Check-in [74804ed748]
Bounty program for improvements to Tcl and certain Tcl packages.
Overview
Comment: * README.txt: added notes about need to use 8.2.0+.
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1: 74804ed7487b817830668bd81d8cedaf3c99d942
User & Date: hobbs on 2000-08-15 18:49:07
Other Links: manifest | tags
Context
2000-08-15
18:49
* tlsInt.h: * tls.c: * tlsIO.c: corrected structure initialization to work when compiling with 8.2. Now compiles with 8.2+ and tested to work with 8.2+ and dynamically adjust to the version of Tcl it was loaded into. TLS will fail the test suite with Tcl 8.2-8.3.1. check-in: e7ef654f47 user: hobbs tags: trunk
18:49
* README.txt: added notes about need to use 8.2.0+. check-in: 74804ed748 user: hobbs tags: trunk
18:45
* tests/all.tcl: added catch around ::tcltest::normalizePath because it doesn't exist in pre-8.3 tcltest. check-in: a0a66662a3 user: hobbs tags: trunk
Changes

Modified README.txt from [b7a2709a82] to [b10c949569].

     1      1   Copyright (C) 1997-2000 Matt Newman <[email protected]>
            2  +TLS 1.4 Copyright (C) 2000 Ajuba Solutions
     2      3   
     3         -$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.1.1.1 2000/01/19 22:10:58 aborr Exp $
            4  +$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.2 2000/08/15 18:49:07 hobbs Exp $
            5  +
            6  +TLS (aka SSL) Channel - can be layered on any bi-directional Tcl_Channel.
     4      7   
     5         -TLS (aka SSL) Channel - can be layered on any bi-directional
     6         -Tcl_Channel (Note: Requires Trf Core Patch)
            8  +Both client and server-side sockets are possible, and this code should work
            9  +on any platform as it uses a generic mechanism for layering on SSL and Tcl.
     7     10   
     8         -Both client and server-side sockets are possible, and this code
     9         -should work on any platform as it uses a generic mechanism for
    10         -layering on SSL and Tcl.
           11  +The TLS 1.4 release requires Tcl 8.2.0+, with 8.3.2+ preferred.  The
           12  +stacked channel implementation in Tcl was originally introduced in 8.2.0
           13  +(previously the Trf patch) and rewritten for 8.3.2+ due to inherent
           14  +limitations in the earlier implementation.  TLS 1.4 should compile with
           15  +any stubs-capable Tcl interpreter, but will require 8.2+ when loaded.
           16  +There are known limitations in the 8.2.0-8.3.1 stacked channel
           17  +implementation, so it is encouraged that people use TLS 1.4+ with an
           18  +8.3.2+ Tcl interpreter.
    11     19   
    12     20   Full filevent sematics should also be intact - see tests directory for
    13     21   blocking and non-blocking examples.
    14     22   
    15     23   This was built (almost) from scratch based upon observation of OpenSSL 0.9.2B
    16     24   
    17     25   Addition credit is due for Andreas Kupries ([email protected]), for
................................................................................
    18     26   providing the Tcl_ReplaceChannel mechanism and working closely with me
    19     27   to enhance it to support full fileevent semantics.
    20     28   
    21     29   Also work done by the follow people provided the impetus to do this "right":-
    22     30   tclSSL (Colin McCormack, Shared Technology)
    23     31   SSLtcl (Peter Antman)
    24     32   
    25         -This code is licensed until the same terms as the Tcl Core.
           33  +This code is licensed under the same terms as the Tcl Core.
    26     34   
    27     35   I would also like to acknowledge the input of Marshall Rose, who convinced 
    28     36   me that people need to be able to switch-to-encrypted mode part way
    29     37   through a conversation.
    30     38   
    31     39   Also I would like to acknowledge the kind support of Novadigm Inc, my
    32     40   current employer, which made this possible.
    33     41   
    34     42   
    35     43   Matt Newman