely remove SSL 3.0 support by calling configure
+ with the '--disable-ssl3' option.
+
+ Resolves #93
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 08:03:48 2016 +0200
+
+ Makefile.am: include renamed files into distribution
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 00:39:23 2016 +0200
+
+ README-alpha.md: refer to CONTRIBUTING.md [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 00:38:59 2016 +0200
+
+ LICENSE: mention that documentation is under GNU FDL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 00:35:45 2016 +0200
+
+ Leave only LICENSE in the root directory and move licenses to doc/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 00:13:44 2016 +0200
+
+ Added a LICENSE file [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 14 00:31:43 2016 +0200
+
+ Moved coding style and contribution guide to CONTRIBUTION.md
+
+ This aligns with gitlab's web interface.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 13 20:39:11 2016 +0200
+
+ tests: include unistd.h in tests which call _exit()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 13 13:41:53 2016 +0200
+
+ tests: simplified server launching process
+
+ Also attempt to use a new port on every started server and
+ added a waiting period for the port to become re-usable.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 13 11:28:51 2016 +0200
+
+ tests: avoid calling exit() from signal handlers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 13 11:16:58 2016 +0200
+
+ memmem.m4: don't call exit() from signal handler
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 11:24:03 2016 +0200
+
+ tests: enhance SNI checking with invalid UTF8 and embedded NULL case
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 11:22:51 2016 +0200
+
+ Introduce _gnutls_server_name_set_raw
+
+ This is an internal function intended for testing, which performs
+ the same as gnutls_server_name_set() but without any UTF8 conversions
+ or other checks in the input. It is intended to be used with raw data.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 11:21:16 2016 +0200
+
+ errors: include GNUTLS_E_IDNA_ERROR to the list
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 10:58:58 2016 +0200
+
+ server_name: only save the supported server names in the session
+
+ Invalid server names with embedded nulls and unsupported types
+ are not saved.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 10:37:56 2016 +0200
+
+ gnutls_server_name_get: mention GNUTLS_E_IDNA_ERROR being returned
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 12 09:24:23 2016 +0200
+
+ doc: clarify that 'hmac' in the name of functions is only for legacy reasons
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 11 13:23:33 2016 +0200
+
+ tests: introduce delay between server restarts in testsrn.sh
+
+ This is to reduce test suite random failures on CI.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 11 09:31:28 2016 +0200
+
+ tests: CRL test will separate stderr output from stdout
+
+ This addresses CI failures due to "Merge mismatch for function" messages
+ from gcov being inserted into stdout output and messing the base64 encoding.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 11 09:28:55 2016 +0200
+
+ Revert "tests: CRL test will not push stderr into output files"
+
+ This reverts commit bf1ee75f78cd81ea8309bdfb50f63ed0ab61a23a.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 11 09:27:32 2016 +0200
+
+ gnutls_pkcs7_print: avoid warning for signed/unsigned comparison by making everything signed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 11 08:17:37 2016 +0200
+
+ tests: CRL test will not push stderr into output files
+
+ This addresses CI failures due to "Merge mismatch for function" messages
+ from gcov being inserted into output and messing the base64 encoding.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 22:46:34 2016 +0200
+
+ pack_srp_auth_info: corrected check for uninitialized username
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 22:48:56 2016 +0200
+
+ call_get_cert_callback: removed dead code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 22:11:52 2016 +0200
+
+ pkcs11: added error check in _gnutls_buffer_append_data()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 22:08:23 2016 +0200
+
+ gnutls_pubkey_verify_data2: simplified return logic
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 22:02:54 2016 +0200
+
+ gnutls_pkcs7_print: corrected type of unsigned count variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 21:55:07 2016 +0200
+
+ _gnutls_krb5_der_to_principal: fixed invalid deinitialization on cleanup
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 20:57:08 2016 +0200
+
+ tests: don't run hash-large on freebsd
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 20:06:03 2016 +0200
+
+ tests: fix mmap usage of hash-large to correctly detect failures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 15:23:11 2016 +0200
+
+ doc: updated documentation for gnutls_x509_crt_get_*_dn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 15:20:09 2016 +0200
+
+ certtool: handle empty CNs on verification
+
+ That is, handle GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE if returned
+ from gnutls_x509_crt_get_dn() on the end certificate.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 15:17:18 2016 +0200
+
+ Revert "x509: allow empty DNs on parsing for subject DNs"
+
+ This reverts commit 1641ea943079765d601cf418dc2c89c1c93f0ecf.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:40:43 2016 +0200
+
+ cert cred: add the CN to the list of known hostnames only if no dns_names
+
+ That is, follow rfc6125 and support CN as a fallback only.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:23:02 2016 +0200
+
+ tests: enhanced set_x509*_key to verify that connections succeed with creds
+
+ That is the tests no only verify that credentials are set as expected
+ but also whether sessions are established with the credentials provided.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:15:53 2016 +0200
+
+ gnutls_certificate_set_key: import the DNS names of the certificates
+
+ That is, only when no (NULL) names are provided.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:12:33 2016 +0200
+
+ reset the global time func on init/deinit
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:05:03 2016 +0200
+
+ auth/cert: log the server name requested by client
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 11:00:02 2016 +0200
+
+ improved output of gnutls_assert()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 10:44:57 2016 +0200
+
+ x509: allow empty DNs on parsing for subject DNs
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Mon May 9 20:57:36 2016 +0300
+
+ build: tests/windows/cng-windows.c: fix implicit decleration of exit
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 09:15:29 2016 +0200
+
+ .gitlab-ci.yml: enable openssl compat library in minimal build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 10 09:12:51 2016 +0200
+
+ openssl_compat: removed unneeded headers
+
+ These headers have been renamed, but they were not necessary for
+ this module's compilation. Report/Patch by Andreas Metzler.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 9 21:47:14 2016 +0200
+
+ .gitlab-ci.yml: added build for windows DLLs
+
+ This creates the windows DLLs on every tagged release.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 9 08:03:24 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 9 07:52:14 2016 +0200
+
+ bumped soversion
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 9 07:51:05 2016 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 7 13:34:34 2016 +0200
+
+ x509: use the modified flag in gnutls_x509_crt_t
+
+ That will avoid re-encoding or decoding in common operations.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat May 7 13:18:20 2016 +0200
+
+ x509: added flag to indicate modification in gnutls_x509_crt_t
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 6 16:55:48 2016 +0200
+
+ gnutls_x509_crt_equals*: modified to allow operation with certificates that are not imported
+
+ This allows it operating with certificates that are generated from scratch.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 6 16:04:31 2016 +0200
+
+ tests: added checks for certificate generation APIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 6 15:40:14 2016 +0200
+
+ doc: fixed documentation of gnutls_x509_crt_set_subject_alternative_name
+
+ The previous version could not be parsed by gdoc.
+
+Author: Hubert Kario <hkario@redhat.com>
+Date: Fri May 6 11:12:29 2016 +0200
+
+ gnutls-serv: sending alerts on mismatched SNI names
+
+ Extend serv utility to be able to send alerts when the name advertised
+ by client does not match the name expected by server.
+
+Author: Hubert Kario <hkario@redhat.com>
+Date: Fri May 6 11:05:10 2016 +0200
+
+ Add support for sending unrecognized name alerts
+
+ To better test support for server_name extension in TLS, it's
+ necessary to be able to differentiate between name being rejected
+ because it is unknown to the server and it being malformed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 6 11:41:12 2016 +0200
+
+ doc: TODO list references to gitlab
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 5 11:10:38 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 5 11:01:29 2016 +0200
+
+ priorities: when without AES acceleration prefer stream ciphers (i.e., CHACHA20)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 5 22:49:50 2016 +0200
+
+ doc: updated documentation on rehandshake and GNUTLS_ALLOW_ID_CHANGE [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 4 09:13:50 2016 +0200
+
+ tests: use the 'b' modifier for writing binary data in set_x509_key_file_der
+
+ This allows the test to operate properly on windows systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 4 08:07:37 2016 +0200
+
+ tests: avoid the usage of tmpnam()
+
+ Use a simpler version which is confined within the testsuite
+ build directories.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 4 07:48:37 2016 +0200
+
+ tests: disable checks with tmpnam() on windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 20:14:37 2016 +0200
+
+ tests: fixed 64-bit check for time_t in mini-x509
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 15:26:52 2016 +0200
+
+ tests: added check for gnutls_certificate_set_x509_simple_pkcs12_file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 15:12:47 2016 +0200
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 15:12:00 2016 +0200
+
+ tests: added check of gnutls_certificate_set_x509_key_file2 with DER input
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 14:54:31 2016 +0200
+
+ tests: enhanced set_x509_key_file check
+
+ That now verifies that the input is the same as the data stored
+ in the credentials as well checks for valid operation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 14:29:35 2016 +0200
+
+ tests: mini-x509: include the legacy verification functions into the check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 14:28:44 2016 +0200
+
+ tests: added check for gnutls_certificate_set_key()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 14:24:08 2016 +0200
+
+ gnutls_certificate_set_key: duplicate the provided memory
+
+ That is, do not assume that a heap allocated value is provided.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 11:54:04 2016 +0200
+
+ .gitlab-ci.yml: enabled coverage run in the x86 build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 11:49:09 2016 +0200
+
+ tests: do not block server errors in testdsa from being printed out
+
+ Also added a delay prior to launching next server instance.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 11:43:48 2016 +0200
+
+ .gitignore: more test files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 11:26:04 2016 +0200
+
+ pkcs11: find_ext_cb: eliminated memory leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 10:56:44 2016 +0200
+
+ pkcs11: find_cert_cb: do not use C_FindObjectsInit() when another is already running
+
+ While some modules implicitly terminated the previous run, this is not
+ something that PKCS#11 modules are expected to typically do.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 3 09:28:36 2016 +0200
+
+ pkcs11: the flag GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT will be respected by imported certificates
+
+ That is, certificates imported with gnutls_pkcs11_obj_import_url() or
+ gnutls_x509_crt_import_url() will be able to be extracted with their
+ extensions overriden. Previously that was available only on gnutls_pkcs11_get_raw_issuer()
+ and friends.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 15:36:56 2016 +0200
+
+ tests: added a basic PKCS#11 mock module
+
+ This is used to test gnutls_pkcs11_obj_get_exts(), gnutls_x509_crt_import_url(),
+ and gnutls_pkcs11_get_raw_issuer() with the GNUTLS_PKCS11_OBJ_FLAG_OVERWRITE_TRUSTMOD_EXT
+ flag.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 13:13:10 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 13:12:00 2016 +0200
+
+ _gnutls_x509_crt_cpy: optimized and simplified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 12:53:54 2016 +0200
+
+ exported gnutls_x509_crt_equals() and gnutls_x509_crt_equals2()
+
+ These functions provide a way to compare parsed certificates. They
+ were used internally and they are quite useful to be made available.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 15:36:37 2016 +0200
+
+ gnutls_pkcs11_obj_get_exts: updated documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 12:09:03 2016 +0200
+
+ gnutls_x509_crt_import_url: updated documentation for new function name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 12:05:48 2016 +0200
+
+ gnutls_pkcs11_add_provider: clarified params description
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 08:38:32 2016 +0200
+
+ tests: added checks on PKCS#1 digest info encoding/decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 08:37:45 2016 +0200
+
+ gnutls_decode_ber_digest_info: return more precise error code on unknown hash
+
+ That is instead of returning GNUTLS_E_UNKNOWN_ALGORITHM on unknown hash,
+ return GNUTLS_E_UNKNOWN_HASH_ALGORITHM.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 2 08:35:58 2016 +0200
+
+ errors.h: removed terminating colon on gnutls_assert() output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 1 12:13:26 2016 +0200
+
+ doc: updated PKCS #11 documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 18:09:18 2016 +0200
+
+ gnutls_certificate_get_crt_raw: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 18:06:51 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 17:50:45 2016 +0200
+
+ doc: mention the version after which gnutls_pem_base64_en/decode2() are available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 08:26:37 2016 +0200
+
+ tests: use one-time files in crl
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 07:14:13 2016 +0200
+
+ tests: check whether the randomly generate port is used
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 30 07:05:46 2016 +0200
+
+ .gitlab-ci.yml: enabled the code coverage checks in the valgrind and ubsan targets
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 19:38:44 2016 +0200
+
+ tests: enhanced the key-import-export tests
+
+ This check now includes the abstract privkey import/export interfaces.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 19:38:01 2016 +0200
+
+ corrected import issue in gnutls_privkey_import_ecc_raw
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 19:31:48 2016 +0200
+
+ x509/privkey: in raw import functions set the parameter's algorithm type
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 19:03:11 2016 +0200
+
+ srp base64: return proper gnutls errors codes on error rather than -1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 19:02:45 2016 +0200
+
+ tests: added checks for base64 functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 18:04:50 2016 +0200
+
+ .gitlab-ci.yml: added code coverage run
+
+ This enhances a test to print the code coverage of the test suite,
+ which in turn is being used/reported by gitlab CI interface.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 14:53:40 2016 +0200
+
+ ax_code_coverage.m4: updated to latest version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 13:12:36 2016 +0200
+
+ libtasn1: updated to latest version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 12:57:23 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 12:56:24 2016 +0200
+
+ errors.h: gnutls_assert() will log the function name in addition to filename/line
+
+ This is quite necessary after the filenames were simplified and we have
+ filenames with identical names in the directory structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 12:34:43 2016 +0200
+
+ tests: added check for SRP ID change during rehandshake
+
+ The tests make sure that username changes are allowed if the
+ flag GNUTLS_ALLOW_ID_CHANGE is specified, and prohibited otherwise.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 11:47:58 2016 +0200
+
+ tests: added check for PSK ID change during rehandshake
+
+ The tests make sure that username changes are allowed if the
+ flag GNUTLS_ALLOW_ID_CHANGE is specified, and prohibited otherwise.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 10:23:45 2016 +0200
+
+ handshake: enhance same certificate checks to apply to PSK/SRP username
+
+ That is, unless GNUTLS_ALLOW_ID_CHANGE is specified, during a rehandshake
+ clients will not be allowed to present another certificate than the original,
+ or change their username for PSK or SRP ciphersuites.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 09:39:13 2016 +0200
+
+ tests: added 'PFS' and 'SUITEB128' into the list of checked priority strings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 09:29:45 2016 +0200
+
+ tests: fail() function will also print function and line information
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 09:36:02 2016 +0200
+
+ _gnutls_hex2bin: refuse to decode odd-sized hex data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 29 09:32:52 2016 +0200
+
+ tests: added unit tests on the HEX encoding/decoding functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 18:08:56 2016 +0200
+
+ certtool: eliminated memory leaks in DH parameter printing/generation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 17:42:49 2016 +0200
+
+ certtool: combined all the seed decoding methods to a single one
+
+ That not only simplifies the code, but also allows decoding hex strings
+ which contain not hex chars (and that allows decoding hex of the form XX:XX:XX)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 17:31:24 2016 +0200
+
+ Revert "tests: ensure the seed is provided in plain hex"
+
+ This reverts commit 0ea7206e12f52f6ed50c4a76ea0a23f5470115b2.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 16:41:26 2016 +0200
+
+ tests: check certtool dh-parameter generation with --provable option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 16:38:16 2016 +0200
+
+ tests: ensure the seed is provided in plain hex
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 16:34:29 2016 +0200
+
+ certtool: allow specifying seed size when generating provable DH parameters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 14:34:17 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 14:26:19 2016 +0200
+
+ tests: simplified custom-urls check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 14:22:44 2016 +0200
+
+ tests: added check on whether builtin URLs cannot be overriden
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 14:09:44 2016 +0200
+
+ keys: custom URLs take precedence over pre-defined URLs
+
+ This allows applications to define the own 'system:' or 'pkcs11:'
+ URLs.
+
+ Resolves #89
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 16:45:44 2016 +0200
+
+ x25519: ensure that a valid private key is present on key derivation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 10:33:47 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 10:32:51 2016 +0200
+
+ tests: added check for GNUTLS_FORCE_CLIENT_CERT init flag
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 10:31:50 2016 +0200
+
+ instead of assigning a variable per flag use the init flags directly
+
+ That is store the flags provided in gnutls_init() in the session structure
+ and use these flags directly when required.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 09:28:54 2016 +0200
+
+ added flag in session to force sending a client certificate
+
+ This handles the use case of a client connecting to a server
+ which incorrectly lists the CA certificates it supports. Without
+ that change the only option was to avoid using the "automatic"
+ client certificate functions, but rather utilize callbacks.
+ With that approach this use case is handled by the "automatic"
+ certificate selection functions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 13:28:50 2016 +0200
+
+ .gitlab-ci.yml: do not load submodules on CI since they are not used
+
+ This reduces the CI running time.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 28 09:27:24 2016 +0200
+
+ tests: check client behavior of sending CA certificates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 27 08:18:45 2016 +0200
+
+ doc: removed news about feature already backported in 3.4.6
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 27 08:17:45 2016 +0200
+
+ examples: introduced basic error checking in more examples
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 27 07:55:50 2016 +0200
+
+ examples: simplified the basic client example
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 27 07:50:20 2016 +0200
+
+ examples: introduced basic error checking in main client examples
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 27 07:38:47 2016 +0200
+
+ examples: corrected the required version of example
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 15:03:08 2016 +0200
+
+ tests: enhanced dane testing with offline verification checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 14:34:26 2016 +0200
+
+ dane: verification will not fail if a CA entry is encountered but cannot be verified
+
+ That addresses the issue of verifying a single certificate against a list
+ of TLSA entries that contain an entry with CA usage (cert usage 0). With
+ the previous behavior verification would have failed, while now this
+ entry will be skipped.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 13:54:17 2016 +0200
+
+ doc: improved documentation on certificate and DANE verification functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 13:35:35 2016 +0200
+
+ dane: updated documentation of dane_verify_crt_raw
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 13:00:46 2016 +0200
+
+ doc: added clarifications on documentation for dane_state_t
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 26 12:56:35 2016 +0200
+
+ manpages: include the dane functions into the distributed pages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 15:35:20 2016 +0200
+
+ ecdhe: eliminated unneeded checks for zero of public parameters
+
+ There were not required by either draft-ietf-tls-rfc4492bis-07
+ or rfc7748.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 15:22:55 2016 +0200
+
+ doc: added example client application utilizing the 3.1.x APIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 15:13:42 2016 +0200
+
+ examples: added explicit 3.5.0 dependency in ex-client-x509
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 15:11:00 2016 +0200
+
+ examples: added error checks and updated verify_certificate_chain()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 14:30:07 2016 +0200
+
+ .gitlab-ci.yml: made the linux tag explicit for our runners
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 14:15:04 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 14:13:11 2016 +0200
+
+ doc: document curve X25519
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 14:12:46 2016 +0200
+
+ doc: clarify what catch all means in all scenarios
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 11:07:46 2016 +0200
+
+ gnutls-cli-debug: added tests for supported curves
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 23 15:20:21 2016 +0200
+
+ tests: include self tests with CURVE-X25519
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 22 13:17:38 2016 +0200
+
+ gnutls-cli: enhanced KX benchmark with X25519
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 22 12:25:59 2016 +0200
+
+ handshake: added support for ECDH with curve X25519
+
+ This follows draft-ietf-tls-rfc4492bis-07 and rfc7748
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 12:11:48 2016 +0200
+
+ tests: updated the openssl compat check to make explicit the used curves
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 11:12:29 2016 +0200
+
+ ecdhe: print the received curve from the server on debug mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 24 10:54:54 2016 +0200
+
+ gnutls-cli-debug: added CHACHA20-POLY1305 detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 23 22:25:35 2016 +0200
+
+ tests: on out of memory conditions do not fail the hash-large test
+
+ This test may require a large amount of memory which some CI systems
+ cannot provide. When an out-of-memory-error is detected skip the test
+ instead of failing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 23 15:15:50 2016 +0200
+
+ session: removed unused parameters from RSA-EXPORT era
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 23 14:52:03 2016 +0200
+
+ README-alpha.md: updated badges with the new gitlab URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 22 09:26:55 2016 +0200
+
+ doc: document the TPM 1.2 limitation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 21 16:50:46 2016 +0200
+
+ doc: tpm: include short instructions on initializing the TPM chip
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 16:19:32 2016 +0200
+
+ tests: hash-large: use private mmap()
+
+ This reduces the memory usage of the test significantly on Linux.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 12:04:09 2016 +0200
+
+ tests: use mmap() for large memory allocations in systems that support it
+
+ That allows the hash-large test to run on systems which its calloc()
+ is attempting to allocate an impossible amount of memory.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 11:28:21 2016 +0200
+
+ tests: use /bin/bash for tests that use bashisms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 11:02:10 2016 +0200
+
+ tests: don't run danetool.sh if danetool is not present
+
+ That prevents test suite failure in systems without libunbound.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 10:08:23 2016 +0200
+
+ gnutls_int.h: allow compiling with system (gnutls) headers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 20 13:44:59 2016 +0200
+
+ .gitlab-ci.yml: added build rule on freebsd
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 23:11:13 2016 +0200
+
+ certtool: document sha3 functions in manpage [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 23:06:24 2016 +0200
+
+ doc: added missing @end example in danetool documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 22:50:52 2016 +0200
+
+ doc: updated documentation on false start
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 22:37:22 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 19:25:08 2016 +0200
+
+ gnutls-cli-debug: enable socket verbosity when --verbose is given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 19:23:23 2016 +0200
+
+ tools: explicitly initialize socket struct to zero
+
+ That resolves issue where verbose was enabled by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 19:18:05 2016 +0200
+
+ tools: avoid extracting the value of the app-proto alias
+
+ Instead always extract the starttls-proto value, as it seems
+ that libopts doesn't report any value for the former. This
+ corrects the starttls capability of danetool and gnutls-cli-debug.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 19:12:51 2016 +0200
+
+ tools: document the starttls capability
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 19 09:20:04 2016 +0200
+
+ tests: do not run danetool.sh on windows
+
+ The test fails due to CRLF.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 16:24:34 2016 +0200
+
+ tools: avoid relying on static buffers for service name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 16:16:59 2016 +0200
+
+ tests: added basic check on danetool --tlsa-rr option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 16:03:37 2016 +0200
+
+ danetool: Allow specifying a service name into port option
+
+ This makes the tool similar to gnutls-cli.
+
+Author: Kevin Cernekee <cernekee@gmail.com>
+Date: Mon Apr 18 15:15:32 2016 +0200
+
+ Fix library build on Chrome Native Client (NaCl)
+
+ Some supported toolchains define DT_UNKNOWN but do not
+ define _DIRENT_HAVE_D_TYPE (and do not have the d_type field).
+ On other platforms GnuTLS may need to second-guess what the
+ library is reporting, but on NaCl this is unsafe.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 12:03:05 2016 +0200
+
+ gnutls-serv: don't send closure messages in failed handshakes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 11:46:39 2016 +0200
+
+ client key exchange: fail if the client KX message is padded with additional bytes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 18 11:18:04 2016 +0200
+
+ _wrap_nettle_pk_derive: reject values of public key that are over the prime
+
+ That is do not canonicalise the value we get from the network, but
+ rather check it for validity. This saves a modular reduction on handshake
+ and performs a sanity check on the peer's (client) parameters.
+ Reported by Hubert Kario.
+
+ Resolves #84
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 15 10:17:32 2016 +0200
+
+ tests: suite: disable any openssl cpu optimizations
+
+ This prevents from valgrind failures on softhsm usage due to
+ any new instruction optimizations which are not supported by
+ valgrind.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 15 10:14:22 2016 +0200
+
+ doc: further updated documentation on false start [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 19:32:22 2016 +0200
+
+ doc: updated documentation on false start
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 19:23:13 2016 +0200
+
+ tests: enhanced the false start checks
+
+ These now check whether sending and receiving is performed
+ as expected after handshake, DTLS, as well as test explicit handshake
+ called by the application.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 19:20:36 2016 +0200
+
+ Updated false start support to be transparent to applications.
+
+ That is, an additional flag GNUTLS_ENABLE_FALSE_START is introduced
+ for gnutls_init(), and that enables support for false start. At
+ this point false start will be performed by the handshake if possible,
+ and gnutls_record_recv() will handle handshake completion.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 11:11:01 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 11:02:59 2016 +0200
+
+ doc: updated docs related to private key generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 10:54:49 2016 +0200
+
+ certtool: do not allow combining --provable with --ecc in key generation
+
+ There is no such support in the library.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 10:33:55 2016 +0200
+
+ updated auto-generated files for new APIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 14 10:28:36 2016 +0200
+
+ doc: added tlsproxy example reference into documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 15:55:56 2016 +0200
+
+ tests: pem-decoding: fixed issue preventing out-of-tree checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 15:48:58 2016 +0200
+
+ tests: pem-decoding: use unique temp files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 14:06:02 2016 +0200
+
+ tests: enhanced mini-x509-kx with ECDHE-ECDSA ciphersuite testing
+
+ Also renamed it to cert-key-exchange for easier tracking.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 13:59:02 2016 +0200
+
+ handshake: do not overwrite the server's signature algorithm
+
+ That is, correct a bug under which a client sending a certificate
+ would overwrite the server's idea about the used signature algorithm.
+ Reported by Hubert Kario.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 13:50:59 2016 +0200
+
+ tests: enhanced mini-x509-kx with client auth scenarios
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 13:39:38 2016 +0200
+
+ tests: verify that the output of gnutls_sign_algorithm_get() is the expected one
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 13:06:23 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 11:43:56 2016 +0200
+
+ ocsp: increased the preallocated space in check_ocsp_purpose to account for null terminator
+
+ This relates to gnutls_x509_crt_get_key_purpose_oid() change to
+ return null-terminated OIDs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 11:28:13 2016 +0200
+
+ tests: enhanced and simplified SHA3 tests
+
+ Included checks about SHA3-224 and SHA3-384.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 11:05:19 2016 +0200
+
+ tests: added check of GOST cert decoding/printing
+
+ This verifies whether our printing functions print the
+ OID on unknown/unsupported algorithms.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 11:04:12 2016 +0200
+
+ x509 output: print the OID of certificates/CRLs/CRQs with unknown algorithms
+
+ That is, if any unknown signature or subject public key algorithm is
+ encountered the OID will be printed instead.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 10:27:14 2016 +0200
+
+ tests: added basic tests for CSR parsing
+
+ This mainly includes tests on the new gnutls_x509_crq_get_signature_oid()
+ and gnutls_x509_crt_get_algorithm_oid().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 10:16:29 2016 +0200
+
+ tests: added basic tests on CRL parsing
+
+ That includes testing on the new gnutls_x509_crl_get_signature_oid()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 09:51:46 2016 +0200
+
+ tests: added basic functionality tests for gnutls_x509_crt_get_*_oid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 09:43:31 2016 +0200
+
+ Added gnutls_x509_crl_get_signature_oid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 09:39:21 2016 +0200
+
+ Added gnutls_x509_crq_get_signature_oid and gnutls_x509_crq_get_pk_oid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 09:17:08 2016 +0200
+
+ Added gnutls_x509_crt_get_signature_oid and gnutls_x509_crt_get_pk_oid
+
+ These functions can directly provide the textual object identifier
+ of their corresponding fields.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 09:03:56 2016 +0200
+
+ gnutls_x509_crt_get_key_purpose_oid: copy the OID as a null-terminated string
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 13 08:53:23 2016 +0200
+
+ sign: corrected digest in SHA3-224 OID mapping
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 22:53:57 2016 +0200
+
+ configure: corrected regression which prevented the build of tests/suite
+
+ This regression was introduced at 8b97662c40c67a6d4087ce6e1f0c6fb6ea4a8b2c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 22:25:06 2016 +0200
+
+ gnutls_x509_ext_import_policies: initialize value to avoid compiler warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 22:21:02 2016 +0200
+
+ README: removed inexistent package
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 22:16:22 2016 +0200
+
+ common.mk: corrected typo on LDFLAGS for coverage
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 19:25:18 2016 +0200
+
+ danetool: corrected typo in manual [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 16:07:41 2016 +0200
+
+ gnutls_packet_get: avoid null pointer dereference on NULL input
+
+ That is, still allow the function to handle a NULL packet
+ input but reset the data contents.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 16:04:24 2016 +0200
+
+ gnutls_x509_privkey_verify_seed: corrected typo that made the function always return true
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 16:02:20 2016 +0200
+
+ _gnutls_asn2err: declared as constant function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 15:37:38 2016 +0200
+
+ load_dir_certs: use readdir() in all platforms
+
+ According to glibc documentation readdir_r() is deprecated
+ and the use of readdir() is recommended. As such we switch to
+ it on all platforms.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 15:26:42 2016 +0200
+
+ tests: combined the resume checks for Anonymous and PSK ciphersuites
+
+ In addition enhanced it to check the resumption on the certificate
+ ciphersuites as well.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 14:21:04 2016 +0200
+
+ configure: Add a code coverage option
+
+ Configure with:
+ ./configure --enable-code-coverage
+ Show coverage output with:
+ make && make check && make code-coverage-capture
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 14:17:26 2016 +0200
+
+ Makefile.am: moved common rules (AM_CFLAGS) to common.mk
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 12:12:40 2016 +0200
+
+ gnutls_ocsp_resp_get_single: fail if thisUpdate is not available or unparsable
+
+ That is because this field is not optional, and a failure on its
+ parsing is always fatal. Reported by Yuan Jochen Kang.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 12 12:08:35 2016 +0200
+
+ gnutls_x509_privkey_import2: document an intentional fall through
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 11 16:48:46 2016 +0200
+
+ README: add abi-compliance-checker into install instructions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 11 08:49:11 2016 +0200
+
+ gnutls_x509_crt_get_key_usage: ensure that its returned value is properly handled
+
+ Reported by Yuan Jochen Kang.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 10 10:54:29 2016 +0200
+
+ tests: do not enable valgrind in non-git builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 13:38:47 2016 +0200
+
+ hash: corrected the textual description of hashes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 13:34:39 2016 +0200
+
+ corrected SHA3-224 OID
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 13:31:54 2016 +0200
+
+ x509 output: don't warn about insecure algorithm when unknown
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 12:43:22 2016 +0200
+
+ tests: remove any system specific code of ecore
+
+ This was causing issues with certain builds and
+ was not used for the purpose of testing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 11:51:34 2016 +0200
+
+ tests: disable unsupported curves from compatibility checks
+
+ This allows running make check even when compiling with disable-suiteb-curves.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 11:49:07 2016 +0200
+
+ tests: removed unused scripts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 11:46:27 2016 +0200
+
+ .gitlab-ci.yml: combined C99 and undefined sanitizer builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 09:46:06 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 09:43:49 2016 +0200
+
+ crywrap: was removed from gnutls tools
+
+ Its inclusion did not increase the attention paid to this
+ tool, not provided any significant advantage to gnutls' users
+ thus it was unbundled from the main library. The tool can be found at
+ https://github.com/nmav/crywrap
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 9 08:17:53 2016 +0200
+
+ minitasn1: updated to latest git version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 8 19:46:36 2016 +0200
+
+ doc: Replace references to select with poll and other fixes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 8 19:40:28 2016 +0200
+
+ doc: replace inaccurate sentence with reference to gnutls_record_discard_queued [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 8 15:40:06 2016 +0200
+
+ gnutls_record_get_direction: doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 8 14:13:26 2016 +0200
+
+ tests: reduce the number of loops in x509sign-verify2
+
+ This enables running the test in reasonable time under valgrind.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 8 13:36:44 2016 +0200
+
+ pkix.asn: corrected byKey definition
+
+ OCSP is defined in an EXPLICIT tags module, and as such
+ we must tag explicitly all of its tags.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 13:22:29 2016 +0200
+
+ tests: check the generation of IP name constraints with certtool
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 13:21:53 2016 +0200
+
+ certtool: allow generating IP name constraints
+
+ Relates #83
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 13:16:07 2016 +0200
+
+ _gnutls_parse_general_name2: allow parsing empty names
+
+ This allows parsing empty general names such as an empty DNSname
+ used in name constraints.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 11:54:50 2016 +0200
+
+ name constraints: enforce the rules for IP constraints when adding
+
+ This will prevent gnutls from generating badly formed certificates.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 10:36:05 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 10:33:18 2016 +0200
+
+ .gitignore: more files to ignore
+
+Author: Daiki Ueno <ueno@gnu.org>
+Date: Wed Mar 16 14:21:41 2016 +0900
+
+ name constraints: compute permitted set strictly
+
+ RFC 5280 6.1.4. states that the permitted_subtrees variable is
+ constructed as an intersection of its previous value.
+
+ Co-authored-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 09:08:14 2016 +0200
+
+ .gitlab-ci.yml: added C99 target for the library
+
+ This compiles the library using gcc options for the C99
+ standard.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 5 08:44:34 2016 +0200
+
+ README: updated libtasn1 URL [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 3 09:46:24 2016 +0200
+
+ x86-common: increase the size of _gnutls_x86_cpuid_s to match the size of assembly files
+
+ This resolves issue on certain platforms (e.g., windows) where ld would simply fail,
+ instead of allocate the largest size of the variable.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 2 12:56:45 2016 +0200
+
+ ocsptool: use HTTP/1.0 for requests
+
+ This avoids issue with servers serving chunk encoding which
+ ocsptool doesn't support. Reported by Thomas Klute.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 2 12:02:08 2016 +0200
+
+ gnutls_init(): refer to gnutls_init_flags_t for the documentation of available flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 2 11:16:19 2016 +0200
+
+ README.CODING_STYLE: set C99 as the C dialect of choice
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 1 11:10:56 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 1 11:08:38 2016 +0200
+
+ tests: added check for system priority file loading and parsing
+
+ This checks whether the file is properly loaded and its contents
+ are parsed as expected.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 1 10:46:12 2016 +0200
+
+ priorities: preload the system priorities on library loading time
+
+ This allows to rely on the system priorities even in the case of
+ applications that chroot(). This also introduces the environment
+ variable GNUTLS_SYSTEM_PRIORITY_FILE which can be used to override
+ the global priority file.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 17:25:45 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 17:24:37 2016 +0200
+
+ tests: added check of verification using MD5 with and without --verify-allow-broken
+
+ This tests certtool and whether it fails verification of MD5 chains
+ with no --verify-allow-broken, or whether it succeeds if given.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 17:15:34 2016 +0200
+
+ tests: added PKCS #7 signing/verification test with broken sigs (MD5)
+
+ This tests whether we can sign structures using broken algorithms (MD5),
+ and verify structures signed with broken algoritms if --verify-allow-broken
+ is given to certtool.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 16:58:37 2016 +0200
+
+ certtool: added flag to allow verification using broken algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 09:46:44 2016 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 10:29:59 2016 +0200
+
+ tests: check whether resumption data from resumed session work
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 09:40:09 2016 +0200
+
+ session resumption: lift the limitation of calling gnutls_session_get_data*() on non-resumed sessions
+
+ This allows of obtaining the session data required for proper session resumption
+ from any available session. This brings the API in par with expectations of its
+ users.
+
+ Resolves #79
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 31 09:45:43 2016 +0200
+
+ dtls: added missing dtls.h to state.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 30 12:24:09 2016 +0200
+
+ tests: added check for gnutls_record_set_state() under DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 30 11:37:49 2016 +0200
+
+ dtls: reset the record number sliding window on gnutls_record_set_state()
+
+ This addresses issue where gnutls_record_set_state() was called with a
+ new state but the sliding window information was not updated, thus
+ blocking any incoming packets.
+
+ Resolves #82
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 30 10:13:18 2016 +0200
+
+ x509/output: simplified cidr_to_string()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 16:14:15 2016 +0200
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 16:11:36 2016 +0200
+
+ tests: check gnutls_record_get_state() with DTLS
+
+ Since in DTLS we relied on a sliding window to keep track of the
+ sequence numbers we didn't provide a sensible value to application
+ via gnutls_record_get_state(). This test makes sure that we report
+ the "correct" value when asked. Correct being the next number after
+ the last received packet.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 15:52:59 2016 +0200
+
+ DTLS: save last valid record sequence number
+
+ This will allow to report a valid number to gnutls_record_get_state() callers
+ in case of DTLS. Reported by Fridolin Pokorny.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 15:34:37 2016 +0200
+
+ tests: delete outfile in certtool-long-cn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 15:33:27 2016 +0200
+
+ tests: verify the output of name constraints IP decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 15:04:11 2016 +0200
+
+ x509/output: print RFC5280 CIDRs in name constraints
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 14:11:56 2016 +0200
+
+ tests: check the sequence numbers produced by gnutls_record_get_state()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 29 14:08:58 2016 +0200
+
+ gnutls_record_get_state: Allow for NULL parameters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 24 07:13:59 2016 +0100
+
+ ocsptool: eliminated memory leaks in verify-response option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 24 07:12:34 2016 +0100
+
+ ocsptool: don't exit with error code on verification failures when --ignore-errors is given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 23 23:15:24 2016 +0100
+
+ tests: added OCSP related checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 23 23:14:01 2016 +0100
+
+ ocsptool: exit with error on verification failures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 23 23:00:53 2016 +0100
+
+ ocsp: gnutls_ocsp_resp_verify_direct will skip additional checks for certificates matching issuer
+
+ That eliminates issue with ocsptool rejecting OCSP responses signed
+ by the same CA that signed the certificate. Reported by Thomas Klute.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 23 22:46:16 2016 +0100
+
+ ocsptool: Allow saving responses even if verification fails
+
+ In addition do not enter a spurious newline to responses.
+
+Author: Maya Rashish <coypu@sdf.org>
+Date: Wed Mar 23 18:04:07 2016 +0200
+
+ Avoid using strerror in dtls stress test
+
+ Using it results in build failure on NetBSD:
+ undefined reference to `rpl_strerror'
+
+Author: Maya Rashish <coypu@sdf.org>
+Date: Wed Mar 23 16:08:02 2016 +0200
+
+ Add missing header to testsuite
+
+ This causes a problem for NetBSD+clang tests, because SIGTERM and
+ kill are undefined.
+
+ Resolves #80
+
+ Signed-off-by: Maya Rashish <coypu@sdf.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 23 10:39:59 2016 +0100
+
+ session tickets: avoid GCM for session tickets and rely on CBC and HMAC
+
+ The latter is more resilient against non-key renewal.
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Mon Feb 15 12:14:52 2016 +0200
+
+ Broke apart _gnutls_recv_int() to the packet and non-packet cases.
+
+ Only gnutls_record_recv_packet() called _gnutls_recv_int() with
+ (packet != NULL). I refactored this logic directly downstream into
+ gnutls_record_recv_packet(). The _gnutls_recv_int() function now only
+ handles non-packet specific logic. The check_session_status() function
+ was created to deduplicate common code which would otherwise have
+ ended up in both functions.
+
+ The rationale behind this change is to optimize what were previously
+ calls of _gnutls_recv_int(). First of all _gnutls_recv_int() now has
+ only 6 parameters, which according to the x86_64 System V Application
+ Binary Interface should now fit into CPU registers and no longer use
+ the stack. Secondly this change avoids a number of branching checks
+ for both packet and non-packet cases.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 21 11:29:08 2016 +0100
+
+ gnutls-cli: corrected usage of gnutls_session_get_data()
+
+ This is no longer called on resumed sessions, allowing more than
+ one resumption in servers which use tickets and don't resend the ticket
+ on subsequent connections.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 18 13:10:40 2016 +0100
+
+ testcompat-openssl: enable TLS 1.2 tests with openssl 1.0.1+
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 18 11:21:35 2016 +0100
+
+ tests: verify that the post-client-hello callback has access to ALPN data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 18 10:35:46 2016 +0100
+
+ .gitlab-ci.yml: don't use git submodule update, not needed for our testsuite
+
+Author: Yuriy M. Kaminskiy <yumkam@gmail.com>
+Date: Tue Mar 15 18:21:32 2016 +0300
+
+ alpn: ALPN state is per-connection, it should not be saved with session data
+
+ In addition the extension was moved to the mandatory to parse to ensure it
+ is always parsed when sessions are resumed.
+
+ rfc7301:
+ Unlike many other TLS extensions, this extension does not establish
+ properties of the session, only of the connection. When session
+ resumption or session tickets [RFC5077] are used, the previous
+ contents of this extension are irrelevant, and only the values in the
+ new handshake messages are considered.
+
+ Signed-off-by: Yuriy M. Kaminskiy <yumkam@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 18 09:44:40 2016 +0100
+
+ tests: added checks for session resumption and ALPN
+
+ This checks whether the ALPN extension is re-read on
+ resumption and is negotiated.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 16 10:00:17 2016 +0100
+
+ x86-common: CPUID override will only work if CPU has already the capability present
+
+ This resolves test suite failure on CPUs with limited capabilities.
+ Reported by Andreas Metzler.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 17:35:12 2016 +0100
+
+ Introduced GNUTLS_E_ASN1_EMBEDDED_NULL_IN_STRING
+
+ This error code is returned when an embedded NULL is detected in
+ a string.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 16 21:03:54 2016 +0100
+
+ gnutls_server_name_set: accept non-null terminated hostnames
+
+ The introduction of IDNA support introduced a regression and this
+ function does not operate correctly when given non-null terminated
+ strings. Reported by Tim Ruehsen.
+
+ Relates #78
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 16 20:57:31 2016 +0100
+
+ tests: added check for non-null terminated server name
+
+ This checks whether a non-null terminated server name, but with
+ correct length is correctly accepted by gnutls_server_name_set().
+
+ Relates #78
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 15 12:00:39 2016 +0100
+
+ tests: template-test was updated for OCSP key purpose reordering
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Mon Mar 14 10:44:08 2016 +0100
+
+ guile: doc: Mention bytevectors.
+
+ * doc/gnutls-guile.texi (Representation of Binary Data): Mention bytevectors.
+ (Input and Output): Likewise.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Mon Mar 14 10:44:07 2016 +0100
+
+ guile: doc: Explain "Application Data" packets and 'session-record-port'.
+
+ * doc/gnutls-guile.texi (Input and Output): Mention "Application Data"
+ packets and buffering.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 15 11:20:16 2016 +0100
+
+ certtool: do not require a CA for OCSP signing
+
+ This follows the recommendations in RFC6960 in 4.2.2.2
+ which allow a CA to delegate OCSP signing to another certificate
+ without requiring it to be a CA.
+
+ Reported by Thomas Klute.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 14 14:06:01 2016 +0100
+
+ doc: updated text for gnutls_ocsp_status_request_is_checked()
+
+ Relates #75
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 14 13:56:17 2016 +0100
+
+ doc: clarified expectations on gnutls_datum_t
+
+ Relates #77
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 13 20:55:02 2016 +0100
+
+ doc update: gnutls_handshake_set_false_start_function() [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 13 11:39:22 2016 +0100
+
+ abi-check: corrected type of gnutls_x509_crl_get_issuer_dn
+
+ That will avoid any accidental ABI breakage on that symbol.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 11 14:45:02 2016 +0100
+
+ .gitlab-ci.yml: added abi-checker rule
+
+ This allows to test ABI incompatibilities as soon as possible.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 11 14:36:39 2016 +0100
+
+ Makefile: made abi-checks self-contained
+
+ That is, they no longer assume a given directory structure to exist
+ outside git. It now includes a static dump of the symbols in 3.4.0
+ for x86_64 and we compare with it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 11 11:52:17 2016 +0100
+
+ certtool: better error handling in file_size()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 11 11:47:12 2016 +0100
+
+ gnutls-cli: fix invalid initialization in cert_verify_ocsp()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 11 11:45:23 2016 +0100
+
+ gnutls-serv: human_addr always returns a non-null argument
+
+ This addresses issue with libc's which don't support printf() with
+ a NULL argument.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 8 15:10:07 2016 +0100
+
+ tests: testpkcs11: the test will always fail in code path failures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 8 10:12:22 2016 +0100
+
+ README: list the main branches build status [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 11:50:34 2016 +0100
+
+ gnutls_system_recv_timeout: restore poll on EINTR
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 10:47:43 2016 +0100
+
+ doc: corrected typo [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 10:42:14 2016 +0100
+
+ gnutls_ocsp_status_request_is_checked: document the version the flag was introduced at
+
+ Relates: #75
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 10:25:57 2016 +0100
+
+ doc: generate manpages for all functions
+
+ That addresses issue where certain manpages were created empty.
+ See https://bugzilla.redhat.com/show_bug.cgi?id=1306800
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 10:11:37 2016 +0100
+
+ doc: mention gnutls_certificate_set_x509_trust_dir()
+
+ It was not mentioned in the "Client or server certificate verification"
+ section.
+
+ Resolves #76
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 7 09:30:44 2016 +0100
+
+ tests: mini-loss-time: improved timeout detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 4 10:16:51 2016 +0100
+
+ corrected typo in comment [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 1 16:23:55 2016 +0100
+
+ configure: silence clang's warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 3 14:24:13 2016 +0100
+
+ tests: added check for version negotiation default prio string
+
+ That verifies whether the support versions are negotiated.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 3 09:05:32 2016 +0100
+
+ tests: include test-hash-large into dist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 3 08:50:48 2016 +0100
+
+ Sync with TP [ci skip]
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Wed Mar 2 09:59:19 2016 +0100
+
+ Update NEWS.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 1 14:50:42 2016 +0100
+
+ Disable weak symbols for _gnutls_global_init_skip() under windows
+
+ That is to avoid an issue with running gnutls under windows;
+ that renders GNUTLS_SKIP_GLOBAL_INIT a no-op under windows.
+
+ Relates #74
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 1 13:19:29 2016 +0100
+
+ .gitlab-ci.yml: asan, clang and valgrind builds were made arch-independent
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 20:49:09 2016 +0100
+
+ tests: pkcs12: allow multiple in-place builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 19:41:33 2016 +0100
+
+ tests: pkcs1-pad,rsa-md5-collision: allow multiple in-place builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 17:12:49 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 17:06:12 2016 +0100
+
+ gnutls-cli: fail if gnutls is not compiled with DANE support and --dane is provided
+
+ Suggested by Bjorn Jacke.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 13:23:25 2016 +0100
+
+ tests: always used the slow (portable) version of get16bits
+
+ This prevents issues with misaligned addresses and undefined sanitizer.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 12:46:47 2016 +0100
+
+ timespec_sub_ms: fixed operation in 32-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 10:23:20 2016 +0100
+
+ .gitlab-ci.yml: don't use the internal libtasn1 when compiling with libubsan
+
+ This prevents build failures due to issues in libtasn1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 10:22:13 2016 +0100
+
+ tests: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 10:18:58 2016 +0100
+
+ pkcs11: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:58:40 2016 +0100
+
+ cipher.c: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:57:40 2016 +0100
+
+ ecc: optimized extension parsing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:48:12 2016 +0100
+
+ opencdk: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:48:02 2016 +0100
+
+ gnutls.h: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:43:32 2016 +0100
+
+ x509: Fixes to prevent undefined behavior (found with libubsan)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 29 09:27:23 2016 +0100
+
+ x509: cleanup in privkey.c
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Feb 28 15:35:01 2016 +0100
+
+ Let p11tool --provider option accept filenames.
+
+ Drop 'file-exists = yes;' to allow specifying either an absolute pathname
+ or a file in P11_MODULE_PATH.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 28 13:01:11 2016 +0100
+
+ .gitlab-ci.yml: abort on ubsan errors
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 28 12:12:09 2016 +0100
+
+ p11tool: addressed memory leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 28 10:45:02 2016 +0100
+
+ tests: use 'datefudge -s' to avoid loops
+
+ This avoids repeated loops of the same test as well as
+ random failures in the test suite.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 27 22:37:21 2016 +0100
+
+ tests: krb5-test: increased the number of loops
+
+ This should prevent random failures in the test suite.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 27 22:23:34 2016 +0100
+
+ .gitlab-ci.yml: asan and ubsan include the suite/
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 23 10:35:14 2016 +0100
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 23 10:33:18 2016 +0100
+
+ doc: documented false start functionality
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 23 10:23:57 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 23 10:14:53 2016 +0100
+
+ tests: Added checks for false start operation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 23 09:40:26 2016 +0100
+
+ Added gnutls_handshake_set_false_start_function()
+
+ This function allows to use TLS False-start, by using the provided
+ function to send data just after finished message.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 27 21:54:51 2016 +0100
+
+ tests: enable softhsmv2 test suite by default
+
+ Also do not fatally fail with known softhsmv2 bugs.
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Fri Feb 26 16:17:48 2016 +0100
+
+ pkcs11: tests for RSA, ECC, DSA private key import
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Fri Feb 26 16:17:47 2016 +0100
+
+ pkcs11: tests for DSA key generating
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 27 17:56:36 2016 +0100
+
+ added getpid() to the list of system calls used
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 26 14:41:12 2016 +0100
+
+ .gitlab-ci.yml: added compilation rule with libubsan
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Thu Feb 25 16:43:36 2016 +0100
+
+ gnutls_x509_privkey_import: add missing algorithm setting for DSA keys
+
+ The algorithm number was set only in the private key structure, not in
+ the nested structure with parameters. This made certain operations to
+ fail (e.g., copying the key into a PKCS #11 token).
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Thu Feb 25 15:21:30 2016 +0100
+
+ pkcs11: implement correct DSA key pair generating
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Thu Feb 25 15:21:29 2016 +0100
+
+ pkcs11: add interface for C_GenerateKey
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 26 12:00:55 2016 +0100
+
+ better match with unknown_tls_aid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 26 11:54:05 2016 +0100
+
+ x509: moved time-specific functions to time.c
+
+Author: Sebastian Dröge <sebastian@centricular.com>
+Date: Wed Feb 24 12:42:26 2016 +0200
+
+ configure: Android is ELF too
+
+ Without this, compiling Android for x86 or x86-64 fails because the assembly
+ optimizations are not compiled in.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 25 15:45:04 2016 +0100
+
+ mentioned the public git URL for cloning [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 24 15:12:23 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 24 14:55:19 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 24 14:53:59 2016 +0100
+
+ tests: check functions which export session parameters
+
+ That is gnutls_session_get_random() and gnutls_session_get_master_secret().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 24 14:43:17 2016 +0100
+
+ Added gnutls_session_get_master_secret
+
+ This provides the ability to export all session parameters in various
+ formats.
+
+ Resolves #64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 22 15:51:11 2016 +0100
+
+ tests: gnutls_session_get_flags() is checked for extended master secret
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 22 15:49:25 2016 +0100
+
+ tests: check gnutls_session_get_flags() for EtM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 22 15:46:33 2016 +0100
+
+ tests: check gnutls_session_get_flags() for safe renegotiation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 22 15:26:46 2016 +0100
+
+ Added gnutls_session_get_flags()
+
+ This function would allow to simplify handling of future
+ flags which we may want to indicate, and would not require
+ API additions for new flags.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 22 11:57:30 2016 +0100
+
+ Revert ".gitlab-ci.yml: disable guile tests"
+
+ This reverts commit 50ce516eebaf011f041002ecbfdb61b113159282.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Sun Feb 21 18:58:35 2016 +0100
+
+ guile: Fix out-of-tree builds.
+
+ This fixes a regression introduced in 3045a96.
+
+ * guile/Makefile.am (.in.scm): Make the parent directory of $@.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 17:04:24 2016 +0100
+
+ Improved documentation in _gnutls_sort_clist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 16:43:51 2016 +0100
+
+ gnutls_x509_crt_list_import: corrected memory leak
+
+ This was triggered if GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED was specified
+ and a failure occurred.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 15:59:31 2016 +0100
+
+ _gnutls_sort_clist: fixed issues when used with func option
+
+ This function would incorrectly call func() on elements that were
+ included in the list, and would not call func() if the size of the
+ final chain was one.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 15:10:54 2016 +0100
+
+ tests: added tests for gnutls_pcert_list_import_x509_raw()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 14:29:20 2016 +0100
+
+ ext master secret: ensure we disable ext master secret if requested
+
+ That is, on rehandshakes, as on the standard handshakes it is disabled
+ by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 14:18:04 2016 +0100
+
+ tests: verify that we do not allow rehandshakes without ext master
+
+ That is, if we have an initial session which uses the extended master
+ secret do not allow subsequent rehandshakes to skip it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 11:53:20 2016 +0100
+
+ tests: sha3-test: use different dates for generation and validation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 10:55:32 2016 +0100
+
+ certtool: eliminated memory leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 10:28:33 2016 +0100
+
+ bumped the version of max algorithm num to account for new signing algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 18 09:17:17 2016 +0100
+
+ src: added systemkey-args to BUILT_SOURCES
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 17 15:19:08 2016 +0100
+
+ tests: simplified sha3-test
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 17 05:43:24 2016 +0100
+
+ cross.mk: updated for gnutls 3.4.9, nettle 3.2, gmp 6.1.0 and p11-kit 0.23.2 [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 16 16:46:54 2016 +0100
+
+ .gitlab-ci.yml: disable guile tests
+
+ This prevents the test suite from failing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 16 16:40:09 2016 +0100
+
+ doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 16:18:00 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 16:13:12 2016 +0100
+
+ tests: resume: check whether the server does not resume in ext master secret mismatch
+
+ Relates #69
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 16:10:31 2016 +0100
+
+ Ensure that session resumption does not occur when ext master secret status changes
+
+ That is we make sure the server doesn't resume when:
+ 1. Original session had extended master secret but not advertised in resumed
+ 2. Original session did not have extended master secret but is advertised in resumed
+
+ Relates #69
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 14:45:40 2016 +0100
+
+ tests: resume: simplified structure assignment using C99 syntax
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 15 10:52:55 2016 +0100
+
+ tests: added certification generation tests with SHA-3 tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 15 10:37:57 2016 +0100
+
+ Added NIST's OIDs for SHA3 signature algorithms
+
+ This allows to generate certificates signed with SHA3.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:38 2016 +0100
+
+ guile: Work around lack of 'eval-when' on 1.8.
+
+ * guile/modules/gnutls.in (eval-when) [!guile-2]: New macro.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:37 2016 +0100
+
+ guile: Install modules in versioned directory by default.
+
+ * configure.ac: Change default 'GUILE_SITE' value to include
+ $guile_effective_version.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:36 2016 +0100
+
+ guile: build: Make silent rules actually quiet.
+
+ * guile/Makefile.am (.in.scm): Use $(AM_V_GEN) and $(AM_V_at).
+ * guile/src/Makefile.am (enums.h, enum-map.i.c)
+ (smobs.h, smob-types.i.c, %.x): Likewise.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:35 2016 +0100
+
+ guile: Build and install .go files on Guile 2.x.
+
+ * configure.ac: Check for 'guild' and substitute 'GUILD'. Define
+ 'HAVE_GUILD'. Substitute 'guileobjectdir'. Don't output
+ guile/modules/Makefile and guile/tests/Makefile.
+ * guile/modules/Makefile.am, guile/tests/Makefile.am: Remove. Move
+ contents to...
+ * guile/Makefile.am: ... here.
+ (SUBDIRS): Remove 'modules' and 'tests'.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:34 2016 +0100
+
+ guile: doc: Change prompt in examples.
+
+ * doc/gnutls-guile.texi (Guile Preparations): Use the prompt found in
+ 2.0. Change "libguile-gnutls-v-0" to "guile-gnutls-v-2".
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:33 2016 +0100
+
+ guile: tests: Add Guile 2.2 compatibility layer.
+
+ This allows tests to run with Guile 2.1/2.2.
+
+ * guile/modules/gnutls/build/tests.scm (define-replacement) [guile-2]:
+ New macro.
+ (uniform-vector-read!, uniform-vector-write) [guile-2]: New procedures.
+ * doc/gnutls-guile.texi (Guile Preparations): Mention 2.2.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:32 2016 +0100
+
+ guile: tests: Make sure no processes are left behind.
+
+ Before that, child processes would be left behind and become zombies.
+
+ * guile/tests/anonymous-auth.scm, guile/tests/openpgp-auth.scm,
+ guile/tests/session-record-port.scm, guile/tests/x509-auth.scm:
+ Add (waitpid pid) call on the server side.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Feb 11 23:04:31 2016 +0100
+
+ guile: tests: Add 'with-child-process'.
+
+ This makes sure that child processes always exit no matter what.
+
+ * guile/modules/gnutls/build/tests.scm (define-syntax-rule) [!guile-2]:
+ New macro.
+ (call-with-child-process): New procedure.
+ (with-child-process): New macro.
+ * guile/tests/anonymous-auth.scm, guile/tests/openpgp-auth.scm,
+ guile/tests/session-record-port.scm, guile/tests/x509-auth.scm: Use it
+ instead of an explicit 'primitive-fork' call.
+ * guile/.dir-locals.el: New file.
+ * guile/Makefile.am (EXTRA_DIST): New variable.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 15 09:52:10 2016 +0100
+
+ tests: mini-loss-time: ensure client timeouts after the server is
+
+ This addresses issue with the server detecting the client disconnection
+ prior to its timeout. Reported by Steven Chamberlain, Andreas Metzler.
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Fri Feb 12 16:59:31 2016 +0200
+
+ Removed the invariant htype parameter of _gnutls_recv_int()
+
+ All uses of _gnutls_recv_int() passed -1 as the htype argument of type
+ gnutls_handshake_description_t, which had been used for SSLv2 client
+ hellos. Introduced in 2001 with dc1122e7b6.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 14 18:41:01 2016 +0100
+
+ provable RSA key generation: adjust the seed size based on N size
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 14 18:18:38 2016 +0100
+
+ provable RSA key generation: allow non-2048 and non-3072 keys
+
+ That is enforce the 2048 and 3072-bit limit to FIPS when in FIPS140-2
+ mode.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 13 18:21:08 2016 +0100
+
+ DH/DSA: allow the generation of larger than 15360 bit parameters
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 13 14:50:19 2016 +0100
+
+ tests: eliminated mem leak in hash-large
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 12 15:16:55 2016 +0100
+
+ tests: check whether large buffer hashes and MAC work as expected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 12 10:48:12 2016 +0100
+
+ nettle: use the correct type for hash and MAC functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 6 22:44:37 2016 +0100
+
+ provable prime generation: arbitrary seed lengths are accepted in non-FIPS mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 12:10:57 2016 +0100
+
+ gnutls-cli: improved indentation in benchmark output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 11:43:27 2016 +0100
+
+ certtool: removed unused variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 11:00:15 2016 +0100
+
+ certtool: the --generate-dh-params option can be combined with --provable
+
+ This however, will generate provable DSA parameters and import them
+ as DH parameters.
+
+ Resolves #72
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 10:42:34 2016 +0100
+
+ certtool: the --dh-info option will retrieve DH parameters from DSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 10:34:52 2016 +0100
+
+ tests: added check for gnutls_dh_params_import_dsa
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 10:05:58 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 11 10:05:13 2016 +0100
+
+ Added gnutls_dh_params_import_dsa() which allows to import DSA parameters into DH ones
+
+ This simplifies importing DSA private keys into DH parameters.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 10 14:29:47 2016 +0100
+
+ tests: set_pkcs12_cred: existing tests are disabled when in FIPS140-2 mode
+
+ The tests require access to the RC4 cipher which is not available.
+
+Author: Attila Molnar <attilamolnar@hush.com>
+Date: Wed Feb 10 10:55:15 2016 +0100
+
+ Fix memory leak in gnutls_certificate_set_ocsp_status_request_file()
+
+ Signed-off-by: Attila Molnar <attilamolnar@hush.com>
+
+Author: Attila Molnar <attilamolnar@hush.com>
+Date: Sat Feb 6 18:16:59 2016 +0100
+
+ doc: Update description of credential alloc/dealloc functions
+
+ Get rid of "This structure is complex enough to manipulate directly..."
+ text which suggests that these functions are optional, "helper" functions
+ when in fact their usage is required for encapsulation reasons.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 10 10:11:00 2016 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 8 11:23:33 2016 +0100
+
+ ALPN: added the GNUTLS_ALPN_SERVER_PRECEDENCE flag
+
+ This allows the server to set precedence on the protocols
+ it supports, rather than following the client's order.
+
+ Resolves #71
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Tue Feb 9 13:37:49 2016 +0100
+
+ improve doc on special keywords in priority string
+
+ Special keywords in priority strings like %COMPAT may not be prefixed
+ with +, - or !, "NORMAL:+%COMPAT is invalid.
+
+Author: Attila Molnar <attilamolnar@hush.com>
+Date: Sat Feb 6 18:01:33 2016 +0100
+
+ doc: Fix some typos
+
+Author: Attila Molnar <attilamolnar@hush.com>
+Date: Sat Feb 6 17:50:05 2016 +0100
+
+ Remove remaining RSA-EXPORT support leftovers from doc and messages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 3 09:20:05 2016 +0100
+
+ tests: pkcs11-pubkey-import-ecdsa will only work under softhsmv2
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sun Jan 31 17:59:37 2016 +0100
+
+ Fix some more typos.
+
+ certifcate, funtion, withing, missmatch
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 30 12:18:55 2016 +0100
+
+ tests: updated check to account for revert in 7d3caedb8df9d04eee9513cb5b3b417ae29927f5
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 30 12:15:07 2016 +0100
+
+ Revert "tests: updated to account for cert generation after 2adb9b2bfb31afebbdd9f990e2b74c9a3d4e5c57 fix"
+
+ This reverts commit 735dbde324be6c8785a3dea5f09c82b6a8ad298b.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 30 11:15:13 2016 +0100
+
+ Revert "Fix out-of-bounds read in gnutls_x509_ext_export_key_usage"
+
+ This was not really an out-of-bounds check. Added documentation
+ to make that clear.
+
+ This reverts commit ffbc9aaea7dcf29c03784d128b83f0682357858d.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 28 13:14:14 2016 +0100
+
+ certtool: corrected email escaping in texinfo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 28 10:45:17 2016 +0100
+
+ Replaced select() system call with poll() on POSIX systems
+
+ This allows to use the default gnutls functions with file descriptors
+ over the maximum supported by select.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 25 11:08:21 2016 +0100
+
+ tests: windows: fixed check-output call
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 22 16:34:29 2016 +0100
+
+ tests: added dummy functions used by CAPI32 implementation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 22 16:33:48 2016 +0100
+
+ tests: better checking for failure in windows cng check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 22 12:59:47 2016 +0100
+
+ system-key-win: call CertFreeCertificateContext()
+
+Author: Bjørn Christensen <bhc@insight.dk>
+Date: Fri Jan 22 11:52:21 2016 +0100
+
+ system-key-win: added interface to CAPI, old style crypto api on windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 21 14:45:56 2016 +0100
+
+ certtool: corrected texinfo output for krb5_principal
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 21 12:58:56 2016 +0100
+
+ tests: priorities: account for the addition of CHACHA20-POLY1305
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 21 12:00:33 2016 +0100
+
+ CHACHA20_POLY1305 was added to the default priority strings
+
+ That is the NORMAL and PERFORMANCE priority strings now will
+ enable CHACHA20-POLY1305 by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 18 18:38:36 2016 +0100
+
+ gnutls_global_init: log gnutls' version on initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 18 15:56:02 2016 +0100
+
+ doc: corrected typo [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 16 20:54:20 2016 +0100
+
+ README: added trousers to list of dependencies [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 16 20:43:42 2016 +0100
+
+ tests: added check for KRB5Principal output
+
+ Resolves #67
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 14 17:16:00 2016 +0100
+
+ README.md -> README-alpha.md
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 14 17:09:23 2016 +0100
+
+ updated copyright info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 14 17:04:54 2016 +0100
+
+ README: auto-generated from README-install.md
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 14 14:50:34 2016 +0100
+
+ gnutls_int.h: increased MAX_SERVER_NAME_SIZE to 256 bytes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 13 13:14:55 2016 +0100
+
+ gnutls_pubkey_import_x509_raw: fixed memory leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 16:26:21 2016 +0100
+
+ tests: added check for the krb5_principal template option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 11 15:11:41 2016 +0100
+
+ certtool: introduced the krb5_principal template option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 11 15:09:23 2016 +0100
+
+ x509: introduced GNUTLS_SAN_OTHERNAME_KRB5PRINCIPAL
+
+ That allows to print and write KRB5PrincipalName othernames
+ in subject alternative name.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 11 15:19:24 2016 +0100
+
+ x509: place newline when printing unsupported othernames
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 16:05:41 2016 +0100
+
+ x509: moved virtual subject alternative name othername support to virt-san.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 14:46:16 2016 +0100
+
+ gnutls_x509_crt_set_subject_alt_name: documented the version after which GNUTLS_SAN_OTHERNAME_XMPP is available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 14:45:03 2016 +0100
+
+ tests: added check for XMPP othername generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 14:39:14 2016 +0100
+
+ certtool: allow writing xmpp_name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 14:30:56 2016 +0100
+
+ Allow assigning 'virtual' SAN types via *_set_subject_alt_name()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 13:47:38 2016 +0100
+
+ NEWS: document newly added functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 08:17:51 2016 +0100
+
+ alpn: when parsing the list of protocols return at the first mutually common
+
+ That resolves an issue where the server wouldn't select the first mutually supported.
+
+ Resolves #63
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 08:17:07 2016 +0100
+
+ tests: mini-alpn: corrected protocol selection order
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 10 08:04:29 2016 +0100
+
+ tests: alpn: enhance the testing of ALPN negotiation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 9 21:42:11 2016 +0100
+
+ alpn: document how the selected protocol is selected [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 9 21:20:00 2016 +0100
+
+ tests: verify that the selected ALPN protocol is the first advertised
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 16:52:44 2016 +0100
+
+ gnutls_aead_cipher_decrypt: removed misleading text
+
+ Reported by Fridolin Pokorny.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 12:16:29 2016 +0100
+
+ tests: added check for certtool's othername writing functionality
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 11:16:58 2016 +0100
+
+ certtool: added ability to generate othernames via template files
+
+ Relates #62
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 12:05:18 2016 +0100
+
+ x509: added flags to enable the encoding of othername data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 8 11:05:36 2016 +0100
+
+ x509: introduced functions to set an othername alternative name
+
+ That is, added, gnutls_x509_crt_set_subject_alt_othername,
+ gnutls_x509_crt_set_issuer_alt_othername, gnutls_x509_crq_set_subject_alt_othername
+
+ Relates #62
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 7 14:35:59 2016 +0100
+
+ trust_list_get_issuer_by_dn: fixed check for DN or SPKI
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 7 14:02:24 2016 +0100
+
+ configure: no longer distribute lzip tarballs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 7 14:14:21 2016 +0100
+
+ symbols.last: don't include internal symbols into exported list
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 5 11:21:43 2016 +0100
+
+ tests: updated to account for cert generation after 2adb9b2bfb31afebbdd9f990e2b74c9a3d4e5c57 fix
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Mon Jan 4 16:40:26 2016 +0100
+
+ Fix out-of-bounds read in gnutls_x509_ext_export_key_usage
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 20:16:37 2015 +0200
+
+ .gitlab-ci.yml: optimized build process
+
+ That is, in slow asan and valgrind builds don't check the full test suite.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 14:35:45 2015 +0200
+
+ gnutls_pkcs11_copy_x509_privkey2: corrected the writing of ECC private key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 13:38:34 2015 +0200
+
+ tests: pkcs11-pubkey-import will check both RSA and ECDSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 13:35:30 2015 +0200
+
+ gnutls_pkcs11_copy_x509_privkey2: corrected the type of the written object
+
+ Previously only RSA objects were correctly written.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 13:10:37 2015 +0200
+
+ tests: added ECDSA key in cert-common.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 12:20:41 2015 +0200
+
+ pkcs11: moved default RSA public exponent out of stack
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 12:17:21 2015 +0200
+
+ pkcs11: import public keys from any available object
+
+ That is, load public keys from the public key object, or
+ the certificate object if they are present. That affects
+ non-RSA public keys which do not contain all required fields
+ on the private key object.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 01:02:30 2015 +0200
+
+ session DB: made the magic number depending on gnutls' version
+
+ That will make sure that sessions not stored by this version of
+ gnutls will not be resumed by another (which may be incompatible).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:46:12 2015 +0200
+
+ ui.c -> fingerprint.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:45:43 2015 +0200
+
+ split OCSP functionality from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:39:19 2015 +0200
+
+ split anon credentials functionality from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:38:31 2015 +0200
+
+ split psk functionality from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:37:22 2015 +0200
+
+ split session info functions from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:34:25 2015 +0200
+
+ split certificate credentials functions from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:32:20 2015 +0200
+
+ split dh API functions from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 31 00:28:46 2015 +0200
+
+ split randomart functionality from ui.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 30 23:18:32 2015 +0200
+
+ helper.c -> file.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 30 11:26:30 2015 +0200
+
+ certtool: doc update [skip ci]
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Sat Dec 26 18:24:56 2015 +0100
+
+ Fix some typos [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 24 11:54:21 2015 +0200
+
+ NEWS: doc update [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 24 11:44:00 2015 +0200
+
+ respect the max-record extension under DTLS
+
+ This resolves issue with max-record being negotiated but
+ ignored. Resolves #61
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 24 11:42:58 2015 +0200
+
+ tests: added check for max-record extension in TLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 24 11:18:57 2015 +0200
+
+ tests: check whether the max-record extension is usable with DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 24 11:13:28 2015 +0200
+
+ dtls: print the MTU in debugging messages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 22 17:14:02 2015 +0200
+
+ updated documentation on supported algorithms [ci skip]
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 22 11:30:52 2015 +0200
+
+ Added SHA384 to the list of TLS support MAC algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 21 12:46:09 2015 +0200
+
+ documented the gitlab ci runner tags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 20 11:11:38 2015 +0200
+
+ tests: added timeout in long-running checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 20 11:01:48 2015 +0200
+
+ certtool: eliminated various memory leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 20 10:48:27 2015 +0200
+
+ certtool: prevented memory leak in pkcs8-info cmd
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 19 16:58:03 2015 +0200
+
+ certtool: do not use signal() under win32
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Dec 18 17:34:01 2015 +0200
+
+ build: configure.ac: manpages cleanups
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Fri Dec 18 12:14:08 2015 +0200
+
+ build: allow installing man(1) even with --disable-doc
+
+ Currently these man pages are installed only if --enable-doc
+ is provided, while these are not actually docs, do not require any
+ special dependency, nor consume large space.
+
+ This adds --enable-manpages to enable/disable manpages installation, and
+ install the man(1) regardless of --disable-doc.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 14:32:25 2015 +0100
+
+ certtool: ignore sigpipe
+
+ This signal was observed under certain cirquimstances
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 14:29:05 2015 +0100
+
+ certtool: don't close stdout on exit
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 14:24:23 2015 +0100
+
+ pkcs7: eliminated leak in gnutls_pkcs7_print
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 13:56:31 2015 +0100
+
+ gnutls_pubkey_import_privkey: document that this operation is not possible in certain keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 11:40:59 2015 +0100
+
+ doc: replace writev with sendmsg in the list of system calls
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 10:23:22 2015 +0100
+
+ tests: don't run the no-signal test in systems which MSG_NOSIGNAL is not available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 18 10:15:10 2015 +0100
+
+ Reduce the number of used syscalls by using sendmsg() instead of writev()
+
+ We relied on sendmsg() anyway for the MSG_NO_SIGNAL version of the calls,
+ thus it is a good idea to avoid calling writev() and use sendmsg(). That
+ way we reduce the number of calls required for seccomp.
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Dec 17 19:57:53 2015 +0200
+
+ doc: manpages: remove generated tpmtool.1 page
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Dec 17 19:57:52 2015 +0200
+
+ .gitignore: add m4/extern-inline.m4
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 17 14:19:04 2015 +0100
+
+ tests: added check to verify that the PKCS#7 embedded data are recovered as expected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 17 14:18:17 2015 +0100
+
+ certtool: introduced the --p7-show-data option
+
+ This option allows printing the embedded data in a PKCS#7 signed
+ structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 17 14:17:23 2015 +0100
+
+ gnutls_pkcs7_get_embedded_data: added function
+
+ This function allows extracting the embedded data from a PKCS#7 signed
+ structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 16 16:13:41 2015 +0100
+
+ tests: updated pkcs7-gen to account for content-type attribute
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 16 14:52:39 2015 +0100
+
+ tests: check whether the content-type attribute is set if we sign using time
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 16 14:28:23 2015 +0100
+
+ pkcs7: set by default the content type attribute
+
+ That is a requirement of rfc5652. Relates #59
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 16 14:02:56 2015 +0100
+
+ pkcs7: use the PK_PKIX1_RSA_OID when writing RSA signature OIDs for PKCS#7 structures
+
+ That is because there are implementations which cannot cope with the
+ normal RSA signature OIDs. Relates #59
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 16 10:10:20 2015 +0100
+
+ pkcs7: Disable the optional fields prior to generating the PKCS#7 structure
+
+ This resolves issue with our PKCS#7 structures not being parsed by
+ MacOSX' tools. Relates #59
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 15 22:28:55 2015 +0100
+
+ certtool: corrected invalid free
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 15 22:27:50 2015 +0100
+
+ certtool: warn if an ECDSA key is marked for encryption
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 15 20:36:29 2015 +0100
+
+ build: fix make distclean by including src/gl only once
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 15 13:52:20 2015 +0100
+
+ make sure gnutls_assert is present at the cases where GNUTLS_E_INTERNAL_ERROR is returned
+
+Author: Gustavo Zacarias <gustavo@zacarias.com.ar>
+Date: Mon Dec 14 15:20:25 2015 -0300
+
+ configure: really make --disable-crywrap work
+
+ The crywrap variable is set regardless of the state of enable_crywrap,
+ hence --disable-crywrap never works.
+ Just put the tests for crywrap deps inside the enable_crywrap
+ conditional.
+
+ Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 15 11:29:09 2015 +0100
+
+ certtool: the --p7-time option was made an enable/disable option
+
+ It remains disabled by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 14 15:19:59 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 14 15:03:23 2015 +0100
+
+ tests: check whether server returns the correct error code if presented with invalid versions
+
+ That is gnutls_handshake() will return GNUTLS_E_UNSUPPORTED_VERSION_PACKET in
+ server side, if the client presents a very old TLS version which is not supported.
+
+ Relates #42
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 14 14:34:04 2015 +0100
+
+ handshake: when receiving a TLS version which is too low fail
+
+ That is, don't treat all unsupported version as being to high. Treat
+ versions which are not known and lower than the highest as a protocol
+ error.
+
+ Resolves #42
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 13 12:34:47 2015 +0100
+
+ .gitlab-ci.yml: valgrind build was moved at the end as it is the slowest build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 13 12:24:44 2015 +0100
+
+ certtool: the --p7-include-cert option is enabled by default
+
+ This allows to generate PKCS#7 structures by default that can be
+ read by iOS.
+
+Author: sskaje <sskaje@gmail.com>
+Date: Sun Dec 13 16:31:19 2015 +0800
+
+ #56 Feature: certtool --p7-sign support GNUTLS_PKCS7_INCLUDE_CERT
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 10 09:35:59 2015 +0100
+
+ gnutls-cli-debug: rephrased inappropriate fallback test description to match the rest
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:59:02 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:52:43 2015 +0100
+
+ Do not allow importing public keys from PKCS #11 private keys for DSA and ECDSA
+
+ This prevents the reading of the public key when non-RSA keys are available. This
+ is a much cleaner approach than 5a4e692511dc3a829eda0d7c5a87e56cbc2055f0.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:48:13 2015 +0100
+
+ Revert "Do not allow importing public keys from PKCS #11 private keys for DSA and ECDSA"
+
+ This reverts commit 5a4e692511dc3a829eda0d7c5a87e56cbc2055f0.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:44:30 2015 +0100
+
+ tests: check whether a peer changing certificate is detected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:20:34 2015 +0100
+
+ tests: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 8 10:17:49 2015 +0100
+
+ Do not allow certificate change during a rehandshake
+
+ That is require that the certificate of the peer remains the same
+ and return GNUTLS_E_SESSION_CERTIFICATE_CHANGED otherwise. To revert
+ to the previous behavior the GNUTLS_ALLOW_CERT_CHANGE flag was introduced.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 6 12:00:46 2015 +0100
+
+ tests: check whether gnutls_pubkey_import_privkey() operates well for PKCS#11 RSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 6 11:35:57 2015 +0100
+
+ Do not allow importing public keys from PKCS #11 private keys for DSA and ECDSA
+
+ That is, because they do not contain all the required parameters for a direct
+ import. Reported by Jan Vcelak.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 6 10:58:45 2015 +0100
+
+ pkcs11: avoid setting a variable which isn't used
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 6 10:57:48 2015 +0100
+
+ MAX_PK_PARAM_SIZE was moved to gnutls_int.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 6 10:54:37 2015 +0100
+
+ pkcs11: deinitialize gnutls_pkcs11_obj_t's pubkey on deinit
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Sun Dec 6 00:46:39 2015 +0100
+
+ pkcs11: fix passing of incorrect variable in privkey_get_pubkey
+
+ The code worked for RSA because the content of the variables matched.
+ But it doesn't match for ECC.
+
+ CKM_RSA_PKCS_KEY_PAIR_GEN (0x0) == CKK_RSA (0x0)
+ CKM_ECDSA_KEY_PAIR_GEN (0x1040) != CKK_ECDSA (0x3)
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 2 18:40:28 2015 +0100
+
+ gnutls-cli: don't use RSA ciphersuites to test chacha20 as they are not defined
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 2 16:15:03 2015 +0100
+
+ documented bug in gnutls_x509_crt_get_*_unique_id()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 1 10:40:23 2015 +0100
+
+ tools: don't compile tpmtool if PKCS11 is disabled
+
+ That is because GnuTLS' TPM code makes use of the PKCS11 PIN callbacks.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 30 10:34:03 2015 +0100
+
+ Amend "When decoding extensions do not ignore decoding errors"
+
+ Do not treat an error the fact that no extensions field is present.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 30 09:49:08 2015 +0100
+
+ allow specifying NULL buffer in gnutls_x509_crt_get_*_unique_id()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 26 12:46:02 2015 +0100
+
+ NEWS: removed functions that were part of 3.4.x releases
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 29 10:37:53 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 29 10:30:01 2015 +0100
+
+ tests: added check for TLS extension decoding error propagation
+
+ Relates #40
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 29 09:24:12 2015 +0100
+
+ When decoding extensions do not ignore decoding errors
+
+ That is, move from a parsing error tolerance to a more strict
+ decoding approach.
+ Relates #40
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 28 10:43:31 2015 +0100
+
+ .gitignore: more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 28 10:11:52 2015 +0100
+
+ ocsp_output: when next update is not present don't print error message
+
+ That is because this field is optional.
+ Resolves #53
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 26 11:23:15 2015 +0100
+
+ tests: override-ciphers will not run mac tests on windows
+
+ There is some issue with symbols for self tests not being exported.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 26 09:37:02 2015 +0100
+
+ .gitlab-ci.yml: removed separate builddir build from x86-64 targets to reduce builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 26 09:32:25 2015 +0100
+
+ tests: updates for certtool test to run under windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 26 09:25:48 2015 +0100
+
+ .gitlab-ci.yml: minimal library no longer requires x86-64 for compilation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 19:24:15 2015 +0100
+
+ .gitlab-ci.yml: in windows build skip the gnulib tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 11:57:31 2015 +0100
+
+ .gitlab-ci.yml: added windows build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 11:56:49 2015 +0100
+
+ tests: changes for running tests under windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 11:56:06 2015 +0100
+
+ tests: cipher-test will forward the prog exit code as the script exit code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 11:25:07 2015 +0100
+
+ README: added information for windows build
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 10:53:51 2015 +0100
+
+ libopts: use the O_BINARY flag in windows for files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 10:49:30 2015 +0100
+
+ libopts: updated to 5.18.6
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 10:25:08 2015 +0100
+
+ use consistent terms in system.c and system-keys-win.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 10:21:46 2015 +0100
+
+ tests: added basic functionality testing for system-keys in windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 09:49:03 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 25 09:46:26 2015 +0100
+
+ Added gnutls_encode_ber_digest_info and gnutls_decode_ber_digest_info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 24 13:27:13 2015 +0100
+
+ cross.mk: allow building with mingw64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 24 13:09:40 2015 +0100
+
+ tests: use gnulib where needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 24 13:04:28 2015 +0100
+
+ cross.mk: updated windows cross compile makefile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 24 13:03:15 2015 +0100
+
+ tests: disable global-init-override test in windows
+
+ Gcc does not support weak symbols on this platform.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 24 12:54:32 2015 +0100
+
+ tools: don't call endservent in windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 22 13:27:14 2015 +0100
+
+ added cast to silence gcc warning
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 13:33:42 2015 +0100
+
+ tests: added check for multiple extension registering
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 13:25:20 2015 +0100
+
+ statically initialize extensions instead of using the lib constructor
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 13:09:19 2015 +0100
+
+ marked all extensions structures as constant
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 11:33:45 2015 +0100
+
+ system-keys-win: allow reinitialization of the library after a deinitialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 01:05:37 2015 +0100
+
+ getfuncs.pl: don't consider functions with _gnutls prefix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 21 00:52:51 2015 +0100
+
+ gnutls_global_init_skip: prefixed with an underscore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 20 13:57:09 2015 +0100
+
+ .gitlab-ci.yml: added clang compilation target
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 20 10:11:29 2015 +0100
+
+ certtool: check fread_file() for errors in all situations
+
+ This caused certtool to crash on invalid input on stdin.
+ Reported by Christoph Biedl.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 19 11:46:39 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 21:44:54 2015 +0100
+
+ gnutls_certificate_set_flags: Added since
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 20:16:38 2015 +0100
+
+ tests: check gnutls_certificate_flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 20:13:07 2015 +0100
+
+ Added gnutls_certificate_flags() and GNUTLS_CERTIFICATE_SKIP_KEY_CERT_MATCH
+
+ That allows a user of the credentials to disable the certificate matching
+ action. That is, to disable the calls to sign and verify on initialization.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 16:39:36 2015 +0100
+
+ link with libdl when trousers is enabled; reported by Andreas Schneider
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 16:30:24 2015 +0100
+
+ enhanced cipher selftests with variable key sizes on arcfour
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 15:55:19 2015 +0100
+
+ Do not enforce a maximum key size on ARCFOUR
+
+ That makes the library consistent with the behavior of previous versions (3.3.x)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 10:22:31 2015 +0100
+
+ gnutls-cli-debug: make TLS 1.6 fallback check more reliable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 18 09:24:18 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 17 07:09:05 2015 +0100
+
+ README: added non-interactive versions of commands
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 18:52:48 2015 +0100
+
+ .gitlab-ci.yml: disable non-suiteb curves in all systems as we have multiple which are fedoras
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 17:28:49 2015 +0100
+
+ tests: corrected copyright info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 16:32:04 2015 +0100
+
+ documented GNUTLS_SKIP_GLOBAL_INIT macro
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 16:30:37 2015 +0100
+
+ tests: added check for overriding global initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 16:25:31 2015 +0100
+
+ Added GNUTLS_SKIP_GLOBAL_INIT macro to allow programs skip implicit global initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 15:02:48 2015 +0100
+
+ tests: utils.c: simplify windows check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 16 12:40:14 2015 +0100
+
+ .gitlab-ci.yml: added build and check in FIPS140-2 mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 15 20:35:18 2015 +0100
+
+ tests: made seccomp tests more reliable by waiting for each side to terminate
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 15 17:06:18 2015 +0100
+
+ doc: document how to use gnutls with seccomp
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 15 16:32:47 2015 +0100
+
+ .gitlab-ci.yml: reorganized and added a simple build and check on x86-64 rule
+
+ The latter also enables the seccomp checks.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 15 15:51:14 2015 +0100
+
+ tests: check operation of TLS and DTLS under seccomp when configured with --enable-seccomp-tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 13 16:39:24 2015 +0100
+
+ gnutls_x509_crt_set_subject/issuer_unique_id: added Since in doc
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 13 14:40:20 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 13 11:00:10 2015 +0100
+
+ Added documentation on PKCS #7 signing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 16:38:02 2015 +0100
+
+ updated chacha20 ciphers to conform to latest draft
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 15:03:10 2015 +0100
+
+ tests: suite: more shell scripts were given the .sh suffix and simplified makefile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 12:04:04 2015 +0100
+
+ tests: verify that unique IDs are generated as expected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 12:03:14 2015 +0100
+
+ certtool: Allow writing unique IDs in generated certificates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 11:43:52 2015 +0100
+
+ Added gnutls_x509_crt_set_issuer_unique_id() and gnutls_x509_crt_set_subject_unique_id()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 11:10:08 2015 +0100
+
+ properly indent unique IDs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 09:48:27 2015 +0100
+
+ tests: added check with the various X.509 key exchanges
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 12 09:29:43 2015 +0100
+
+ tests: check rehandshake from anon to DHE
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 11 11:37:30 2015 +0100
+
+ documented the GNUTLS_NO_EXPLICIT_INIT environment variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 11 11:29:21 2015 +0100
+
+ crypto-api: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 11 11:15:51 2015 +0100
+
+ Allow switching a ciphersuite to DHE and ECDHE on a rehandshake
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 11 10:49:31 2015 +0100
+
+ tests: added check for ciphersuite switch from anonymous to certificate
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 10 13:31:16 2015 +0100
+
+ .gitlab-ci.yml: disable guile in asan builds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 10 10:34:56 2015 +0100
+
+ tests: suite: don't run shell scripts with valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 10 10:24:44 2015 +0100
+
+ tests: testsrn: output errors on stderr
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 10 10:13:35 2015 +0100
+
+ deinitialize all handshake keys when handshake is over
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 23:53:25 2015 +0100
+
+ testdane: improved error detection in sites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 23:34:03 2015 +0100
+
+ tests: suite: eliminate many leaks in the tests and run them under valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 23:27:47 2015 +0100
+
+ certtool: eliminate leaks in _verify_x509_mem()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 23:04:48 2015 +0100
+
+ tests: openpgp-certs: use valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 23:04:03 2015 +0100
+
+ openpgp: eliminate leaks in gnutls_openpgp_keyring_import()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 22:48:47 2015 +0100
+
+ tests: eliminate leaks in mini-eagain2.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 22:48:25 2015 +0100
+
+ certtool: eliminate memory leaks in certificate generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 22:45:44 2015 +0100
+
+ tests: key-tests: use valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 22:45:13 2015 +0100
+
+ gnutls_x509_crt_set_pubkey: clarify usage
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 21:54:54 2015 +0100
+
+ pkcs12: correctly set salt size in gnutls_pkcs12_mac_info
+
+ Also eliminate leaks in PKCS #12 parsing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 21:54:09 2015 +0100
+
+ tests: run the PKCS #12 tests under valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 18:43:03 2015 +0100
+
+ certtool: make sure that pkcs12 structures are deinitialized
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 16:01:55 2015 +0100
+
+ tests: provable-privkey: fixed DSA test on FIPS140 enabled systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 15:51:17 2015 +0100
+
+ nettle: be more specific in seed size mismatches
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 15:43:20 2015 +0100
+
+ crypto-backend: ensure there are no leaks on deinitialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 9 14:29:48 2015 +0100
+
+ Require TLS 1.2 for all the ciphersuites which are defined for it only
+
+ This solves an interoperability issue with openssl. Reported by Viktor Dukhovni.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 8 09:30:39 2015 +0100
+
+ p11tool: introduced --only-urls option
+
+ This option allows printing a compact listing containing only of URLs.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 7 21:51:56 2015 +0100
+
+ Modified the CHACHA20 cipher to conform to draft-ietf-tls-chacha20-poly1305-02
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 6 15:02:51 2015 +0100
+
+ .gitlab-ci.yml: use static libasan
+
+ This prevents issues with tests which use LD_PRELOAD.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 6 10:40:39 2015 +0100
+
+ .gitlab-ci.yml: disable non-suiteb curves on build on Fedora system
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 5 11:11:29 2015 +0100
+
+ tools: better ftp auth tls negotiation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 4 09:49:47 2015 +0100
+
+ tests: added check for gnutls_priority_set_default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 3 10:46:17 2015 +0100
+
+ tools: only check for status code in FTP starttls negotiation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 3 10:45:44 2015 +0100
+
+ tools: print more info in starttls negotiation when --verbose is given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 3 09:40:39 2015 +0100
+
+ gnutls.pc: don't use the libtool version of the link options
+
+ Reported by Dan Kegel.
+ Resolves #49
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 1 01:53:43 2015 +0100
+
+ tests: simplified mini-dtls-hello-verify-48
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 30 13:38:36 2015 +0100
+
+ tests: added check for blocking on invalid DTLS cookie
+
+ Relates to #48
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 29 09:28:59 2015 +0100
+
+ removed inacurate text
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 23 15:46:33 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 23 15:44:27 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 23 14:17:23 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 22 13:04:32 2015 +0200
+
+ doc: document the sign function requirements in gnutls_privkey_import_ext
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 21 19:57:39 2015 +0200
+
+ Mention key protection through isolation in crypto backend section
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 21 19:48:22 2015 +0200
+
+ doc: updated supplemental data documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 21 09:13:56 2015 +0200
+
+ tests: testdane will not check hosts which are unreachable
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Tue Oct 20 19:02:25 2015 +0200
+
+ Documentation update
+
+ The new simple verification functions were backported to 3.4.6, correct
+ "Since:" to reflect this.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 20 09:40:56 2015 +0200
+
+ doc: documented future level
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 20 09:24:36 2015 +0200
+
+ pkcs11.h: relocated gnutls_pkcs11_copy_pubkey to allow discovery by buggy doc scripts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 20 09:16:20 2015 +0200
+
+ bumped version to distinguish from 3.4 branch
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 20 09:03:25 2015 +0200
+
+ ext master secret: extension is marked as mandatory
+
+ This forces the extension to be sent even where resuming sessions.
+ Resolves #45
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 20 08:44:04 2015 +0200
+
+ tests: Check whether a resumed session contains the ext master secret extension
+
+ Relates #45
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 17 09:22:28 2015 +0200
+
+ alpn: avoid warning on signed/unsigned
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 17 09:20:52 2015 +0200
+
+ README: updated CI link
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 17 09:12:09 2015 +0200
+
+ doc: set a path which includes new binaries when running autogen
+
+ That makes sure that autogen will discover the binaries to obtain the
+ --help output.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Oct 17 08:57:02 2015 +0200
+
+ gnutls-cli-debug: updated doc
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 22:58:54 2015 +0200
+
+ tools: when the starttls-proto is specified automatically detect the port if not given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 15:05:09 2015 +0200
+
+ tests: verify that public keys are properly written
+
+ Also disable parts of the suite that softhsm2 cannot properly work with,
+ to allow running parts of the suite even with broken softhsm.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 15:39:05 2015 +0200
+
+ cleanup in gnutls_pubkey_import_rsa_raw
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 15:33:21 2015 +0200
+
+ pkcs11_read_pubkey: make input type more clear
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 14:13:47 2015 +0200
+
+ p11tool: Allow writing a PKCS #11 pubkey object
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 13:16:36 2015 +0200
+
+ tools: allow importing a pubkey from a certificate
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 16 13:03:57 2015 +0200
+
+ pkcs11: introduced gnutls_pkcs11_copy_pubkey
+
+ That allows copying a public key to a PKCS #11 module.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 21:23:44 2015 +0200
+
+ .gitlab-ci.yml: combined the slow build with the separate build dir
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 21:16:52 2015 +0200
+
+ Disable the NULL cipher on runtime when FIPS140 mode is enabled instead of statically
+
+ That way the NULL cipher can be used when not in FIPS140 mode.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 21:09:06 2015 +0200
+
+ re-enable NULL ciphersuites
+
+ They were accidentally disabled by b237b37d4d17ee4f98629aae9d72aec87f434cb8
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 18:35:44 2015 +0200
+
+ tests: check whether the RSA-EXPORT and ARCFOUR-40 legacy strings are accepted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 18:20:38 2015 +0200
+
+ Tolerate priority strings with names of legacy ciphers and key exchanges
+
+ That enables better backwards compatibility with old applications
+ which disable or enable algorithms which no longer are supported.
+ Relates #44
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Oct 15 16:21:43 2015 +0200
+
+ pkcs11: write CKA_ISSUER and CKA_SERIAL_NUMBER when writing on a certificate
+
+ That allows NSS to read and use the written certificate.
+ Relates #43
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Oct 13 04:01:04 2015 +0200
+
+ tests: enhanced sec-params check to account for future sec-param
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 22:11:16 2015 +0200
+
+ certtool: recognize the future sec-param
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 22:10:25 2015 +0200
+
+ Introduced the security parameter future (256) and switched ultra to 192 bits
+
+ For ultra, this was its documented strength, and now follows RFC3766 recommendations
+ for sizes.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 21:54:09 2015 +0200
+
+ certtool: be more specific on the help message for --sec-param when --bits are given
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 14:54:04 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 14:15:28 2015 +0200
+
+ tests: added test case for record timeout values
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 12 13:52:03 2015 +0200
+
+ Introduced GNUTLS_INDEFINITE_TIMEOUT
+
+ This allows to specify an indefinite timeout to gnutls_record_set_timeout().
+ In addition this flag is accepted by gnutls_handshake_set_timeout() and
+ cancels out a previously set timeout.
+ Resolves #41
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Oct 7 10:38:25 2015 +0200
+
+ tests: better detection of softhsm library
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 5 14:31:53 2015 +0200
+
+ added text on _gnutls_dh_compute_key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Oct 5 17:11:37 2015 +0200
+
+ gnutls_record_recv: simplified text on GNUTLS_E_REHANDSHAKE
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 22 14:31:00 2015 +0200
+
+ certtool: print 16-bytes of hex values per line
+
+ Also avoid a colon on the end of the line.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Sep 22 08:31:04 2015 +0200
+
+ fips140: set the key via a configure argument
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 12:37:51 2015 +0200
+
+ tests: disable cipher-test on windows platform; they don't seem to work
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 21 14:47:41 2015 +0200
+
+ README.md: added build instructions for Fedora/RHEL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 21 14:25:12 2015 +0200
+
+ priorities: sort algorithms by security strength unless performance is requested
+
+ That is prioritize 256-bit ciphers over 128-bit ciphers. This would protect
+ secrecy of current data even after a PQ future.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 12:12:18 2015 +0200
+
+ .gitlab-ci.yml: reduce the number of CPUs used in slow on make check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 11:36:48 2015 +0200
+
+ use time_t for internal type to avoid warnings on signed/unsigned comparison
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 11:30:39 2015 +0200
+
+ DSA FIPS186-4 key generation: print the required seed length on mismatch
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 11:22:04 2015 +0200
+
+ certtool: added more friendly error on seed_size mismatch
+
+ That prints more useful information when generating provable private keys.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 11:14:29 2015 +0200
+
+ tests: use the corrected seed for default provable private key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 06:52:13 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 19 06:50:45 2015 +0200
+
+ certtool: switched the default level to HIGH for key generation
+
+ That requires 3072 bits for RSA and DSA keys.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 18 23:49:46 2015 +0200
+
+ tools: added xmpp into the starttls-proto options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 18 15:57:14 2015 +0200
+
+ tools: added ldap into the starttls-proto options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 17 14:52:27 2015 +0200
+
+ system.c: simplify gnutls_system_recv_timeout
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 17 13:15:54 2015 +0200
+
+ gnutls-cli-debug: use RFC7627 instead of draft-ietf-tls-session-hash
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 17 10:45:30 2015 +0200
+
+ updated documentation on gnutls_vdata_types_t based on DKG's suggestions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Sep 17 10:10:47 2015 +0200
+
+ doc update
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Wed Sep 16 19:59:12 2015 -0400
+
+ improve docs for gnutls_certificate_verify_peers*()
+
+ The gnutls_certificate_verify_peers{,2,3}() functions all return
+ GNUTLS_E_SUCCESS (0) even in situations when the peer's certificate
+ was not verified. This is explained in the first paragraphs
+ ("i.e. failure to trust a certificate does not imply a negative return
+ value"), but the Returns: line isn't comparably clear.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 14 21:36:24 2015 +0200
+
+ certtool: increased seed size to allow for DSA seeds
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Sep 14 21:32:05 2015 +0200
+
+ _gnutls_hex2bin: avoid overrun in the provided buffer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 19:29:41 2015 +0200
+
+ certtool: don't output PKCS #8 on key-info option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 13:57:26 2015 +0200
+
+ better error checking in seed decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 13:52:30 2015 +0200
+
+ gnutls_x509_privkey_verify_seed: fail on keys without seed information
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 13:39:13 2015 +0200
+
+ certtool: on provable keys always print the legacy format
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 13:27:12 2015 +0200
+
+ Use separate PEM headers for provable private keys
+
+ Also introduce GNUTLS_PRIVKEY_FLAG_EXPORT_COMPAT to allow exporting
+ provable private keys in the old compatibility format.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 11:06:39 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 11:06:00 2015 +0200
+
+ certtool: provable key generation was moved to a separate flag that can be combined with --generate-privkey
+
+ Also enhanced the test suite with DSA provable key generation/verification.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 10:57:39 2015 +0200
+
+ Allow verifying and generating provable DSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 09:51:25 2015 +0200
+
+ tests: added checks for provable key generation and verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 09:36:46 2015 +0200
+
+ certtool: added provable key verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 09:32:32 2015 +0200
+
+ Made the new key generation API flexible to allow extensions in the future
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 09:06:12 2015 +0200
+
+ Added API to verify private keys generated with seed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Sep 13 09:01:41 2015 +0200
+
+ gnutls_asn1_tab: updated auto-generated file
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 12 16:20:13 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 12 16:18:10 2015 +0200
+
+ certtool: allow the generation of "provable" private keys
+
+ Relates to #34
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 12 15:47:38 2015 +0200
+
+ Added API to generate private keys from a given seed
+
+ Currently it is restricted to RSA and FIPS 186-4 key generation with SHA384.
+ Relates to #34
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 12 14:47:02 2015 +0200
+
+ properly generate asn1_tab.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 11 15:44:06 2015 +0200
+
+ Don't use formatted output for fixed strings
+
+ Resolves #35
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Sep 9 22:24:27 2015 +0200
+
+ README.md: updated information
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Sep 5 06:20:58 2015 +0200
+
+ renamed the auto-verification functions
+
+ The names are more consistent with the rest of the library.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Sep 4 14:05:02 2015 +0200
+
+ pkcs11: when storing public keys, make sure they are marked as not private
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 31 14:22:02 2015 +0200
+
+ README.md: mention the testsuite
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 30 23:41:11 2015 +0200
+
+ README.md: print build status
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 30 23:31:06 2015 +0200
+
+ README.md: refer to files using markdown
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 30 23:26:27 2015 +0200
+
+ Updated coding style
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 28 16:54:47 2015 +0200
+
+ gnutls-cli-debug: corrected typo in inappropriate fallback check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 28 16:51:35 2015 +0200
+
+ .gitlab-ci.yml: use the same number of CPUs in all the checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 28 12:05:02 2015 +0200
+
+ gnutls-cli-debug: added check for inappropriate fallback support
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 27 22:12:55 2015 +0200
+
+ Introduced GNUTLS_E_CERTIFICATE_VERIFICATION_ERROR to be returned by the auto-verification functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 19:39:22 2015 +0200
+
+ nettle: simplified SHA3 checks for nettle
+
+ nettle 3.1 doesn't have the functions nettle for
+ runtime version checking.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 19:34:59 2015 +0200
+
+ export _gnutls_digest_exists for self tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 11:51:09 2015 +0200
+
+ x509: tolerate missing subject or issuer fields
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 11:42:01 2015 +0200
+
+ certtool: added support for sha3
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 11:37:13 2015 +0200
+
+ gnutls_oid_to_digest(): don't return supported but disabled algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 11:02:39 2015 +0200
+
+ Added support for the SHA3 digest algorithm
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 26 09:13:52 2015 +0200
+
+ corrected typo in ex-server-anon
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 14:13:24 2015 +0200
+
+ Define more precisely the auto verification function semantics.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 13:59:21 2015 +0200
+
+ Allow overriding the verification flags from the auto-verification functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 13:43:09 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 13:39:33 2015 +0200
+
+ Document the new verification functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 13:19:51 2015 +0200
+
+ examples: simplify the X.509 client example by using the new verification API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 13:13:57 2015 +0200
+
+ tests: check the auto-verification functionality
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 12:00:10 2015 +0200
+
+ Added simpler verification functions for clients
+
+ The major use-case for the TLS protocol is verification of PKIX
+ certificates. However, certificate verification support while is
+ similar for almost all projects it requires around 100 lines of code
+ (a callback) to be duplicated to all applications. That patch
+ set gets rid of the callback and simplifies certificate verification
+ support, by introducing a very simple API; one that would accept
+ the session and the hostname only.
+
+ Resolves #27
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 11:10:26 2015 +0200
+
+ tests: added test for gnutls_session_set_verify_function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 24 11:03:09 2015 +0200
+
+ Added gnutls_session_set_verify_function
+
+ That allows to set a verification callback per session rather
+ than only globally on the credentials structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 22:54:22 2015 +0200
+
+ getfuncs.pl: ignore defines in headers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 22:33:59 2015 +0200
+
+ Makefiles: updated for new filenames
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 19:28:09 2015 +0200
+
+ Moved pk_* functions to pk.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 19:19:45 2015 +0200
+
+ Removed the 'gnutls_' prefix from files to simplify file naming
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 18:44:26 2015 +0200
+
+ Moved the PRF functions to prf.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 23 14:19:17 2015 +0200
+
+ hex decoding: more reasonable error codes
+
+ That is, return GNUTLS_E_PARSING_ERROR instead of base64 decoding
+ error, and document that fact.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 15:10:46 2015 +0200
+
+ tests: Added resumption tests for PSK ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 14:35:09 2015 +0200
+
+ Set the extended master secret status based on resumption data only
+
+ That is, don't require a new negotiation with extensions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 14:23:38 2015 +0200
+
+ tests: corrected resumption tests to disable tickets when needed
+
+ That is, perform the tests that require no tickets, with tickets disabled.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 14:06:51 2015 +0200
+
+ session packing: corrected issue in PSK session unpack
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 13:54:41 2015 +0200
+
+ PSK: save the username in client side in the auth structure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 13:26:08 2015 +0200
+
+ _gnutls_hash() returns error code if any.
+
+ Ideally we would like to eliminate any return codes from that
+ function. However, since that's on exported API we cannot easily
+ do without breaking the ABI. Reported by Benedikt Klotz.
+
+ Resolves #28
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 13:15:11 2015 +0200
+
+ x509: when appending CRLs to a trust list ensure that we don't have duplicates
+
+ That is, overwrite CRLs if they have been obsoleted.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 21 11:34:39 2015 +0200
+
+ certtool: allow exporting very long CRLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 14 12:15:16 2015 +0200
+
+ tests: verify that a key usage violation is detected
+
+ That is that the certificate key usage flags are respected
+ by either the client side or the server side.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 14 12:14:55 2015 +0200
+
+ Enable key usage checks in the client side of RSA ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 14 12:14:08 2015 +0200
+
+ priorities: Added internal option to allow key usage violations in server side
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 14 11:55:04 2015 +0200
+
+ fix typo in comment
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 14 11:27:50 2015 +0200
+
+ Re-enable the certificate key usage checks for compliance with ciphersuite
+
+ There is a new attack on the TLS protocol which relies on using certificates
+ for ECDSA as certificates for ECDH ciphersuites. That attack while it doesn't
+ affect gnutls, which doesn't support static ECDH, assumes that implementations
+ ignore the key usage bits in the certificate. We have done it since 3.1.0 for
+ compatibility reasons (see http://www.gnutls.org/faq.html#key-usage-violation),
+ but that clearly opens the door for real attacks in the future.
+
+ For this reason the key usage bits will no longer be ignored.
+
+ Resolves #24
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 13 12:10:59 2015 +0200
+
+ tests: verify whether CRL date setting works as expected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 13 12:05:35 2015 +0200
+
+ certtool: Allow specifying CRL dates as fixed dates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 13 11:48:15 2015 +0200
+
+ tests: verify CRL appending effectiveness
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 13 11:45:50 2015 +0200
+
+ gnutls_x509_crl_set_authority_key_id, gnutls_x509_crl_set_number allow overwritting
+
+ That allows them to overwrite values which were previously set (e.g.,
+ on an imported CRL).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 13 11:36:17 2015 +0200
+
+ certtool: allow appending certificates to a CRL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 12 23:03:20 2015 +0200
+
+ certtool: removed limit on maximum imported certificates in the -i option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 12 22:49:15 2015 +0200
+
+ tests: check whether the CRL generation code works as expected
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 12 22:48:45 2015 +0200
+
+ certtool: eliminated memory leaks due to new cert loading code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Aug 12 22:22:55 2015 +0200
+
+ certtool: lifted limits on file size to load
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 10 16:43:28 2015 +0200
+
+ before dist ensure that included libopts matches autogen
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 10 16:12:05 2015 +0200
+
+ configure: use ':' instead of /bin/true for programs not found
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 9 21:20:33 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Aug 9 20:58:40 2015 +0200
+
+ tests: include all cert-tests into dist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 16:59:18 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 16:13:12 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 16:04:12 2015 +0200
+
+ tests: check gnutls_check_version_numeric()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 15:45:21 2015 +0200
+
+ gnutls.h: added macro gnutls_check_version_numeric
+
+ This simplifies version checking, and allows the compiler to optimize
+ out. It can only accept numerals.
+
+ Patch by David Woodhouse.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 15:19:33 2015 +0200
+
+ use pure and const gcc attributes in headers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Aug 7 14:14:44 2015 +0200
+
+ mention version macro
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Aug 6 10:37:15 2015 +0200
+
+ p11tool: test-sign will not fail if a pubkey is not found
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 4 20:32:25 2015 +0200
+
+ key decoding: set key to null for consistency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 4 14:08:37 2015 +0200
+
+ key decoding: simplify decoding logic by removing the fallback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 4 13:56:41 2015 +0200
+
+ key decoding: corrected regression with PKCS #8 key decoding
+
+ Reported by Daniel Berrange.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Aug 4 13:55:56 2015 +0200
+
+ tests: added check for decoding of a PKCS #8 key as fallback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Aug 3 14:17:16 2015 +0200
+
+ pkcs11: set the CKA_TOKEN attribute on generated public keys
+
+ That also introduces the GNUTLS_PKCS11_OBJ_FLAG_NO_STORE_PUBKEY flag,
+ to simulate the previous behavior.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 17:03:33 2015 +0200
+
+ tests: added check for the fallback SCSV
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 17:02:00 2015 +0200
+
+ handshake: check inappropriate fallback against the configured max version
+
+ That allows to operate on a server which is explicitly configured to
+ utilize earlier than TLS 1.2 versions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 17:01:36 2015 +0200
+
+ corrected GNUTLS_E_INAPPROPRIATE_FALLBACK error code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 16:44:13 2015 +0200
+
+ DCO: added Alessandro Ghedini
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 14:21:59 2015 +0200
+
+ copy_ciphersuites: use definition for reserved ciphersuites
+
+Author: Alessandro Ghedini <alessandro@ghedini.me>
+Date: Sat Aug 1 00:38:10 2015 +0200
+
+ handshake: add FALLBACK_SCSV priority option
+
+ This allows clients to enable the TLS_FALLBACK_SCSV mechanism during
+ the handshake, as defined in RFC7507.
+
+Author: Alessandro Ghedini <alessandro@ghedini.me>
+Date: Sat Aug 1 00:04:16 2015 +0200
+
+ handshake: check for TLS_FALLBACK_SCSV
+
+ If TLS_FALLBACK_SCSV was sent by the client during the handshake, and
+ the advertised protocol version is lower than GNUTLS_TLS_VERSION_MAX,
+ send the "Inappropriate fallback" fatal alert and abort the handshake.
+
+ This mechanism was defined in RFC7507.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 09:10:53 2015 +0200
+
+ cfg.mk: fix order of arguments in gnulib-tool
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 08:38:50 2015 +0200
+
+ use gettext-h gnulib module
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Aug 1 00:12:25 2015 +0200
+
+ tests: added missing certtool-long-cn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 22:42:42 2015 +0200
+
+ safe renegotiation: simulate receiving the extension on receival of SCSV
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 22:00:53 2015 +0200
+
+ made data2hex() safer, and eliminated mem leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 22:17:17 2015 +0200
+
+ tests: added check for proper handling of very long CNs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 21:26:25 2015 +0200
+
+ updated the required gettext version to match the macros from gnulib
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 16:03:25 2015 +0200
+
+ safe renegotiation: handle case where client didn't send any extension
+
+ That was affected by the "don't try to send extensions we didn't receive".
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 15:02:01 2015 +0200
+
+ tpm: avoid warning
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 14:57:33 2015 +0200
+
+ As server don't try to send extensions we didn't receive.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 14:33:00 2015 +0200
+
+ tests: added check for server sending (or not) status request messages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 31 14:30:00 2015 +0200
+
+ fips140: corrected hex decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 11:48:51 2015 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 11:45:51 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 10:30:20 2015 +0200
+
+ verify-tofu: use nettle's base64 functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 10:24:39 2015 +0200
+
+ gnulib: removed base64 implementation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 10:20:40 2015 +0200
+
+ openpgp: use nettle's base64 functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 10:11:48 2015 +0200
+
+ x509_b64: switch to nettle's base64 functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:57:52 2015 +0200
+
+ tests: added check for PSK file parsing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:37:34 2015 +0200
+
+ fips: use gnutls_hex_decode for MAC decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:36:32 2015 +0200
+
+ tpm: use gnutls_hex_decode for uuid decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:36:14 2015 +0200
+
+ psk: use gnutls_hex_decode2 for key decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:35:47 2015 +0200
+
+ system-keys-win: use gnutls_hex_decode for ID decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:35:11 2015 +0200
+
+ openpgp: use gnutls_hex_decode for keyid decoding
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:34:52 2015 +0200
+
+ DN decoding: use gnutls_hex_encode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 21 08:19:17 2015 +0200
+
+ Introduced gnutls_hex_encode2() and gnutls_hex_decode2()
+
+ These also use safer hex decoding functions which don't skip
+ invalid input.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 22:37:40 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 22:09:28 2015 +0200
+
+ x509: simplified data to hex conversion in unknown DN names
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 21:26:36 2015 +0200
+
+ gnutls_prf_rfc5705: Allow for non-null context and zero context length
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 13 20:19:28 2015 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 15:42:21 2015 +0200
+
+ tests: added cross-check between gnutls_prf_rfc5705() and gnutls_prf()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 15:07:05 2015 +0200
+
+ removed legacy libgcrypt flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 14:59:37 2015 +0200
+
+ gnutls_prf_rfc5705: optimize in the common use case, by avoiding malloc
+
+ Also don't handle specially the case of non-NULL context and context_size of zero.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 14:03:34 2015 +0200
+
+ ignore more files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 14:03:22 2015 +0200
+
+ p11tool: fix documentation for --generate-ecc and generate-dsa
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 10:49:48 2015 +0200
+
+ gnutls_prf_rfc5705: mention the version it was introduced at
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 10:39:37 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 10:35:08 2015 +0200
+
+ tests: added check for gnutls_prf() and gnutls_prf_rfc5705
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 20 10:03:37 2015 +0200
+
+ gnutls_prf_rfc5705: added
+
+ That includes support for RFC5705 when the context field is used.
+ Initial patch by Rick van Rein.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 17 11:38:17 2015 +0200
+
+ doc update: explain more about PKCS #11 and fork
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 14 09:55:50 2015 +0200
+
+ configure: print the trousers lib only when set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jul 14 09:44:30 2015 +0200
+
+ tpmtool: Added --test-sign parameter
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 13 20:04:41 2015 +0200
+
+ Deinitialize the TPM subsystem only when trousers support is enabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jul 13 16:25:16 2015 +0200
+
+ TPM: don't link to trousers, use dlopen()
+
+ That introduces --with-trousers-lib which can be used to specify the
+ library to dlopen().
+
+ Resolves #18
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 12 15:21:13 2015 +0200
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jul 12 15:15:00 2015 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jul 11 12:05:56 2015 +0200
+
+ pkcs11: mention the version GNUTLS_PKCS11_TOKEN_MODNAME is available from
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 21:20:23 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 21:17:48 2015 +0200
+
+ PSK: set the hint in DHE-PSK and ECDHE-PSK ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 19:17:23 2015 +0200
+
+ tests: updated pskself to check the hint in all PSK ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:57:19 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:55:48 2015 +0200
+
+ p11tool: be more compact in token URL printing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:52:57 2015 +0200
+
+ p11tool: group the provided options for readability
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:31:02 2015 +0200
+
+ p11tool: keep backwards compatibility by introducing --list-token-urls
+
+ That is, the output of --list-tokens remains the same.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:25:48 2015 +0200
+
+ p11tool: print the module name of a token in verbose mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 16:24:11 2015 +0200
+
+ Added GNUTLS_PKCS11_TOKEN_MODNAME for gnutls_pkcs11_token_get_info
+
+ That allows to obtain the shared module name of a token URL.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 13:36:51 2015 +0200
+
+ pkcs11.h: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jul 10 13:12:00 2015 +0200
+
+ p11tool: less verbose output in --list-tokens unless --verbose is specified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 9 14:10:23 2015 +0200
+
+ tests: added suppression for bash mem leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 9 22:50:11 2015 +0200
+
+ tests: don't run certtool-utf8 when libidn is 1.30 or less
+
+ This avoids test suite failures due to libidn.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 9 13:45:58 2015 +0200
+
+ gnutls-cli: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jul 9 13:26:14 2015 +0200
+
+ dumbfw: don't append a size prefix in the pad
+
+ Reported by Hannes Mehnert.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 8 09:47:52 2015 +0200
+
+ gl: use /bin/true to run valgrind during configure
+
+ Bash has memory leaks, which prevents the valgrind check to
+ operate using the SHELL variable.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 8 09:38:37 2015 +0200
+
+ tests: added check for invalid UTF8 encoded string
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 8 09:19:00 2015 +0200
+
+ Revert "libidn support is disabled by default"
+
+ This reverts commit 5fdffb2c177cb990480fb8b93c9257ccc5dfcaad.
+
+Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
+Date: Thu Jul 2 14:28:32 2015 -0400
+
+ certtool --outder should not emit signature verification status
+
+ When emitting binary-formatted output, send signature verification
+ status to stderr, since it is not binary-formatted output.
+
+ A simpler version of this patch would be to always send signature
+ verification to stderr, but that would change the text-formatted
+ output.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 21:13:23 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 15:25:30 2015 +0200
+
+ DSA: the numeric number of bits returned from public key should depend on P not Y
+
+ That allows to do the proper evaluation to check certificate strength.
+ Reported by Hubert Kario.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 15:36:20 2015 +0200
+
+ tests: check whether we print the prime size in DSA keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 11:15:38 2015 +0200
+
+ name constraints: simplified gnutls_x509_name_constraints_check_crt()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 11:08:11 2015 +0200
+
+ tests: verify that unsupported name constraints are properly handled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jul 1 11:01:20 2015 +0200
+
+ name constraints: don't reject certificates if a CA has the URI or IPADDRESS constraints
+
+ Don't reject certificates if a CA has the URI or IPADDRESS constraints, and
+ the end certificate doesn't have an IPaddress name or a URI set.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 29 19:52:15 2015 +0200
+
+ Sync with TP.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jun 28 13:09:42 2015 +0200
+
+ libidn support is disabled by default
+
+ That is until the issues with libidn get resolves.
+
+ Relates #10
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 27 08:05:10 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 27 07:57:21 2015 +0200
+
+ tests: added a test for the fork detection interface
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 27 07:51:05 2015 +0200
+
+ tests: resume-dtls: increased timeouts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 26 16:31:21 2015 +0200
+
+ Don't use pthread_atfork(), it is not safe to use with dlopen()
+
+ http://austingroupbugs.net/view.php?id=851
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 26 14:47:39 2015 +0200
+
+ atfork: added underscore to gnutls_forkid
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 26 09:08:20 2015 +0200
+
+ simplified fork detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 26 08:07:01 2015 +0200
+
+ enhanced header matching code for private keys to skip unrelated data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 26 08:00:24 2015 +0200
+
+ tests: added private key import checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 25 15:08:54 2015 +0200
+
+ gnutls_x509_privkey_import: optimized private key loading
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 25 15:01:17 2015 +0200
+
+ gnutls_x509_privkey_import2: better behavior when provided with an unencrypted file
+
+ That is, it will attempt to decode it first as plain file prior to
+ trying all encrypted options.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 25 14:47:52 2015 +0200
+
+ tests: added check to verify that gnutls_x509_privkey_import2 works for plain keys
+
+ That is, when a password is provided and the key is non encrypted.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 25 11:08:19 2015 +0200
+
+ _gnutls_get_asn_mpis() will release any data on failure
+
+ Resolves #15
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 20:42:12 2015 +0300
+
+ tests: tab indent + minor style changes
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 23 11:53:23 2015 +0200
+
+ tests: modified test-ciphersuite-names to work with cpp 5.1.1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 22 23:49:32 2015 +0200
+
+ tests: test-ciphersuite-names: create any needed dirs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 22 21:24:55 2015 +0200
+
+ tests: moved test-ciphersuites.sh one level up
+
+ That simplifies running the script outside make check.
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 20:43:34 2015 +0300
+
+ tests: suite: ciphersuite: fixups
+
+ fix separate builddir issue, without modifying locations, quite ugly.
+
+ re-indent using tab.
+
+ fix shebang.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 03:00:05 2015 +0300
+
+ tests: enforce UTC timezone in datefudge tests
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 03:00:04 2015 +0300
+
+ tests: misc: shell cleanup
+
+ leftovers minor sync.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 03:00:03 2015 +0300
+
+ tests: suite: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Cleanup indentation to be consistent with other tests.
+
+ Fix separate builddir issues.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Sun Jun 21 03:00:02 2015 +0300
+
+ tests: misc: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Cleanup indentation to be consistent with other tests.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 18:38:24 2015 +0200
+
+ tests: fixed includes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 12:27:54 2015 +0200
+
+ move all gettext definitions in gnutls_str.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 12:23:40 2015 +0200
+
+ cross.mk: updated for 3.4.2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 12:18:26 2015 +0200
+
+ gnutls_str: include gettext.h when dgettext is available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 12:09:14 2015 +0200
+
+ tests: don't depend on gnulib
+
+ That dependency unfortunately causes many portability problems
+ on platforms where it should have worked out of the box.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 10:43:12 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jun 20 10:31:27 2015 +0200
+
+ use the same shebang for perl
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 19 22:55:04 2015 +0200
+
+ tests: added a verify-chain test case
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 19 21:53:27 2015 +0200
+
+ tests: don't quote provider in common.sh
+
+ That caused testpkcs11 to fail.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 22:50:18 2015 +0200
+
+ tests: don't enforce alignment rules for caller buffers
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Wed Jun 17 14:05:54 2015 +0300
+
+ tests: cert-tests: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Cleanup trailing spaces.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 16:20:50 2015 +0200
+
+ Added gitlab-ci.yml
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 15:52:39 2015 +0200
+
+ reduced the exported functions to the minimum needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 15:49:39 2015 +0200
+
+ _gnutls_ext_register was made static
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 15:49:06 2015 +0200
+
+ libgnutls.map: use a 3.4 related name for private functions
+
+ This eliminates any collisions with functions from 3.3.x
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jun 18 09:41:54 2015 +0300
+
+ tests: nist-pkits: cleanup shell/perl usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Consistent indent.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 14:15:18 2015 +0200
+
+ tests: force link with nettle of mini-alignment
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 14:11:08 2015 +0200
+
+ tests: Check the OID functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 14:01:42 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 13:59:57 2015 +0200
+
+ Exported functions to convert from and to OIDs
+
+Author: Saurav Babu <saurav.babu@samsung.com>
+Date: Thu Jun 18 12:50:32 2015 +0530
+
+ gnutls-cli: Fixed Possible Memory Leak
+
+ This patch fixes possible memory leak in psk_callback() function, rawkey
+ is allocated memory by gnutls_malloc() and is not freed when
+ gnutls_hex_decode() returns with error
+
+ Signed-off-by: Saurav Babu <saurav.babu@samsung.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 11:19:37 2015 +0200
+
+ pkcs7: corrected write_signer_id() when GNUTLS_PKCS7_WRITE_SPKI was used
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jun 18 09:41:55 2015 +0300
+
+ tests: openpgp-certs: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jun 18 09:41:53 2015 +0300
+
+ tests: key-tests: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jun 18 09:41:52 2015 +0300
+
+ tests: ecdsa: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Cleanup trailing spaces.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Thu Jun 18 00:57:04 2015 +0300
+
+ tests: dsa: cleanup shell usage
+
+ Add quotes for most usages of variables.
+
+ Added ${} for variables.
+
+ Cleanup trailing spaces.
+
+ Removal of unneeded ';'.
+
+ Minor fix in tests/scripts/common.sh at trap to pass message and avoid
+ killing.
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 10:51:09 2015 +0200
+
+ indentation fix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 10:46:13 2015 +0200
+
+ Always align in 16-byte boundary our input to crypto
+
+ That allows faster operations in almost all instruction sets.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 18 10:44:45 2015 +0200
+
+ tests: added check for memory alignment
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 22:26:51 2015 +0200
+
+ tests: only run test with long dates in 64-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 17:17:10 2015 +0200
+
+ tests: regenerate the results in template-test using UTC times
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 16:48:36 2015 +0200
+
+ ensure that gnutls_pubkey_verify_data2 returns 0 on success
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 16:40:15 2015 +0200
+
+ Added gnutls_pkcs7_get_signature_count
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Wed Jun 17 11:59:55 2015 +0300
+
+ tests: suite: run testpkcs11 if PKCS#11 is enabled
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Wed Jun 17 11:59:56 2015 +0300
+
+ tests: remove bash usage
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 11:34:46 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 11:19:10 2015 +0200
+
+ tests: verify that we generate dates with UTCTime prior to 2050
+
+ Also that we generate dates with GeneralizedTime format after 2050.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 11:12:03 2015 +0200
+
+ When writing the Time ASN.1 structure follow the RFC5280 recommendations
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 11:03:29 2015 +0200
+
+ Set time in PKCS #7 structures properly (in UTCTime format).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 17 10:42:54 2015 +0200
+
+ doc update
+
+Author: Alon Bar-Lev <alon.barlev@gmail.com>
+Date: Tue Jun 16 23:48:58 2015 +0300
+
+ tests: cert-tests: pkcs7: support separate builddir
+
+ Signed-off-by: Alon Bar-Lev <alon.barlev@gmail.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 22:00:41 2015 +0200
+
+ account new symbols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 22:00:01 2015 +0200
+
+ updated makefiles for the new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 21:53:29 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 21:47:37 2015 +0200
+
+ use common base for pkcs7 files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 21:41:42 2015 +0200
+
+ added missing symbol
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 21:34:30 2015 +0200
+
+ released 3.4.2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 17:18:51 2015 +0200
+
+ certtool: made explicit the inclusion of time in PKCS #7 signatures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 17:15:04 2015 +0200
+
+ pkcs7: write the DER encoded time
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 16:56:30 2015 +0200
+
+ certtool: include the signature time in PKCS #7 signatures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 16:55:40 2015 +0200
+
+ pkcs7: corrected usage of GNUTLS_PKCS7_INCLUDE_TIME flag
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 13:31:54 2015 +0200
+
+ tests: minor updates in pkcs7 output checks to match new certtool
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 13:31:30 2015 +0200
+
+ certtool: rely on gnutls_pkcs7_print() even more
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 13:27:43 2015 +0200
+
+ pkcs7: print certificates and CRLs in FULL mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 12:29:53 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 12:29:38 2015 +0200
+
+ certtool: use gnutls_pkcs7_print() - partially
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 16 12:18:55 2015 +0200
+
+ Added gnutls_pkcs7_print()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 15 11:36:58 2015 +0200
+
+ bumped version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 11 10:34:55 2015 +0200
+
+ tests: added signature/verification stress test
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jun 11 10:11:35 2015 +0200
+
+ tests: check also individual ciphers for interoperability
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 8 11:38:54 2015 +0200
+
+ fips140: better debug messages when verifying MAC
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jun 5 11:19:13 2015 +0200
+
+ tpmtool: added newline in error messages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 16:10:30 2015 +0200
+
+ fips140: added check for reseed detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 15:48:23 2015 +0200
+
+ tests: check random generator for long outputs as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 15:42:42 2015 +0200
+
+ fips140: when GNUTLS_SKIP_FIPS_INTEGRITY_CHECKS is setup do not perform integrity tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 15:38:09 2015 +0200
+
+ fips140: reset the reseed counter only on reseed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 15:37:39 2015 +0200
+
+ fips140: when reseeding only reseed the required context not all
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 14:37:11 2015 +0200
+
+ fips140: added more checks on the reseed and generate function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 14:36:35 2015 +0200
+
+ fips140: enforce the max_number_of_bits_per_request
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 16:36:32 2015 +0200
+
+ tests: do not include times in the PKCS #7 checks as they depend on local timezone
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 13:28:59 2015 +0200
+
+ pkcs7: addressed memory leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 11:42:30 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 11:38:55 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 11:35:04 2015 +0200
+
+ tests: Added PKCS #7 attribute generation check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 10:44:25 2015 +0200
+
+ tests: updated for new certtool output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 10:40:54 2015 +0200
+
+ certtool: print signed and unsigned PKCS #7 attributes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jun 3 10:24:05 2015 +0200
+
+ Added code to parse and set PKCS #7 attributes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 16:34:45 2015 +0200
+
+ tests: added PKCS #7 verification check with MD5
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 16:31:49 2015 +0200
+
+ use the same flags in all verification functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 16:05:46 2015 +0200
+
+ _decode_pkcs7_signed_data: fixed mem leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 15:58:14 2015 +0200
+
+ Initialization of gnutls_x509_dn_t was modified to allow deinitialization after failure
+
+ Part2: made gnutls_x509_crt_get_subject() and gnutls_x509_crt_get_issuer()
+ return a constant value and avoid leaks.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 14:40:56 2015 +0200
+
+ doc: Separated the PKCS #7 in manual
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 14:35:26 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 14:26:20 2015 +0200
+
+ tests: check PKCS #7 structure signature generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 14:16:58 2015 +0200
+
+ tests: check PKCS #7 bundle generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 14:08:13 2015 +0200
+
+ certtool: added --p7-generate, --p7-sign and --p7-detached-sign
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 12:58:34 2015 +0200
+
+ Added gnutls_pkcs7_sign()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 11:13:41 2015 +0200
+
+ Added gnutls_pkcs7_get_crl_raw2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 11:00:39 2015 +0200
+
+ certtool: print the signing time when available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 11:00:26 2015 +0200
+
+ pkcs7 verification: parse the signing time
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 09:54:38 2015 +0200
+
+ on PKCS #7 verification check the the content type matches the signed data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 09:22:36 2015 +0200
+
+ certtool: print more info about the PKCS #7 struct
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 09:15:53 2015 +0200
+
+ certtool: allow verification against a direct PKCS #7 signer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 09:05:27 2015 +0200
+
+ tests: added checks with PKCS #7 detached data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 09:03:34 2015 +0200
+
+ pkcs7 verification: return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE when no encapsulated data exist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jun 2 08:57:34 2015 +0200
+
+ certtool: allow verifying PKCS #7 with detached data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 21:37:44 2015 +0200
+
+ certtool: improved PKCS #7 verification output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 21:33:02 2015 +0200
+
+ tests: check the key purpose in PKCS #7 verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 20:07:57 2015 +0200
+
+ tests: added PKCS #7 test with more than 1 certs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 18:56:51 2015 +0200
+
+ certtool: allow verification of PKCS #7 structures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 18:55:37 2015 +0200
+
+ Initialization of gnutls_x509_dn_t was modified to allow deinitialization after failure
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 15:19:03 2015 +0200
+
+ Added PKCS #7 signature(s) verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 15:13:10 2015 +0200
+
+ Added gnutls_pkcs11_get_raw_issuer_by_subject_key_id and gnutls_x509_trust_list_get_issuer_by_subject_key_id
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 14:34:57 2015 +0200
+
+ tests: added check for gnutls_x509_dn_get_str
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 14:26:19 2015 +0200
+
+ added gnutls_x509_dn_get_str
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 11:52:58 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 11:51:32 2015 +0200
+
+ Added gnutls_x509_crt_verify_data2() and kept gnutls_privkey_sign_data()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 10:43:46 2015 +0200
+
+ verify PKCS #7 signed data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 29 14:41:13 2015 +0200
+
+ updated PKCS #7 code to cache signed_data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jun 1 21:48:48 2015 +0200
+
+ When manual PKCS #11 configuration is requested don't initialize other providers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 31 08:51:26 2015 +0200
+
+ certtool: deinitialize PKCS #7 resources
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 31 08:50:09 2015 +0200
+
+ tests: Added tests for PKCS7 cert extraction
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 29 16:37:36 2015 +0200
+
+ Revert "updated gnulib"
+
+ This reverts commit c040ce6dd05b48b971d8dcc8fc8f23957ed15f9c.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 29 14:39:58 2015 +0200
+
+ silence format-signness warnings in gcc5
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 29 14:34:53 2015 +0200
+
+ updated gnulib
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 26 22:12:19 2015 +0200
+
+ Check the OID size for match when comparing for the OCSP nonce extension
+
+ Reported by Hanno Böck.
+
+Author: Armin Burgmeier <armin@arbur.net>
+Date: Sat May 23 23:30:18 2015 -0400
+
+ gnutls_dh_get_prime_bits: return 0 if DH is not used
+
+ Before, the number of bits of a zero-length number was attempted to be
+ extracted, resulting in an error. The changed behaviour is consistent with
+ the documentation which explicitly states that 0 should be returned if no DH
+ key exchange was performed.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 22 09:08:00 2015 +0200
+
+ gnutls_dh_get_group: mention that the values may include a leading zero
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 11:55:06 2015 +0200
+
+ gnutls_dh_set_prime_bits: warn when overriding the DH max prime size with 1007 bits or less
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 10:52:37 2015 +0200
+
+ cleanup unused variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 10:51:17 2015 +0200
+
+ corrected allocation check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 10:46:26 2015 +0200
+
+ removed useless check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 10:43:06 2015 +0200
+
+ document intentional fallthrough in switch
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 21 10:41:11 2015 +0200
+
+ ecc ext: check return code of _gnutls_buffer_append_data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 17 21:11:14 2015 +0200
+
+ tests: enhance the no-signal check to include proper data sending
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 17 20:59:14 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 17 20:57:48 2015 +0200
+
+ tests: check the operation of GNUTLS_NO_SIGNAL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 17 20:33:48 2015 +0200
+
+ Allow the usage of MSG_NOSIGNAL in send functions
+
+ That introduces the GNUTLS_NO_SIGNAL flag for gnutls_init(),
+ which is available in systems that support the MSG_NOSIGNAL
+ flag to send(). That eases the usage of the library within
+ other libraries.
+ Resolves #11
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 15 12:03:23 2015 +0200
+
+ include nettle/memxor when needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri May 15 12:02:56 2015 +0200
+
+ gnutls-serv: send alert when wrong data have been received from client
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 14 15:32:09 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu May 14 14:00:11 2015 +0200
+
+ camellia256-gcm: corrected regression
+
+ Reported by Manuel Pegourie-Gonnard.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon May 11 18:41:09 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 6 15:22:05 2015 +0200
+
+ doc: added section about subject alternative names
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 6 11:17:09 2015 +0200
+
+ handshake_start_time was moved out of the DTLS-specific variables
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 6 11:13:05 2015 +0200
+
+ apply default timeout for DTLS in gnutls_handshake_set_timeout
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 6 10:03:16 2015 +0200
+
+ tests: do not perform internationalized name checks without libidn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed May 6 09:52:39 2015 +0200
+
+ tests: updated sign-md5-rep to reduce false failures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 16:40:37 2015 +0200
+
+ tests: eliminate mem leaks in mini-loss-time
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 15:55:19 2015 +0200
+
+ tests: testdane: remove dane.nox.su from the list of known to be good hosts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 14:43:42 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 14:41:55 2015 +0200
+
+ tests: mini-loss-time enhanced to check proper timeouts in both client and server
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 14:35:45 2015 +0200
+
+ dtls: combined the total timeouts of DTLS and TLS handshake
+
+ That also makes the waits for packets more robust against blocking.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 09:36:17 2015 +0200
+
+ define GNUTLS_SUPPLEMENTAL_USER_MAPPING_DATA
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue May 5 07:57:16 2015 +0200
+
+ doc: updated text to account for pkcs11-url standardization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 3 19:43:40 2015 +0200
+
+ tests: mini-dtls-mtu: compile in windows
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Mon May 4 10:53:10 2015 +0300
+
+ doc: Fixed typo in heartbeat documentation.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 3 19:39:52 2015 +0200
+
+ cross.mk: updated for 3.4.1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 3 19:36:02 2015 +0200
+
+ updated abi base for 3.4
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 3 19:24:23 2015 +0200
+
+ NEWS: updated
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun May 3 19:09:19 2015 +0200
+
+ released 3.4.1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 18:48:57 2015 +0200
+
+ doc: updated gnutls_dtls_set_timeouts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 16:40:24 2015 +0200
+
+ doc: fixed example with DTLS timeouts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 16:32:40 2015 +0200
+
+ use macro for DTLS default timeout
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 16:28:24 2015 +0200
+
+ gnutls_handshake_set_timeout will properly work with DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 14:09:22 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 14:53:17 2015 +0200
+
+ document the need for gnutls_transport_set_pull_timeout_function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 14:06:09 2015 +0200
+
+ doc: updated async operation text
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 13:53:19 2015 +0200
+
+ disable default handshake timeout
+
+ It caused issues with non-blocking TLS clients and servers
+ which may not want to block while the pull timeout function
+ waits.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 13:38:26 2015 +0200
+
+ tests: added check to verify that pull timeout is not called on non-blocking sessions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 30 13:22:34 2015 +0200
+
+ GNUTLS_NONBLOCK can be used for non-DTLS sessions as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 29 14:44:30 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 29 14:44:30 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 28 16:12:13 2015 +0200
+
+ tests: key generation test was moved to main checks
+
+ This will allow to catch memory leaks with valgrind.
+
+Author: Jan Vcelak <jan.vcelak@nic.cz>
+Date: Tue Apr 28 13:50:40 2015 +0200
+
+ fix memory leak in ECDSA key parameters verification
+
+ Signed-off-by: Jan Vcelak <jan.vcelak@nic.cz>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 28 14:30:35 2015 +0200
+
+ updated minitasn1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 28 14:29:41 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 28 14:26:57 2015 +0200
+
+ Handle DNS name constraints with leading dot
+
+ Patch by Fotis Loukos.
+ Resolves 3
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 28 09:02:12 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 27 09:16:42 2015 +0200
+
+ updated text for gnutls_pkcs11_init
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 27 09:08:10 2015 +0200
+
+ updated pkcs11 loading documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 26 08:31:12 2015 +0200
+
+ tests: mini-etm: use TLS as the transport layer
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 26 08:29:19 2015 +0200
+
+ tests: added comment for sign-md5-rep
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 26 08:11:17 2015 +0200
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 26 00:04:13 2015 +0200
+
+ Sync with TP.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 21:23:38 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 20:00:04 2015 +0200
+
+ tests: added reproducer for the MD5 acceptance issue
+
+ Reported by Karthikeyan Bhargavan.
+ http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007572.html
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 19:34:34 2015 +0200
+
+ before falling back to SHA1 as signature algorithm in TLS 1.2 check if it is enabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 19:14:07 2015 +0200
+
+ _gnutls_session_sign_algo_enabled: do not consider any values from the extension data to decide acceptable algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 09:28:57 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 09:13:04 2015 +0200
+
+ tests: added unit tests for gnutls_certificate_client_get_request_status
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 09:12:04 2015 +0200
+
+ set the value used by gnutls_certificate_client_get_request_status prior to selecting certificate
+
+ That allows gnutls_certificate_client_get_request_status() to be properly operating
+ from the callback. Reported by Anton Lavrentiev.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 25 09:10:15 2015 +0200
+
+ updated doc for retrieve function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 24 16:04:44 2015 +0200
+
+ updated PKCS #11 URL references to rfc7512
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 22 14:00:45 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 22 13:54:18 2015 +0200
+
+ tests: added check for gnutls_credentials_get
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 22 13:49:10 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 22 13:41:17 2015 +0200
+
+ fixed doc: reported by Anton Lavrentiev
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 22 11:33:34 2015 +0200
+
+ doc: corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 22:08:56 2015 +0200
+
+ tests: resume-dtls: remove global variables
+
+Author: Andreas Metzler <ametzler@debian.org>
+Date: Tue Apr 21 19:18:00 2015 +0200
+
+ List all certificate type priority strings.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 19 21:23:21 2015 +0200
+
+ tls-rsa: keep a common code path when doing RSA decryption
+
+ Suggested by Nimrod Aviram.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 15:20:38 2015 +0200
+
+ tests: initialize status where needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 15:18:11 2015 +0200
+
+ tests: cleanup openpgp-auth2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 15:17:38 2015 +0200
+
+ tests: cleanup mini-dtls-rehandshake
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 13:46:36 2015 +0200
+
+ tests: resume: check for signals
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 10:42:50 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 10:40:41 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 10:36:07 2015 +0200
+
+ tests: reduced compiler warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 10:07:30 2015 +0200
+
+ tests: verify the return value of gnutls_certificate_get_ours when no cert is sent
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 21 10:07:11 2015 +0200
+
+ tests: close unused file descriptors in resume checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 23:39:08 2015 +0200
+
+ libopts: fixed the reading of the --enable-local-libopts flag
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 17:51:20 2015 +0200
+
+ gnutls-cli: when no certificate is sent, notify the user
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 17:45:33 2015 +0200
+
+ tests: added check with X.509 certificates and callbacks
+
+ That corresponds to functionality checked in openpgp-callback.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 17:38:10 2015 +0200
+
+ tests: added check for gnutls_certificate_get_ours() when used in combination with callbacks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 16:46:34 2015 +0200
+
+ tests: improved x509dn check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 16:43:51 2015 +0200
+
+ gnutls_certificate_get_ours: will return the certificate even if a callback was used
+
+ This corrects a bug where this function would not work, when
+ gnutls_certificate_set_retrieve_function2() was used.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 16:31:55 2015 +0200
+
+ gnutls-cli: when a certificate is specified require the corresponding private key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 16:25:21 2015 +0200
+
+ ensure that the X.509 version number is one byte only
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 14:04:37 2015 +0200
+
+ Check for invalid length in the X.509 version field
+
+ If such an invalid length is detected, reject the certificate.
+ Reported by Hanno Böck.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 13:57:31 2015 +0200
+
+ ocsp: initialize certs to NULL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 20 12:45:56 2015 +0200
+
+ gnutls-serv: print when the peer's certificate is not verified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 19 09:42:05 2015 +0200
+
+ Sync with TP.
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Apr 18 11:38:57 2015 +0200
+
+ ncrypt.h lacks some defines with some versions of MinGW.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 19 09:19:22 2015 +0200
+
+ updated auto-generated files
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Apr 18 11:38:56 2015 +0200
+
+ Fix a preprocessor warning about mismatched quotes.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Apr 18 11:38:55 2015 +0200
+
+ Set _WIN32_WINNT to 0x600, at least with some MinGW versions ncrypt.h checks this define to be at least 0x600.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Tim Kosse <tim.kosse@filezilla-project.org>
+Date: Sat Apr 18 11:38:54 2015 +0200
+
+ Fix include order, include gnutls_int.h before gnutls.h, otherwise undefined external references to gnutls_free and gnutls_strdup are the result when statically linking against GnuTLS built by MinGW.
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 16 19:36:32 2015 +0300
+
+ gnutls-cli: removed CCM from the ciphers tested with the old API
+
+ That prevents a crash of the benchmark. Reported by James Cloos.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 16 19:24:46 2015 +0300
+
+ refuse to use the old cipher API with AEAD-only ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 16 00:16:22 2015 +0300
+
+ tests: ignore sigpipe in resume and termination tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 20:05:59 2015 +0300
+
+ doc: added error check in example
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 20:03:06 2015 +0300
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 16:00:53 2015 +0300
+
+ doc: removed stray @end
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:53:39 2015 +0300
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:49:26 2015 +0300
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:48:21 2015 +0300
+
+ x509: when printing the keyid of a certificate use the curve name for randomart
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:47:39 2015 +0300
+
+ gnutls_x509_crt_get_pk_* are based on gnutls_pubkey_export_*
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:45:08 2015 +0300
+
+ gnutls_pubkey_export_* are tolerable in null input
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:41:54 2015 +0300
+
+ Added gnutls_x509_crt_get_pk_ecc_raw()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 15 11:24:01 2015 +0300
+
+ randomart: corrected usage of snprintf
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 14 22:11:14 2015 +0300
+
+ certtool: when generating an ECDSA key use the curve name in random art
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 14 22:08:18 2015 +0300
+
+ randomart: only print key size if it is non-zero
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 14 22:01:29 2015 +0300
+
+ cross.mk: updated for 3.4.0
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 14 21:33:19 2015 +0300
+
+ Remove SOCK_CLOEXEC from socket() call.
+
+ That allows compilation in systems where this
+ flag doesn't exist.
+ Resolves #7
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 14 16:06:39 2015 +0300
+
+ document the recommended re-handshake process
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 9 16:00:43 2015 +0200
+
+ remove duplicate entries from manpages Makefile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 17:08:07 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 17:07:11 2015 +0200
+
+ tests: enhanced cert tests with SHA256 key IDs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 16:56:44 2015 +0200
+
+ certtool: modified to allow different key ID algorithms
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 16:48:46 2015 +0200
+
+ Added flags which modify the algorithm used for key ID calculation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 16:33:47 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 16:18:37 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 16:16:42 2015 +0200
+
+ gnutls_record_discard_queued() is both for TLS and DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:59:54 2015 +0200
+
+ document the new crypto register functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:53:39 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:49:45 2015 +0200
+
+ doc: avoid spaces in showfunc
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:15:24 2015 +0200
+
+ tests: added files into dist
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:08:14 2015 +0200
+
+ configure: ask for nettle 3.1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 8 08:06:52 2015 +0200
+
+ released 3.4.0
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 23:28:06 2015 +0200
+
+ gnutls-cli: document the method to override the detected ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 23:21:23 2015 +0200
+
+ fixed AESNI CCM encryption
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 23:14:48 2015 +0200
+
+ cleanups in CCM-aesni
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 22:28:29 2015 +0200
+
+ tests: test CCM-8 against polarssl
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 22:21:45 2015 +0200
+
+ gnutls-cli-debug: test for AES-CCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 22:10:43 2015 +0200
+
+ doc: added 'git submodule update' to clone steps
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 22:00:17 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 21:38:11 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 20:24:10 2015 +0200
+
+ removed unused functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 16:03:16 2015 +0200
+
+ extend the fallback to setkey in addition to init
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 15:50:23 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 15:48:41 2015 +0200
+
+ tests: verify the behavior of GNUTLS_E_NEED_FALLBACK
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 15:39:18 2015 +0200
+
+ introduced GNUTLS_E_NEED_FALLBACK to allow falling back from registered ciphers
+
+ That allows a registered cipher to indicate that it cannot operate
+ (e.g., due to memory constraints, or internal limits), and gnutls should
+ proceed with the default algorithms.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:53:54 2015 +0200
+
+ ciphersuites: moved CCM ciphersuites in the appropriate ifdefs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:51:25 2015 +0200
+
+ tests: ciphersuite test will ignore the invalid names of TLS_DHE_PSK_WITH_AES_128_CCM_8
+
+ That is because the names in rfc6655 are for some reason different
+ than the expected.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:47:00 2015 +0200
+
+ document CCM and CCM-8
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:44:02 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:42:36 2015 +0200
+
+ tests: added CCM and CCM_8 into ciphersuite tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Apr 7 10:31:23 2015 +0200
+
+ Added CCM-8 ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 6 19:14:31 2015 +0200
+
+ updated announce text
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 6 10:49:15 2015 +0200
+
+ symbols: added the new supplemental functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Apr 6 10:08:16 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Apr 5 20:43:18 2015 +0200
+
+ tests: delay tests that depend on timing when they fail
+
+ That often prevents failures on busy systems.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 18:31:28 2015 +0200
+
+ don't enforce iv_size > block_size; it is no longer true for all ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 15:10:26 2015 +0200
+
+ simplified calc_enc_length_stream
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 14:49:03 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 14:29:58 2015 +0200
+
+ tests: updated supplemental API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 12:42:21 2015 +0200
+
+ gnutls_ext_register will fail on double registration
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 12:37:38 2015 +0200
+
+ gnutls_supplemental_register will fail on double registration
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 12:05:40 2015 +0200
+
+ symbols: added new exported functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 12:04:34 2015 +0200
+
+ doc: updated makefiles to include new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 12:03:37 2015 +0200
+
+ libgnutls.map: remove gnutls_record_set_max_empty_records
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 11:54:03 2015 +0200
+
+ account for the renamed gnutls_supplemental_recv/send
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 11:50:54 2015 +0200
+
+ document the export supplemental data API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 11:45:28 2015 +0200
+
+ gnutls_do_recv/send_supplemental -> gnutls_supplemental_recv/send
+
+ Also added the gnutls_ prefix to new types.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 11:34:55 2015 +0200
+
+ Added documentation for gnutls_do_send/recv_supplemental
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 10:30:56 2015 +0200
+
+ doc updates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 09:43:16 2015 +0200
+
+ the base64 xxx_alloc functions were renamed to xxx2
+
+ That brings them in par with the rest of the allocation
+ functions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 09:36:34 2015 +0200
+
+ p11tool: use the key usage flags to set PKCS #11 properties
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 09:31:00 2015 +0200
+
+ pkcs11: use key_usage to set the appropriate flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 08:53:33 2015 +0200
+
+ cleanups in supplemental data support
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Apr 4 07:36:47 2015 +0200
+
+ DH: do not warn on zero q_bits
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 3 22:52:17 2015 +0200
+
+ NEWS: rearrange entries
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Apr 3 22:35:24 2015 +0200
+
+ certtool: certtool --generate-dh-params will account for --outder
+
+ Resolves #5
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 2 15:30:20 2015 +0200
+
+ chacha20-poly1305: ciphersuite numbers correspond to the latest draft
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 2 15:27:51 2015 +0200
+
+ p11tool: improved output message
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Apr 2 12:54:45 2015 +0200
+
+ removed unecessary warning
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 19:08:33 2015 +0200
+
+ doc update: account for new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 18:42:13 2015 +0200
+
+ p11tool: better output text
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 18:40:47 2015 +0200
+
+ pkcs11: added GNUTLS_PKCS11_OBJ_FLAG_EXPECT_PUBKEY
+
+ Also enforce the expected flags despite any given flags
+ in the URL.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 18:29:08 2015 +0200
+
+ p11tool: added the --test-sign parameter
+
+ That allows to check an existing key for signing/verification.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 16:52:48 2015 +0200
+
+ gnutls_priv/pubkey_import_url replace: gnutls_privkey_import_pkcs11_url and gnutls_pubkey_import_pkcs11_url
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 16:02:02 2015 +0200
+
+ certtool: corrected import of pubkey in DER format
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 10:50:08 2015 +0200
+
+ tests: added check for EtM negotiation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 10:42:28 2015 +0200
+
+ only send EtM extension if we have CBC ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 10:04:54 2015 +0200
+
+ mention gnutls_privkey_sign_raw_data in upgrade section
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 09:55:09 2015 +0200
+
+ gnutls_privkey_sign_raw_data: converted to macro over gnutls_privkey_sign_hash
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Apr 1 10:00:31 2015 +0200
+
+ tests: added check for the legacy gnutls_privkey_sign_raw_data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 11:16:45 2015 +0200
+
+ avoid compilation warnings in self checks (take 2)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 11:15:04 2015 +0200
+
+ Revert "selftests: avoid compilatio warnings"
+
+ This reverts commit 196477d68f32b30d0de8e203a5c1c405af429603.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:50:45 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:48:37 2015 +0200
+
+ tests: check whether PKCS #11 ID set on copy/generation is correct
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:29:33 2015 +0200
+
+ p11tool: allow setting the CKA_ID on object initialization/generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:22:58 2015 +0200
+
+ exported new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:19:18 2015 +0200
+
+ pkcs11: enhanced key generation functions to allow specifying a CKA_ID
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 31 08:14:27 2015 +0200
+
+ selftests: avoid compilatio warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 16:12:27 2015 +0200
+
+ enhanced copy functions to allow specifying a CKA_ID
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 09:57:41 2015 +0200
+
+ tests: mini-server-name: ignore sigpipe
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 07:48:15 2015 +0200
+
+ tests: added more libidn-related valgrind suppressions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 07:05:27 2015 +0200
+
+ doc: increase border spacing in HTML tables
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 06:59:19 2015 +0200
+
+ doc: list chacha20-poly1305 to the list of ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 06:47:51 2015 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 06:37:52 2015 +0200
+
+ manpages: automatically adjust the copyright year on generated pages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 30 06:34:37 2015 +0200
+
+ tests: added check for gnutls_server_name_get and gnutls_server_name_set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 10:54:11 2015 +0200
+
+ test-ciphers.js: improved ciphersuite checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 10:49:23 2015 +0200
+
+ corrected GNUTLS_ECDHE_ECDSA_CHACHA20_POLY1305
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Mar 29 10:27:57 2015 +0200
+
+ updated test-ciphersuite.sh for new types
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 23:18:06 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 22:41:03 2015 +0100
+
+ Better fix for the double free in dist point parsing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 22:31:09 2015 +0100
+
+ updated minitasn1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 19:34:29 2015 +0100
+
+ gnutls_pkcs11_copy_x509_privkey: increase size for attributes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 19:21:48 2015 +0100
+
+ moved chacha20-poly1305 ciphersuites to the 0xCD space
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 13:45:23 2015 +0100
+
+ doc update: replace cryptographic algorithm by encryption algorithm
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 12:43:58 2015 +0100
+
+ gnutls_subject_alt_names_set and gnutls_x509_aki_set_cert_issuer will set null-terminated strings
+
+Author: Jiří Klimeš <jklimes@redhat.com>
+Date: Fri Mar 27 19:55:40 2015 +0100
+
+ doc: be consistent in the function descriptions
+
+ Signed-off-by: Jiří Klimeš <jklimes@redhat.com>
+
+Author: Jiří Klimeš <jklimes@redhat.com>
+Date: Fri Mar 27 20:00:45 2015 +0100
+
+ doc: correct the description of crypto API functions
+
+ Signed-off-by: Jiří Klimeš <jklimes@redhat.com>
+
+Author: Jiří Klimeš <jklimes@redhat.com>
+Date: Fri Mar 27 12:58:34 2015 +0100
+
+ Fix a few compiler warnings about unused variables
+
+ [-Wunused-variable]
+
+ Signed-off-by: Jiří Klimeš <jklimes@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 12:00:36 2015 +0100
+
+ fixed CHACHA20-POLY1305 in DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 11:08:28 2015 +0100
+
+ gnutls-cli: added chacha-poly1305 into benchmarks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 10:57:54 2015 +0100
+
+ when calculating record overhead account for chacha20 which doesn't send the nonce on the wire
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 10:54:02 2015 +0100
+
+ tests: include chacha20 into transfer tests
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 10:40:47 2015 +0100
+
+ Added the CHACHA20-POLY1305 ciphersuites (with random IDs)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 09:59:38 2015 +0100
+
+ added chacha20-poly1305 as cipher
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 09:09:02 2015 +0100
+
+ tests: check retvals in block ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 09:06:16 2015 +0100
+
+ do not penalize CBC ciphers with the maximum send data size
+
+ That reduced the maximum send size for CBC ciphers from 16384
+ to 16384-(block size), which was unnecessary and was causing issues:
+ https://bugs.winehq.org/show_bug.cgi?id=37500
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 08:18:32 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 28 08:18:17 2015 +0100
+
+ gnutls_record_set_max_empty_records: removed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 23 22:55:29 2015 +0100
+
+ eliminated double-free in the parsing of dist points
+
+ Reported by Robert Święcki.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 23 22:29:23 2015 +0100
+
+ Added a tight loop around the legacy push function
+
+ That reduces the need for more expensive outer loops.
+ Originally suggested by Anton Lavrentiev.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 23 19:19:49 2015 +0100
+
+ updated gnulib
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 14:01:20 2015 +0100
+
+ p11tool: more precise documentation of --set-id parameter
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 11:05:08 2015 +0100
+
+ depend on nettle 3.1 or later
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 10:42:48 2015 +0100
+
+ tests: updated email check for renamed --verify-email option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 10:32:29 2015 +0100
+
+ gnutls_pkcs11_privkey_generate2: increased the size of ck_attributes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 10:31:03 2015 +0100
+
+ pkcs11: check gnutls_rnd() for error condition
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 10:27:10 2015 +0100
+
+ gnutls_pkcs11_privkey_generate2: set a CKA_ID on key generation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 10:25:59 2015 +0100
+
+ p11tool: reduced debugging output
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 09:47:40 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 27 09:47:12 2015 +0100
+
+ certtool: --purpose, --hostname were renamed to --verify-purpose, --verify-hostname
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 16:46:43 2015 +0100
+
+ p11tool: added --mark-no-sign and --mark-no-decrypt options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 16:34:46 2015 +0100
+
+ pkcs11: added flags to mark keys as not-being signable or decryptable
+
+ That adds GNUTLS_PKCS11_OBJ_FLAG_MARK_NO_DECRYPT and GNUTLS_PKCS11_OBJ_FLAG_MARK_NO_SIGN
+ which can be set during generation or write of keys.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 16:21:28 2015 +0100
+
+ pkcs11: set the CKA_SIGN and CKA_DECRYPT flags when writing a private key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 13:16:52 2015 +0100
+
+ tests: cleanups in resume-dtls
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 11:26:14 2015 +0100
+
+ ext: server_name: move name length check prior to IDN convertion
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 11:04:37 2015 +0100
+
+ When an application calls gnutls_server_name_set() with a name of zero size disable the extension
+
+ Resolves #2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 09:25:10 2015 +0100
+
+ gnutls_x509_crt_check_hostname2: check CN for match only if certificate would have been acceptable for GNUTLS_KP_TLS_WWW_SERVER
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 26 09:20:34 2015 +0100
+
+ Apply DNS name constraints on CN field only on certificates acceptable for TLS WWW SERVER purpose
+
+ Suggested by Fotis Loukos.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 17:10:06 2015 +0100
+
+ tests: mini-loss-time is less prone to timeouts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 15:56:32 2015 +0100
+
+ tests: added valgrind suppressions in cert-tests for libidn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 15:52:15 2015 +0100
+
+ certtool: eliminated memory leaks on verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 10:39:35 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 10:21:31 2015 +0100
+
+ tests: Added email verification tests with certtool
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 10:05:33 2015 +0100
+
+ certtool: added the --email option, to use in verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 10:04:56 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 09:42:16 2015 +0100
+
+ Added gnutls_x509_crt_check_email(), gnutls_openpgp_crt_check_email() and GNUTLS_DT_RFC822NAME
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 09:02:53 2015 +0100
+
+ tests: verify that we accept a certificate with no name even if its CA has nameconstraints
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 25 08:38:47 2015 +0100
+
+ name constraints: when no name of the type is found, accept the certificate
+
+ This follows RFC5280 advice closely. Reported by Fotis Loukos.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 24 10:49:32 2015 +0100
+
+ tests: increase the timeout in resume-dtls
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 24 10:09:43 2015 +0100
+
+ gnutls_pkcs11_obj_export3: allow operation when raw.data is NULL and we have a public key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 24 09:58:17 2015 +0100
+
+ pkcs11: simplified export of objects
+
+ That also allows to export public keys, even when a CKA_VALUE
+ with the public key is not present. For that we use the key
+ parameters, which we encode into a key. Issue reported by
+ Frank Leavis.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 24 08:37:35 2015 +0100
+
+ gnulib: removed u64 module
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 24 08:36:33 2015 +0100
+
+ drop support for gnulib's u64
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 23 13:09:08 2015 +0100
+
+ tests: check legacy RC4 in testcompat
+
+ That would prevent losing compatibility without detecting it.
+ That is currently the case since it is no longer enabled by default.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 23 10:28:28 2015 +0100
+
+ tests: added check to verify the correctness of the record function return values
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 21 11:14:15 2015 +0100
+
+ tools: enable compilation with all options disabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 21 11:13:58 2015 +0100
+
+ enable compilation with several options disabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 21 10:38:28 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 14:04:26 2015 +0100
+
+ doc: avoid mentioning pointers when not needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 13:46:24 2015 +0100
+
+ increase the maximum stack frame the compiler will warn for
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 13:22:43 2015 +0100
+
+ doc: avoid using structure for opaque types
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 09:42:28 2015 +0100
+
+ tests: include gnutls_ext_s/get_data into tests of mini-extension
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 09:41:59 2015 +0100
+
+ updated documentation on non-return value of gnutls_ext_set_data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 09:35:51 2015 +0100
+
+ tests: fixed buffers in mini-dtls0-9
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 09:32:19 2015 +0100
+
+ avoid overflow when receiving DTLS 0.9 CCS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 20 08:35:48 2015 +0100
+
+ added gnutls_ext_set_data() and gnutls_ext_get_data()
+
+ As a side effect the type which holds private data was reduced
+ from union to void * pointer. That simplifies the exported API
+ without reducing the options in the internal API.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 22:04:48 2015 +0100
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 22:03:22 2015 +0100
+
+ set GNUTLS_DTLS_VERSION_MIN to be DTLS0.9
+
+ That allows standard DTLS ciphersuites to be used with DTLS0.9
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:59:06 2015 +0100
+
+ tests: added test for DTLS 0.9
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:30:42 2015 +0100
+
+ tests: updated mini-extension
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:29:34 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:27:35 2015 +0100
+
+ mention the new functionality briefly in documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:23:29 2015 +0100
+
+ mention that the registration functions are not thread safe
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:22:29 2015 +0100
+
+ store a copy of the extensions name
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:21:00 2015 +0100
+
+ deinitialize supplemental data on deinit
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:15:24 2015 +0100
+
+ removed unused epoch change callback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:12:27 2015 +0100
+
+ deinitialize supplemental data on deinit
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:06:14 2015 +0100
+
+ reduce warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 21:00:26 2015 +0100
+
+ added documentation for the new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 20:47:51 2015 +0100
+
+ tests: remove warnings in mini-supplementaldata.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 20:46:57 2015 +0100
+
+ updated types
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 20:41:03 2015 +0100
+
+ more files to ignore
+
+Author: Thierry Quemerais <tquemerais@awox.com>
+Date: Thu Mar 19 20:40:25 2015 +0100
+
+ Added a way to add custom supplemental data from public API.
+
+ Signed-off-by: Thierry Quemerais <tquemerais@awox.com>
+
+Author: Thierry Quemerais <tquemerais@awox.com>
+Date: Thu Mar 19 16:24:15 2015 +0100
+
+ Fixed extension test.
+
+ Signed-off-by: Thierry Quemerais <tquemerais@awox.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 20:35:22 2015 +0100
+
+ renamed gnutls_buffer_st -> gnutls_buffer_t
+
+Author: Thierry Quemerais <tquemerais@awox.com>
+Date: Thu Mar 19 20:15:11 2015 +0100
+
+ Added a way to add custom extensions from public API.
+
+ Signed-off-by: Thierry Quemerais <tquemerais@awox.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 20:11:18 2015 +0100
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 11:43:52 2015 +0100
+
+ gnutls_x509_crt_import_pkcs11_url moved to pkcs11.h as it was always defined there
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 11:06:28 2015 +0100
+
+ inet_ntop replacement: include sys/socket.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 19 11:03:24 2015 +0100
+
+ inet_ntop replacement: do not depend on socklen_t
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 22:48:06 2015 +0100
+
+ tests: link cipher tests directly with nettle when needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 22:39:19 2015 +0100
+
+ tests: mini-dtls-record: increase timeouts to avoid failure of test due to slow system
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 19:46:00 2015 +0100
+
+ tests: mini-dtls-record: removed the need for 64-bit number
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 19:34:14 2015 +0100
+
+ tests: increase verbosity of mini-dtls-record
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 14:05:51 2015 +0100
+
+ document the cipher override API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 13:47:03 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 13:42:55 2015 +0100
+
+ added test suite for overriden digests and MACs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 13:04:43 2015 +0100
+
+ Added API to register MAC and digest algorithms.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 11:46:06 2015 +0100
+
+ added test suite for overriden ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 11:44:26 2015 +0100
+
+ Added API to register AEAD and legacy ciphers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 11:30:44 2015 +0100
+
+ cryptodev: provide the new AEAD API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 10:34:47 2015 +0100
+
+ Added environment variable which can override automatic global initialization
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 10:09:34 2015 +0100
+
+ removed unused functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 10:07:09 2015 +0100
+
+ configure: fail compilation if the minimum required libtasn1 is not present
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 18 09:53:06 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 16 13:52:05 2015 +0100
+
+ tests: long-session-id uses the test framework
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 17 09:29:52 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 17 09:23:51 2015 +0100
+
+ depend on p11-kit 0.23.1 to conform to draft-pechanec-pkcs11uri-21
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 16 13:23:20 2015 +0100
+
+ tests: fixed shadowed variable in mini-dtls-record
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 16 11:38:56 2015 +0100
+
+ tests: use nanosleep for sleeping
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 14 08:41:33 2015 +0100
+
+ README-alpha: move valgrind to testing tools
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 14 08:40:29 2015 +0100
+
+ updated README-alpha
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 16:30:55 2015 +0100
+
+ Fixed handling of supplemental data with types > 255.
+
+ Patch by Thierry Quemerais.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 16:20:54 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 16:12:17 2015 +0100
+
+ gnutls_priority_init: document that priorities can be NULL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 13:30:12 2015 +0100
+
+ testpkcs11: disallow softhsm 2.0.0b1 from being used to test PKCS #11
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 13:24:18 2015 +0100
+
+ tests: mini-eagain2: call gnutls_handshake_set_timeout() at the proper time
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 10:10:23 2015 +0100
+
+ added libasan as dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 13 09:52:15 2015 +0100
+
+ corrected self test for 3DES
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 12 06:58:02 2015 +0100
+
+ pkcs11: correctly set the size of type
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 22:51:25 2015 +0100
+
+ pkcs11: combined the fill for object attributes set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 22:35:53 2015 +0100
+
+ pkcs11: only set ID and label when both size and data are set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 16:14:32 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 16:10:46 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 16:10:36 2015 +0100
+
+ p11tool: exit with non-zero reason if no objects are found
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 16:02:44 2015 +0100
+
+ tests: added checks for p11tool --set-id and --set-label
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 16:02:21 2015 +0100
+
+ p11tool: added --set-id and --set-label options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 14:49:04 2015 +0100
+
+ added gnutls_pkcs11_obj_set_info()
+
+ This function allows setting information such as the CKA_ID
+ and the CKA_LABEL of an object.
+
+ Resolves #1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 11 09:30:37 2015 +0100
+
+ Added check for GNUTLS-SA-2015-1
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 22:31:38 2015 +0100
+
+ tests: removed test with invalid DER encoding in chainverify
+
+ These certificates are now rejected earlier.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 22:31:03 2015 +0100
+
+ tests: added a check for certificates with invalid DER encodings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 22:19:33 2015 +0100
+
+ x509: use libtasn1's strict DER decoding rules in network obtained structures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 21:57:25 2015 +0100
+
+ depend on libtasn1 4.3
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 21:54:13 2015 +0100
+
+ minitasn1: updated to libtasn1 4.3
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 19:09:34 2015 +0100
+
+ rearranged internal documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 12:38:52 2015 +0100
+
+ tools: added ftp as a starttls protocol
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 9 12:38:01 2015 +0100
+
+ gnutls-cli: starttls and starttls-proto can't mix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 7 19:58:00 2015 +0100
+
+ expand on SECURE256 being an alias to SECURE192
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 7 13:10:53 2015 +0100
+
+ tests: do not run polarssl interop test on VIA
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 7 13:08:47 2015 +0100
+
+ use common license in all testcompat scripts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 7 11:47:19 2015 +0100
+
+ removed unused function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Mar 7 09:56:10 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 18:02:28 2015 +0100
+
+ README-alpha is README.md on repository
+
+ It contains information for developers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 18:00:41 2015 +0100
+
+ Revert "auto-generate README from README.md"
+
+ This reverts commit aff4b2151b42c6a59e490c3714d3e1e64d2921dd.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:36:15 2015 +0100
+
+ cleaned up licensing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:32:10 2015 +0100
+
+ auto-generate README from README.md
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:17:53 2015 +0100
+
+ Revert "added README.md as link to README"
+
+ This reverts commit 041d4f947eb6937d4af62eb35055668825c36833.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:17:26 2015 +0100
+
+ added README.md as link to README
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:15:41 2015 +0100
+
+ Revert "renamed README files"
+
+ This reverts commit 05b4fa46667d3f5972f6de6ac61ff959382c67a5.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:14:50 2015 +0100
+
+ renamed README files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 17:12:09 2015 +0100
+
+ README: converted to mark-down
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:58:37 2015 +0100
+
+ gnutls-cli-debug: corrected check of certificate chain order
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:52:01 2015 +0100
+
+ tests: added small test to verify that GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED succeeds with a single cert
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:42:40 2015 +0100
+
+ gnutls-cli-debug: disable unsupported TLS protocols as soon
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:30:42 2015 +0100
+
+ cli sockets: check for a digit prior using atoi
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:14:14 2015 +0100
+
+ gnutls-cli-debug: a cert list of size 1 is always sorted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 15:11:35 2015 +0100
+
+ gnutls-cli-debug: do not warn multiple times about unknown protocols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Mar 6 10:52:32 2015 +0100
+
+ updated documentation on FIPS140-2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 22:30:31 2015 +0100
+
+ tests: speed up testcompat check by remove less important options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 22:27:51 2015 +0100
+
+ tests: updated paths for softhsm detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 22:16:34 2015 +0100
+
+ README: mention nodejs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 21:04:58 2015 +0100
+
+ configure: check for /usr/share/dns/root.key as well for dns root key
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 21:03:20 2015 +0100
+
+ README: mention dependency on dns-root-data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 19:03:34 2015 +0100
+
+ tests: don't perform the overflow check in 32-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 18:46:44 2015 +0100
+
+ tests: date parsing test was modified to work in 32-bit systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 18:59:25 2015 +0100
+
+ certtool: in 32-bit systems use PRIu64 to print 64-bit values
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 18:56:34 2015 +0100
+
+ certtool: exit when there is an overflow in parsing days
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 11:40:17 2015 +0100
+
+ README: mention that openssl and polarssl will be used for interop testing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 10:40:20 2015 +0100
+
+ Revert "tests: increased the retries with datefudge cert generation"
+
+ This reverts commit a381fd148d2e181e19aad9ab9a9c5993080ce869.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 10:40:10 2015 +0100
+
+ Revert "tests: template-test: added a baseline check to detect slow systems"
+
+ This reverts commit b7ef1265810ec55d0912db2e3fa4204d8c412377.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 09:25:58 2015 +0100
+
+ tests: template-test: added a baseline check to detect slow systems
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Mar 5 08:09:54 2015 +0100
+
+ tests: increased the retries with datefudge cert generation
+
+ There are slow systems that are not always capable of generating the
+ certificate within a single second.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 23:25:56 2015 +0100
+
+ add bison as a dependency
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 22:45:09 2015 +0100
+
+ build documentation last
+
+ That allows the examples to depend on libgnu_gpl.la
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 20:50:37 2015 +0100
+
+ list unbound dependency for DANE
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 20:44:29 2015 +0100
+
+ tests: removed dane hosts which don't behave well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 20:37:32 2015 +0100
+
+ updated instructions for installed packages
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 17:24:20 2015 +0100
+
+ latex doc: updated copyright dates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 17:23:32 2015 +0100
+
+ updated copyright date
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 14:59:58 2015 +0100
+
+ use asn1_decode_simple_ber if available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 11:25:30 2015 +0100
+
+ corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 10:47:30 2015 +0100
+
+ mention libidn
+
+Author: Ilya V. Matveychikov <i.matveychikov@securitycode.ru>
+Date: Wed Mar 4 03:25:42 2015 +0300
+
+ asn1random.pl: generate simple tags only
+
+ Do not emit tags with numbers greater than or equal 31 as they must be
+ encoded an octet sequence (ref X.690-0207 # 8.1.2.4)
+
+ Signed-off-by: Ilya V. Matveychikov <i.matveychikov@securitycode.ru>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 10:07:01 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 22:24:23 2015 +0100
+
+ tests: added checks for invalid X.509 certificate signatures
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 08:20:35 2015 +0100
+
+ added the change of priority string NORMAL in documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Mar 4 08:15:16 2015 +0100
+
+ document the usage of a PKCS #11 trust module for verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 19:44:38 2015 +0100
+
+ tests: updated the suite to account for the removal of DSA by default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 18:52:22 2015 +0100
+
+ tests: updated the suite to account for the removal of DSA by default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 18:51:22 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 17:44:00 2015 +0100
+
+ cross-implementation test suite was relicensed to 3-clause BSD
+
+ That way the suite can be used by projects with other licenses.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 09:34:26 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Mar 3 09:31:16 2015 +0100
+
+ DSA signatures and DHE-DSS are disabled by default
+
+ DSA was an algorithm that was never deployed on the Internet
+ and had, until very recently, several limitations such as
+ restriction of its keys to 1024 bits, SHA1-only etc. Given
+ that there are literally 0 internet (HTTPS) certificates using
+ DSA, there is no point to enable it by default and increase
+ our attack surface.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Mar 2 08:12:28 2015 +0100
+
+ gnutls-cli: include AES_128_CCM in benchmark-ciphers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 28 12:55:09 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 28 12:22:10 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 28 09:43:16 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 28 09:33:12 2015 +0100
+
+ bundle inet_ntop in systems that don't have it
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 27 16:31:50 2015 +0100
+
+ updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 27 16:26:34 2015 +0100
+
+ removed gnutls_pubkey_get_verify_algorithm from abstract.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 26 13:03:35 2015 +0100
+
+ corrected typo in gnutls_handshake(), spotted by Andris Mednis
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 24 10:28:26 2015 +0100
+
+ doc update: document that session_get_data() must be used in non-resumed sessions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Feb 23 13:50:00 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 22 11:47:25 2015 +0100
+
+ added comments
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 22 11:39:49 2015 +0100
+
+ Use p11_kit_uri_get_pin_value() if available in p11-kit
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 12:00:13 2015 +0100
+
+ fixed handling of GNUTLS_E_INT_CHECK_AGAIN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:50:40 2015 +0100
+
+ removed unnecessary check and optimized function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:46:13 2015 +0100
+
+ corrected check which prevented client to sent an unacceptable for the version ciphersuite
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:40:50 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:38:49 2015 +0100
+
+ tests: mini-key-material: avoid memory leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:35:04 2015 +0100
+
+ tests: require DTLS 1.2 when using GCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:32:36 2015 +0100
+
+ handle GNUTLS_E_INT_CHECK_AGAIN
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 11:28:57 2015 +0100
+
+ check the negotiated TLS/DTLS version prior to offering a ciphersuite a server
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 10:57:14 2015 +0100
+
+ remove unnecessary assert
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 10:53:25 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 10:51:49 2015 +0100
+
+ tests: modified tests with obsolete APIs with their replacement API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:35:21 2015 +0100
+
+ doc: added deprecated functions into upgrade plan
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:35:01 2015 +0100
+
+ tests: added checks for gnutls_x509_crt_get_signature_algorithm and gnutls_x509_crt_get_preferred_hash_algorithm
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:25:24 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:24:13 2015 +0100
+
+ removed gnutls_pubkey_get_verify_algorithm() and unnecessary internal APIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:13:37 2015 +0100
+
+ removed gnutls_x509_crt_get_verify_algorithm()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 21 07:07:54 2015 +0100
+
+ removed gnutls_pubkey_verify_hash() and gnutls_pubkey_verify_data()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 23:47:25 2015 +0100
+
+ certtool: use unsigned for bits
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 23:46:35 2015 +0100
+
+ certtool/p11tool: avoid cast to function call
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 23:42:47 2015 +0100
+
+ certtool: allow specifying a purpose and a hostname for chain verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 22:17:15 2015 +0100
+
+ tests: added check for invalid X.509 certificate
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 17:09:57 2015 +0100
+
+ tests: added check for gnutls_record_get_state()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 17:09:34 2015 +0100
+
+ removed unused constants
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 16:58:41 2015 +0100
+
+ memcpy fix in gnutls_record_get_state
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 16:23:33 2015 +0100
+
+ removed ltmain.sh from root
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 11:18:45 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 11:16:44 2015 +0100
+
+ Added gnutls_record_get_state() and gnutls_record_set_state()
+
+ These functions allow to export the key material and sequence numbers.
+ That allows offloading the sending and receiving of individual records.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 11:13:55 2015 +0100
+
+ fixed sequence number copy
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 10:56:54 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 20 10:56:35 2015 +0100
+
+ gnutls_handshake_set_hook_function: will provide the raw handshake data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 18 23:04:24 2015 +0100
+
+ use explicit casts to unsigned int in the CURVE_TO_BITS et al
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 18 22:55:38 2015 +0100
+
+ use cast in _gnutls_hash_fast
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Feb 17 14:20:10 2015 +0100
+
+ when importing a certificate ensure that the signature parameters match
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Feb 14 18:02:01 2015 +0100
+
+ Allow AESNI GCM accelaration in x86
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Feb 6 20:22:42 2015 +0100
+
+ gnutls-cli: added --save-cert option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Feb 5 05:39:13 2015 +0100
+
+ added missing prototypes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Feb 4 10:14:55 2015 +0100
+
+ handle differently OCSP responses that are revoked and of unknown status
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Feb 1 13:35:40 2015 +0100
+
+ compilation fix with return on void function; reported by David Marx
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 29 14:31:08 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 29 14:21:18 2015 +0100
+
+ set the appropriate direction when _gnutls_io_write_flush() is called
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 28 10:32:16 2015 +0100
+
+ tests: added check for operation under different threads and DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 28 10:22:37 2015 +0100
+
+ tests: added check for operation under different processes and DTLS
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 28 09:57:13 2015 +0100
+
+ Revert "doc update"
+
+ This reverts commit eabf1f27d255577bad60d302abf46a969848fcd7.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 28 09:56:56 2015 +0100
+
+ Revert "Added gnutls_record_is_async()"
+
+ This reverts commit 2232822aabe473d124f924d64ff52981d685fd41.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 28 09:56:21 2015 +0100
+
+ documented using a session with fork or multiple threads
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 27 13:07:19 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 27 13:06:10 2015 +0100
+
+ Added gnutls_record_is_async()
+
+ That function indicates whether gnutls_record_recv() and
+ gnutls_record_send() can be used independently and in
+ parallel.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 25 10:17:06 2015 +0100
+
+ print errno in a more uniform way
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 25 08:28:13 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 25 08:27:08 2015 +0100
+
+ exported gnutls_system_recv_timeout()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 25 08:15:01 2015 +0100
+
+ simplified _gnutls_writev() by requiring the total length
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 20 09:39:44 2015 +0100
+
+ opencdk: small fixed to reduce warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 19 15:36:22 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 19 15:32:09 2015 +0100
+
+ don't be so verbose about the OCSP nonce; it is universally unsupported
+
+Author: Tim Rühsen <tim.ruehsen@gmx.de>
+Date: Sat Jan 17 14:32:35 2015 +0100
+
+ OCSP check the whole cert chain
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 19 09:29:31 2015 +0100
+
+ on certificate import check whether the two signature algorithms match
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 17 09:49:17 2015 +0100
+
+ cross.mk: use 3.3.12
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 17 09:01:37 2015 +0100
+
+ doc update
+
+Author: Luke Dashjr <luke-jr+git@utopios.org>
+Date: Mon Jan 12 19:32:38 2015 +0000
+
+ Added configure option --disable-tools
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 16 15:54:53 2015 +0100
+
+ corrected typos
+
+ Reported by Guido Kroon.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 16 14:16:58 2015 +0100
+
+ Added the notion of obsolete versions
+
+ That prevents using these versions as record version numbers, unless
+ they are the only protocol supported. This avoids the issues with
+ servers that have banned SSL 3.0 record versions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 16 10:16:47 2015 +0100
+
+ ocsptool: follow the documented process for gnutls_x509_crt_get_authority_info_access
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 16 10:15:08 2015 +0100
+
+ gnutls_x509_crt_get_authority_info_access: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 15 15:49:53 2015 +0100
+
+ ocsptool-common: iterate through all AIA items prior to decidig the OCSP server
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 14 08:11:17 2015 +0100
+
+ use a FIPS key that agree's with fedora's fipshmac
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Jan 14 22:51:55 2015 +0100
+
+ DCO: Added Luke Dashjr
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 13 22:47:59 2015 +0100
+
+ simplified text for inline-commands-prefix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 23:14:35 2015 +0100
+
+ gnutls-cli: added --starttls-proto option
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 17:28:50 2015 +0100
+
+ pkcs11: cleanup the name of types
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 17:19:48 2015 +0100
+
+ tests: updates in softhsm detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 17:12:56 2015 +0100
+
+ pkcs11: when importing a public key, import it's data as well (version 2 fix)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 17:02:03 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 11:50:53 2015 +0100
+
+ testpkcs11: do not ignore the failure to write a trusted CA
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 11:17:24 2015 +0100
+
+ removed gnutls_pubkey_get_pk_* from the exported function list
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 10:33:21 2015 +0100
+
+ tests: key-import-export: enhanced to test gnutls_pubkey_*_ecc_x962
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 10:32:13 2015 +0100
+
+ gnutls_pubkey_t: allow the import of another parameter set without a leak
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 12 10:19:47 2015 +0100
+
+ removed ABI-compatibility functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 9 13:59:34 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 22:41:01 2015 +0100
+
+ testpkcs11: modified to support both softhsmv1 and v2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 22:15:10 2015 +0100
+
+ pkcs11: when importing a public key, import it's data as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 18:00:38 2015 +0100
+
+ tests: enhanced key-import-export to check output of pubkeys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 16:25:01 2015 +0100
+
+ tests: eliminated leaks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 16:16:49 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 11 16:06:26 2015 +0100
+
+ tests: added checks for private key import/export functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 10 21:56:21 2015 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 10 12:13:29 2015 +0100
+
+ tests: Added test case for openpgp keys loaded by callback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 10 12:12:25 2015 +0100
+
+ When setting up TLS with cert-type OpenPGP from a client,
+ the server verifies if it supports the extension’s contents
+ in _gnutls_session_cert_type_supported(). This function
+ checks for cred->get_cert_callback but not cred->get_cert_callback2.
+ As a result, servers setup for OpenPGP certificate credential
+ callback with gnutls_certificate_set_retrieve_function2() are
+ unable to use the OpenPGP certificate type.
+
+ The solution is to consider cred->get_cert_callback2 alongside
+ cred->get_cert_callback in _gnutls_session_cert_type_supported().
+
+ Patch by Rick van Rein.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Jan 10 11:56:48 2015 +0100
+
+ gnutls_privkey_import_openpgp_raw: do not release the cached value
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Jan 8 10:18:07 2015 +0100
+
+ guile: Call 'load-extension' both during expansion and at run time.
+
+ Fixes <https://bugzilla.redhat.com/show_bug.cgi?id=1177847>.
+
+ * guile/modules/gnutls.in: Wrap '%libdir' definition and
+ 'load-extension' call in 'eval-when'.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 8 09:35:59 2015 +0100
+
+ When receiving a TLS record with multiple handshake packets, parse them in one go
+
+ That resolves:
+ https://savannah.gnu.org/support/?108712
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Jan 8 09:25:15 2015 +0100
+
+ tests: updated mini-dtls-record-asym
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 21:36:33 2015 +0100
+
+ tests: better documentation of mini-dtls-record-asym purpose
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 21:27:14 2015 +0100
+
+ tests: moved udp_socketpair to utils
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 21:22:02 2015 +0100
+
+ tests: corrected asymmetric MTU test for DTLS and added caching
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 17:32:44 2015 +0100
+
+ Added test case for DTLS handshake packet reconstruction when it exceeds MTU
+
+ https://savannah.gnu.org/support/?108712
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 17:18:57 2015 +0100
+
+ simplified _gnutls_dgram_read()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 13:39:19 2015 +0100
+
+ danetool: only compile when dane is enabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 10:17:14 2015 +0100
+
+ in DTLS don't combine multiple packets which exceed MTU
+
+ Resolves: https://savannah.gnu.org/support/?108715
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 10:01:47 2015 +0100
+
+ Added more precise check of push functions availability
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 09:59:33 2015 +0100
+
+ Revert "in DTLS don't use writev() when multiple packets which exceed MTU are queued"
+
+ This reverts commit 43082a67c7514d65301d157fb567a133138a85ab.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Jan 6 09:59:25 2015 +0100
+
+ Revert "Give precedence to vector push function"
+
+ This reverts commit cb4ea413569803cbbf291abb27d30d14bfa971c5.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 15:08:28 2015 +0100
+
+ Give precedence to vector push function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 15:08:28 2015 +0100
+
+ in DTLS don't use writev() when multiple packets which exceed MTU are queued
+
+ That change requires the system_write() to be registered unconditionally,
+ even when writev() is available.
+ Resolves: https://savannah.gnu.org/support/?108715
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 16:28:58 2015 +0100
+
+ tests: added check to ensure that DTLS handshake packets will not exceed MTU
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 16:21:57 2015 +0100
+
+ certtool: warn when setting a certificate's expiration longer than the CA's expiration
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 15:01:22 2015 +0100
+
+ testpkcs11: detect softhsm2
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Jan 5 14:40:51 2015 +0100
+
+ tests: account for disabling of ARCFOUR where needed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 23:19:33 2015 +0100
+
+ certtool: modified check for READ_NUMERIC
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 22:46:16 2015 +0100
+
+ certtool: use 64-bit type for CRL serial number
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 22:43:00 2015 +0100
+
+ certtool: check for overflows when reading serial numbers
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 20:44:21 2015 +0100
+
+ certtool: use int64_t as type for integers read
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 20:30:39 2015 +0100
+
+ gnutls-cli-debug: more precise handling of SMTP protocol
+
+ Patch by Andreas Metzler.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Jan 4 11:11:51 2015 +0100
+
+ updated gnulib
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Jan 2 12:49:55 2015 +0200
+
+ gnutls-cli-debug: corrected the skip of ignored checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 22:50:17 2014 +0200
+
+ use explicit casts in the dummy ip conversion functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 22:41:24 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 22:40:55 2014 +0200
+
+ ARCFOUR-128 is disabled by default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 22:38:51 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 16:53:57 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:48:06 2014 +0200
+
+ system-keys-win: use LoadLibraryA to load ncrypt.dll
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:23:04 2014 +0200
+
+ Updated abi-compliance-checker for 3.4 API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:17:51 2014 +0200
+
+ updated export symbols list (due to ABI breakage)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:15:16 2014 +0200
+
+ doc: updated auto-generated files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:09:41 2014 +0200
+
+ generate manpages for urls.h and system-keys.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:07:37 2014 +0200
+
+ tests: added check for gnutls_x509_trust_list_get_issuer_by_dn()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 12:00:11 2014 +0200
+
+ updated libgnutls.map for new functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 11:49:40 2014 +0200
+
+ doc: updated auto-generated files and added urls.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 11:17:55 2014 +0200
+
+ tests: added checks for the new --key-id and --fingerprint certtool options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 11:11:40 2014 +0200
+
+ certtool: Added --fingerprint and --key-id options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 10:00:11 2014 +0200
+
+ certtool: --pubkey-info will load a public key from stdin
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 09:40:03 2014 +0200
+
+ include netinet/in.h if present to access ipv6 related structures
+
+ Based on patch by Rumko.
+ https://savannah.gnu.org/support/?108713
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 09:34:24 2014 +0200
+
+ VERS-ALL adds all protocols if used with '+'
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 09:14:15 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 09:04:27 2014 +0200
+
+ priority strings VERS-TLS-ALL and VERS-DTLS-ALL are restricted to the corresponding protocols
+
+ That introduces VERS-ALL which behaves as VERS-TLS-ALL previously.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 31 08:49:13 2014 +0200
+
+ gnutls.h: made DTLS protocol version numbering distinct
+
+Author: Matthias-Christian Ott <ott@mirix.org>
+Date: Tue Dec 30 11:58:43 2014 +0200
+
+ Don't call _gnutls_cipher_encrypt2 with textlen = 0 in _gnutls_auth_cipher_encrypt2_tag
+
+ If the plaintext is shorter than the block size of the used cipher,
+ _gnutls_auth_cipher_encrypt2_tag calls _gnutls_cipher_encrypt2 with
+ textlen = 0. By definition _gnutls_cipher_encrypt2 does nothing in this
+ case and thus does not need to be called.
+
+Author: Matthias-Christian Ott <ott@mirix.org>
+Date: Tue Dec 30 11:57:36 2014 +0200
+
+ Handle zero length plaintext for VIA PadLock functions
+
+ If the plaintext is shorter than the block size of the used cipher,
+ _gnutls_auth_cipher_encrypt2_tag calls _gnutls_cipher_encrypt2 with
+ textlen = 0. padlock_ecb_encrypt and padlock_cbc_encrypt assume that the
+ plaintext length (last parameter) is greater than zero and segfault
+ otherwise. The assembler code for both functions is automatically
+ generated and imported from OpenSSL, so to ease maintenance the length
+ should be validated in the functions that call padlock_ecb_encrypt or
+ padlock_cbc_encrypt.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 13:29:57 2014 +0200
+
+ use backslashes in windows path
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 11:14:47 2014 +0200
+
+ tests: enhanced openpgp-keyring test
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 11:13:10 2014 +0200
+
+ openpgp: properly print names in oneline output as well
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 11:11:18 2014 +0200
+
+ updates in openpgp DSA key printing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 10:59:23 2014 +0200
+
+ properly print openpgp names
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 10:47:37 2014 +0200
+
+ opencdk: print all warnings on compilation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 10:47:20 2014 +0200
+
+ opencdk: eliminated warning from armor.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 28 10:45:30 2014 +0200
+
+ removed cache support for opencdk's keydb
+
+ It's implementation looked buggy.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 27 22:41:53 2014 +0200
+
+ updated guile comments
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 25 00:16:17 2014 +0200
+
+ tools: use OCSP functions only when OCSP is enabled
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 24 19:08:54 2014 +0200
+
+ Corrected encoding and decoding of ANSI X9.62
+
+ That affects gnutls_pubkey_export_ecc_x962() and
+ gnutls_pubkey_import_ecc_x962().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 24 18:34:04 2014 +0200
+
+ tools: document the available curves
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 24 08:54:19 2014 +0200
+
+ PKCS #11 tests: ported to softhsmv2
+
+ The C programs still rely on softhsmv1 since there
+ are issues with softhsmv2 and CKA_TRUSTED.
+ https://bugzilla.redhat.com/show_bug.cgi?id=1177086
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 18:33:22 2014 +0200
+
+ updated documentation of gnutls_memcmp()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 13:41:35 2014 +0200
+
+ use everywhere the new name of gnutls_x509_crt_import_pkcs11_url
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 13:29:13 2014 +0200
+
+ better cleanup in gnutls_pkcs11_privkey_import_url and allow reuse
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 12:54:23 2014 +0200
+
+ completely separated the two gnulibs to avoid conflicts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 12:40:17 2014 +0200
+
+ updated gnulib
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 12:28:03 2014 +0200
+
+ dropped the sanitize URL approach
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 12:24:35 2014 +0200
+
+ Instead of sanitizing URLs, use hints to support incomplete PKCS#11 URIs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 12:04:45 2014 +0200
+
+ gnutls_x509_crt_import_url replaces gnutls_x509_crt_import_pkcs11_url
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 23 08:52:24 2014 +0200
+
+ use p11_kit_uri_get_pin_source instead of p11_kit_uri_get_pinfile
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 22 12:16:05 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 22 11:59:41 2014 +0200
+
+ ex-pkcs11-list.c: updated for new API
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 22 11:43:49 2014 +0200
+
+ combined gnutls_pkcs11_obj_attr_t with gnutls_pkcs11_obj_flags
+
+ That was done in an API-backwards compatible way. That
+ introduces gnutls_pkcs11_obj_list_import_url3() and
+ gnutls_pkcs11_obj_list_import_url4().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 21 20:33:22 2014 +0200
+
+ first attempt to unify obj_attrs with obj_flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 21 19:33:53 2014 +0200
+
+ tests: pkcs11-is-known checks whether the import of PKCS #11 objects as trusted certs works
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 21 13:16:17 2014 +0200
+
+ Added softhsm.h to share code in softhsm detection
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Dec 21 13:00:53 2014 +0200
+
+ Directly import PKCS #11 object URLs as trusted certificates
+
+ That is, don't treat them as trusted modules, because they aren't
+ a token URL, but rather a direct reference to specific objects.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 20 20:37:35 2014 +0200
+
+ PSK: added sanity check on PSK key size set
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 12:56:11 2014 +0200
+
+ gnutls-cli-debug: removed ARCFOUR-40 from the ciphers to use
+
+ It is no longer supported.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 12:07:17 2014 +0200
+
+ _gnutls_buffer_append_data returns zero on success
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 10:40:58 2014 +0200
+
+ corrected documentation for the cork/uncork functions
+
+ Reported by Jaak Ristioja.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 10:35:10 2014 +0200
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 10:25:40 2014 +0200
+
+ Added more precise version check in _gnutls_version_lowest
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 19 08:56:44 2014 +0200
+
+ corrected documentation of gnutls_cork()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 17 14:50:52 2014 +0200
+
+ Added 32-bit overflow protection in _gnutls_buffer_append_data()
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Wed Dec 17 13:55:10 2014 +0200
+
+ Remove redundant condition in align_allocd_with_data().
+
+ At all call-sites of align_allocd_with_data() dest->data is non-NULL.
+
+ Signed-off-by: Jaak Ristioja <jaak.ristioja@cyber.ee>
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Wed Dec 17 13:55:09 2014 +0200
+
+ Deduplicated some code in _gnutls_buffer_append_data().
+
+ Signed-off-by: Jaak Ristioja <jaak.ristioja@cyber.ee>
+
+Author: Jaak Ristioja <jaak.ristioja@cyber.ee>
+Date: Wed Dec 17 13:55:07 2014 +0200
+
+ Explicitly marked some variables const in _gnutls_buffer_append_data().
+
+ Signed-off-by: Jaak Ristioja <jaak.ristioja@cyber.ee>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 17 14:37:31 2014 +0200
+
+ DCO: added Jaak Ristioja
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 16 22:36:17 2014 +0200
+
+ test-ciphers: do not fail on processor which don't have the AES-NI instructions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 16 15:39:24 2014 +0100
+
+ _gnutls_buffer_*: moved common operations to function
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 16 15:35:10 2014 +0100
+
+ _gnutls_buffer_append_data: moved common code outside the if-clause
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 12 18:42:04 2014 +0100
+
+ tests: disable SSL 3.0 checks with polarssl
+
+ It seems that SSL 3.0 is disabled in Debian's polarssl.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 12 18:41:50 2014 +0100
+
+ testdane: removed www.vulcano.cl from good hosts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 4 14:26:05 2014 +0100
+
+ tests: enhanced x509cert-tl
+
+ Verify gnutls_x509_trust_list_verify_crt2() in combination with
+ gnutls_x509_trust_list_add_named_crt().
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 4 14:21:46 2014 +0100
+
+ use gnutls_x509_trust_list_verify_named_crt in gnutls_x509_trust_list_verify_crt2
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Fri Dec 12 14:24:14 2014 +0100
+
+ Update 'NEWS'.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 12 09:35:29 2014 +0100
+
+ gnutls_rnd: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 12 08:48:24 2014 +0100
+
+ gnutls_pkcs12_simple_parse: doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 12 08:26:53 2014 +0100
+
+ improved documentation on dane
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Dec 11 19:06:18 2014 +0100
+
+ guile: Open binary file in binary mode, for the sake of MinGW.
+
+ Reported by Eli Zaretskii <eliz@gnu.org>.
+
+ * guile/tests/openpgp-keyring.scm: Use 'open-file' with "rb" instead of
+ 'open-input-file'.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Dec 11 19:04:17 2014 +0100
+
+ guile: Link with '-no-undefined'.
+
+ Fixes builds on MinGW.
+ Reported by Eli Zaretskii <eliz@gnu.org>.
+
+ * guile/src/Makefile.am (guile_gnutls_v_2_la_LDFLAGS): Add
+ -no-undefined.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 19:03:28 2014 +0100
+
+ p11tool: use Sleep() in windows
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 19:01:16 2014 +0100
+
+ certtool: ensure that default_serial_int is 64-bits or more
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 18:59:27 2014 +0100
+
+ use select() instead of alarm for better portability
+
+ Based on patch by Eli Zaretskii.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 18:53:21 2014 +0100
+
+ cross.mk: updated for 3.3.11
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 10:15:54 2014 +0100
+
+ Allow a random generator with the same priority to re-register
+
+ That corrects an issue where the library is deinitialized, and
+ reinitialization wouldn't register the same rnd module.
+ Reported by Stanislav Zidek.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 09:27:58 2014 +0100
+
+ tests: x509cert: verify that length returned from gnutls_x509_crt_get_dn matches strlen
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 11 06:08:33 2014 +0100
+
+ testcompat: corrected usage of null cipher
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 10 15:40:49 2014 +0100
+
+ added the .check function in FIPS140-2 code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Dec 8 23:30:07 2014 +0100
+
+ corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 10:48:52 2014 +0100
+
+ configure: added option --without-idn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 10:46:24 2014 +0100
+
+ accelerated: added required casts
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 10:40:48 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 10:40:09 2014 +0100
+
+ the priority string EXPORT is no more
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 10:27:00 2014 +0100
+
+ aesni-ccm: removed unused struct entries
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 09:41:08 2014 +0100
+
+ added AESNI accelerated CCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Dec 6 09:33:20 2014 +0100
+
+ more nettle3 related changes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 19:58:42 2014 +0100
+
+ dane: use the new _gnutls_buffer_to_datum
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 10:36:34 2014 +0100
+
+ tests: corrected the expected lengths in ocsp
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 10:31:41 2014 +0100
+
+ _gnutls_buffer_to_datum: includes code for exporting strings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 10:04:50 2014 +0100
+
+ when the trusted list contains a non-CA certificate warn via the audit log
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 09:52:40 2014 +0100
+
+ modified the CCM ciphersuite's name to match the one in the IANA registry
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 09:52:14 2014 +0100
+
+ ciphersuite test: enhanced check for correct ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 09:35:46 2014 +0100
+
+ ciphersuites tests: add missing includes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Dec 5 09:00:04 2014 +0100
+
+ ciphersuite tests: define HAVE_CONFIG_H
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Dec 4 22:15:57 2014 +0100
+
+ guile: Build with warnings.
+
+ * guile/src/Makefile.am (AM_CFLAGS) [HAVE_GCC]: Add -Wall -Wextra
+ -Wno-unused-parameter.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Dec 4 22:14:57 2014 +0100
+
+ guile: Remove the deprecated priority API.
+
+ * guile/modules/gnutls/build/priorities.scm: Remove.
+ * guile/src/make-session-priorities.scm: Remove.
+ * guile/modules/Makefile.am (EXTRA_DIST): Adjust accordingly.
+ * guile/src/Makefile.am (EXTRA_DIST): Likewise.
+ (GENERATED_BINDINGS): Remove 'priorities.i.c'.
+ (priorities.i.c): Remove target.
+ * guile/src/core.c: Don't include it.
+ (scm_gnutls_set_default_priority_x): Remove.
+ * guile/modules/gnutls.in (gnutls): Adjust export list.
+ * guile/tests/session-record-port.scm: Use 'set-session-priorities!'.
+ * guile/tests/x509-auth.scm: Likewise.
+
+Author: Ludovic Courtès <ludo@gnu.org>
+Date: Thu Dec 4 22:15:16 2014 +0100
+
+ guile: Remove RSA parameters and related procedures.
+
+ * guile/modules/gnutls/build/smobs.scm (%rsa-parameters-smob): Remove.
+ (%gnutls-smobs): Remove it.
+ * guile/src/core.c (scm_gnutls_make_rsa_parameters,
+ scm_gnutls_pkcs1_import_rsa_parameters,
+ scm_gnutls_pkcs1_export_rsa_parameters,
+ scm_gnutls_set_certificate_credentials_rsa_export_params_x): Remove.
+ * guile/modules/gnutls.in: Adjust export list.
+ * guile/tests/openpgp-auth.scm (import-rsa-params): Remove.
+ Remove references to it and to
+ 'set-certificate-credentials-rsa-export-parameters!'.
+ * guile/tests/x509-auth.scm: Likewise.
+ * doc/gnutls-guile.texi (Representation of Binary Data): Remove
+ references to RSA parameters. Adjust example accordingly.
+ (OpenPGP Authentication Guile Example): Likewise.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 4 16:05:58 2014 +0100
+
+ updated TODO list
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Dec 4 14:39:03 2014 +0100
+
+ removed several of the unneeded exported internal symbols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 10:53:25 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 10:39:51 2014 +0100
+
+ doc: corrected typo
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 20:21:52 2014 +0100
+
+ use unsigned long in gcm_cast_st
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 15:43:55 2014 +0100
+
+ corrected issue in AES-256-GCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 15:20:07 2014 +0100
+
+ tests: enhanced cipher check to include all ciphers.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 14:56:27 2014 +0100
+
+ simplified abstractions over nettle based on Niels' comments.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 11:21:29 2014 +0100
+
+ API doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 11:20:26 2014 +0100
+
+ Added test vectors for CCM mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 26 10:27:23 2014 +0100
+
+ CCM: corrected AEAD decryption
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 20:27:05 2014 +0100
+
+ CCM mode moved to the lowest priority
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 19:42:10 2014 +0100
+
+ aes-gcm-aead.h: generalized
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 17:57:15 2014 +0100
+
+ gnutls-cli: added benchmark for CCM
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 17:46:55 2014 +0100
+
+ tests: updated for AES-128-CCM ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 17:27:03 2014 +0100
+
+ use the new AEAD API in gnutls_cipher.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 17:04:25 2014 +0100
+
+ Added definitions for CCM ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 16:02:25 2014 +0100
+
+ Modified crypto backend to accomodate for the CCM ciphersuites
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 10:54:55 2014 +0100
+
+ More nettle2 updates (in FIPS140-2 mode)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 22:58:41 2014 +0100
+
+ ported to nettle 3.0
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 10:10:05 2014 +0100
+
+ reduced current soversion
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 10:06:32 2014 +0100
+
+ documented the removal of deprecated functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:53:52 2014 +0100
+
+ corrected comparison
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:49:24 2014 +0100
+
+ removed the old gnutls_retr_st compatibility functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:45:19 2014 +0100
+
+ Removed binary compatibility with RSA-EXPORT using applications
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:41:33 2014 +0100
+
+ removed the old priority functions
+
+ That is:
+ gnutls_cipher_set_priority
+ gnutls_mac_set_priority
+ gnutls_compression_set_priority
+ gnutls_kx_set_priority
+ gnutls_protocol_set_priority
+ gnutls_certificate_type_set_priority
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:37:55 2014 +0100
+
+ removed gnutls_x509_crt_verify_hash() and gnutls_x509_crt_verify_data()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:35:26 2014 +0100
+
+ gnutls_sign_callback_set() and gnutls_sign_callback_get() were removed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:32:21 2014 +0100
+
+ renumbered fields in gnutls.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Dec 3 09:28:10 2014 +0100
+
+ increased gnutls' soversion
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Dec 2 10:50:45 2014 +0100
+
+ if the rnd structure doesn't provide check, _gnutls_rnd_check() will succeed
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 30 22:17:31 2014 +0100
+
+ tests: Added check for verification using CRLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 30 21:44:10 2014 +0100
+
+ Reorganized, and eliminated memory leak in _gnutls_x509_crt_check_revocation()
+
+ Reported by Tim Rühsen.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 29 15:27:34 2014 +0100
+
+ systemkey: updated for new gnutls_system_key_iter_get_info
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 16:16:19 2014 +0100
+
+ gnutls_system_key_iter_get_info() allows restricting results to a specific certificate type
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 16:12:31 2014 +0100
+
+ removed unneeded variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 14:39:58 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 13:18:49 2014 +0100
+
+ doc: added recommendation to use the higher level functions to load keys
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 10:40:34 2014 +0100
+
+ certtool: avoid gcc warnings
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 11:47:56 2014 +0100
+
+ gnutls-cli-debug: Added check for whether %NO_EXTENSIONS is required
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 10:32:22 2014 +0100
+
+ gnutls_session_get_desc: allow proper printing of the NULL KX
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 28 09:30:04 2014 +0100
+
+ gnutls_session_get_desc will return NULL if initial negotiation is not complete
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 23:17:29 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 23:16:04 2014 +0100
+
+ tests: small fix in mini-chain-unsorted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 22:39:08 2014 +0100
+
+ GNUTLS_E_CERTIFICATE_LIST_UNSORTED can be returned from gnutls_pcert_import_x509_list
+
+ That is when it cannot sort the list and GNUTLS_X509_CRT_LIST_SORT is specified.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 16:28:10 2014 +0100
+
+ gnutls_pcert_import_x509_list: only sort the lists it can sort
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 16:12:33 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 16:10:44 2014 +0100
+
+ simplified windows URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 16:08:46 2014 +0100
+
+ system-keys-win: include urls.h
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 16:06:46 2014 +0100
+
+ tests: added mini-chain-unsorted
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 27 15:06:11 2014 +0100
+
+ Added flag GNUTLS_X509_CRT_LIST_SORT for gnutls_x509_crt_list_import*
+
+ That also allows automatically sorting input chains to the
+ gnutls_certificate_credentials_t structure.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 21:53:03 2014 +0100
+
+ tests: Added check for memory leaks when a file cannot be loaded.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 21:52:23 2014 +0100
+
+ gnutls_certificate_set_x509_key_*: eliminated memory leak when certificate could not be parsed
+
+ Reported by Georg Richter.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 25 20:33:15 2014 +0100
+
+ libdane: undef gnutls_assert() before redefining it
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 22:39:23 2014 +0100
+
+ gnutls-cli-debug: do not print error on unknown protocols
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 20:22:35 2014 +0100
+
+ tests: added leak check for gnutls_set_x509_key_mem2()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 19:16:42 2014 +0100
+
+ documented the limitations of the loading functions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 18:54:28 2014 +0100
+
+ corrected memleak in read_key_mem()
+
+ Patch by Georg Richter.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 13:27:09 2014 +0100
+
+ gnutls-cli-debug: Added check for sorted certificate chain
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 24 10:40:24 2014 +0100
+
+ do not allow the resumption of a session which switches the state of ext_master_secret
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 22:23:55 2014 +0100
+
+ tests: run rfc2253-escape-test under valgrind
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 19:43:44 2014 +0100
+
+ tests: enhanced custom-url check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 19:43:01 2014 +0100
+
+ sanitize URLs at the proper place
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 19:42:43 2014 +0100
+
+ corrected freeing of custom URL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 13:03:50 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 12:43:27 2014 +0100
+
+ Added memxor_different_alignment into suppressions
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 12:36:22 2014 +0100
+
+ Allow the construction of chains with custom URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 11:04:47 2014 +0100
+
+ updated ignored files
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 11:04:15 2014 +0100
+
+ renamed systemkey-tool to systemkey, and don't install it by default
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 10:51:30 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 10:49:59 2014 +0100
+
+ tests: added check for registration of custom URLs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 10:49:32 2014 +0100
+
+ export gnutls_register_custom_url
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 10:48:56 2014 +0100
+
+ correctly handle non-pkcs11 URLs in read_cert_url
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 09:30:29 2014 +0100
+
+ more files to ignore
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 09:11:38 2014 +0100
+
+ Added the ability to register application specific URLs for keys and certs
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 23 08:47:41 2014 +0100
+
+ system-keys-win: use macros for the URL
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 22 10:49:52 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 20:42:21 2014 +0100
+
+ tests: added test for GNUTLS_E_GOT_APPLICATION_DATA on rehandshake
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 20:18:08 2014 +0100
+
+ treat GNUTLS_E_GOT_APPLICATION_DATA as non-fatal if initial negotiation is complete
+
+ This corrects a regression introduced in b5a0de2e6da98866cafb770c3141b7353d030ab2
+ Reported by Dan Winship. https://savannah.gnu.org/support/?108690
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 16:48:45 2014 +0100
+
+ removed old news
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 16:10:33 2014 +0100
+
+ The record version in the client Hello will be set to the lowest supported protocol
+
+ There should have been no harm in keeping it SSL 3.0 but
+ unfortunately in draft-thomson-sslv3-diediedie-00
+ it has been marked as MUST NOT do that. That will be fixed in a later
+ revision but since then there are servers not accepting SSL 3.0
+ as a valid record version (note that this is about the record
+ version, which describes the format of the packet, nothing to
+ do with the negotiated version).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 15:41:25 2014 +0100
+
+ Revert "The priority modifier %LATEST_RECORD_VERSION is now the default"
+
+ This reverts commit 66c419cc6336ea9a2747574588ffee77458b838f.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 15:02:40 2014 +0100
+
+ deinitialize the OCSP response der data
+
+ That also makes sure that reinitialization of ASN1 structures
+ are done when it is required only.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 14:48:50 2014 +0100
+
+ gnutls_priority_string_list: allow printing the special keywords as well.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 21 14:18:15 2014 +0100
+
+ simplified code involving getrandom() and getentropy()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 20 10:36:23 2014 +0100
+
+ configure: detect android system and define a variable
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 20 10:35:26 2014 +0100
+
+ separated system-keys implementations
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 20 22:52:43 2014 +0100
+
+ removed redundant local
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 20 00:15:02 2014 +0100
+
+ tests: added check for the abbreviated URLs which don't contain object information
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 20 00:13:45 2014 +0100
+
+ prior to importing objects with URLs sanitize them
+
+ That allows to use out of band information to complete missing
+ parts in URLs (e.g., object-type=cert, when there is a certificate).
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 19 23:53:50 2014 +0100
+
+ compilation fixes
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 19 11:28:38 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 7 16:14:08 2014 +0100
+
+ Added API to read/write/delete key-cert pairs (limited to windows for now)
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 17 20:26:26 2014 +0100
+
+ NORMAL priority: prioritize the less than 256-bits curves at the lowest level
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 17 18:21:48 2014 +0100
+
+ certtool: Allow to set the nonRepudiation, keyAgreement and dataEncipherment flags
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 17 18:09:36 2014 +0100
+
+ list the OIDs in the certtool cfg file documentation
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sun Nov 16 18:27:01 2014 +0100
+
+ properly reset the zombie mode in FIPS mode
+
+ This amends 9158f590f4a18c84fc9eb41877b29d73b30af879
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 15 10:06:12 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 22:17:42 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 22:16:09 2014 +0100
+
+ partially reverted 999d221fd2241ff73f884bf33d8cbe6eb8299184
+
+ That change allows to use the intermediate certificates in chains
+ as OCSP anchors.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 21:21:53 2014 +0100
+
+ certtool: print message when the system trust is used
+
+Author: David Weber <dave@veryflatcat.com>
+Date: Fri Nov 14 14:49:24 2014 +0200
+
+ Fixed SRTP profile configuration in cli.c and serv.c.
+
+ I have tested the fix in 3.3.10. This commit is UNTESTED as i am unable
+ to compile gnutls (./configure complains about gl_INIT and ggl_INIT).
+
+ Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 20:13:36 2014 +0100
+
+ tests: ocsp: added the signature in check
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 20:10:06 2014 +0100
+
+ only print about additional certificates if they are present
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 17:22:07 2014 +0100
+
+ ocsp: fix DN decoding in gnutls_ocsp_resp_get_responder_raw_id
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 11:42:42 2014 +0100
+
+ tests: ocsp: added check with a long response
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 16:17:58 2014 +0100
+
+ use the original DER/BER data when verifying an OCSP response
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 11:55:21 2014 +0100
+
+ _pkcs1_rsa_verify_sig() simplify hashing
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 11:42:15 2014 +0100
+
+ ocsp: eliminated duplicate code
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 11:05:18 2014 +0100
+
+ clarified the multiple paths printing of the verify options
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 10:53:31 2014 +0100
+
+ gnutls-cli: allow printing the certificates in OCSP responses when --print-cert is specified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 10:47:55 2014 +0100
+
+ updated OCSP verification code to better use the trust list, and the KeyHash
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 09:34:13 2014 +0100
+
+ OCSP printing: Add header in front of certificates
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 09:32:40 2014 +0100
+
+ added gnutls_pkcs11_get_raw_issuer_by_dn and gnutls_x509_trust_list_get_issuer_by_dn
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 07:57:19 2014 +0100
+
+ gnutls-cli-debug: check for OCSP status response
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 14 07:45:49 2014 +0100
+
+ corrected crq test case; reported by Andreas Metzler
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 20:56:27 2014 +0100
+
+ set the GNUTLS_PIN_CONTEXT_SPECIFIC flag on PIN callback
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 16:31:21 2014 +0100
+
+ replaced gnutls_ocsp_resp_get_responder_by_key with gnutls_ocsp_resp_get_responder_raw_id
+
+ In addition reverted gnutls_ocsp_resp_get_responder() to the old
+ buggy behavior of returning 0 if the element was missing.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 16:05:44 2014 +0100
+
+ certtool: make sure that GNUTLS_PKCS_PLAIN is set when no password should be asked
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 16:05:21 2014 +0100
+
+ gnutls_x509_privkey_import2: will not use a callback if GNUTLS_PKCS_PLAIN is specified
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:55:50 2014 +0100
+
+ the FIPS140-2 testing mode is disabled after self-checks
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:50:05 2014 +0100
+
+ updated OCSP tests to account for the new key ID
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:43:04 2014 +0100
+
+ doc update and gnutls_ocsp_resp_get_responder() will always initialized output data
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:38:34 2014 +0100
+
+ _rnd_get_event: use memset to avoid valgrind complaints
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:34:23 2014 +0100
+
+ gnutls-cli: print the OCSP response in verbose mode
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 15:30:55 2014 +0100
+
+ corrected documentation of OCSP response verification
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 14:39:41 2014 +0100
+
+ Added gnutls_ocsp_resp_get_responder_by_key()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 14:39:07 2014 +0100
+
+ dn parsing: return GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE when DN is not available
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 14:12:15 2014 +0100
+
+ gnutls-cli: added option to save the OCSP response
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 12:06:32 2014 +0100
+
+ added the notion of preferred sign algorithm in a private key
+
+ This can be set for keys imported with gnutls_privkey_import_ext3()
+ with the info callback. It is only considered for client side keys
+ in TLS sessions.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 10:18:03 2014 +0100
+
+ Added priority string %NO_SESSION_HASH to prevent advertising the extended master secret extension
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 10:06:51 2014 +0100
+
+ certificate status requestion response is optional according to RFC6066
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 09:52:43 2014 +0100
+
+ Added flag GNUTLS_OCSP_SR_IS_AVAIL for gnutls_ocsp_status_request_is_checked
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 09:27:38 2014 +0100
+
+ rnd: removed the packed attribute from event_st
+
+ That prevents a SIGBUS on solaris sparc systems.
+ Reported by Thomas Thorberger.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 09:18:31 2014 +0100
+
+ The priority modifier %LATEST_RECORD_VERSION is now the default
+
+ This works-around issue with servers that forbit the SSL 3.0
+ version number from the first packet of the record protocol.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Thu Nov 13 09:16:29 2014 +0100
+
+ added check for servers that disallow the SSL 3.0 record version
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 12 19:44:18 2014 +0100
+
+ gnutls-cli: print whether status request has been checked
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 12 16:14:55 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Wed Nov 12 15:44:53 2014 +0100
+
+ Enable PIN support to gnutls_x509_privkey_t
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 11 15:16:12 2014 +0100
+
+ _gnutls_ucs2_to_utf8() can handle little endian strings.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 11 11:25:57 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 11 11:25:44 2014 +0100
+
+ Added gnutls_memcmp() and exported it.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 11 10:47:56 2014 +0100
+
+ indentation fix
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Tue Nov 11 10:40:21 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 7 16:05:10 2014 +0100
+
+ added gnutls_pkcs12_bag_set_privkey()
+
+ Conflicts:
+ lib/libgnutls.map
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 10 12:59:39 2014 +0100
+
+ dropped unused copy_func
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Mon Nov 10 11:38:58 2014 +0100
+
+ silence warning
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 31 10:08:00 2014 +0100
+
+ Added check with the invalid crq sent by Sean Burford
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Oct 31 10:00:32 2014 +0100
+
+ when exporting curve coordinates to X9.63 format, perform additional sanity checks on input
+
+ Reported by Sean Burford.
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 8 09:06:36 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 8 08:38:44 2014 +0100
+
+ doc update
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 8 08:36:16 2014 +0100
+
+ exported gnutls_memset()
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat Nov 8 08:35:01 2014 +0100
+
+ doc: updated text on session tickets
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 7 21:46:58 2014 +0100
+
+ tools: include arpa/inet.h in socket.c
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 7 19:18:22 2014 +0100
+
+ doc: use the same port for DTLS client and server
+
+Author: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Fri Nov 7 19:01:57 2014 +0100
+
+ pkcs11: pass the correct user type to protected authentication login