Check-in [ea64ff013f]
Bounty program for improvements to Tcl and certain Tcl packages.
Overview
Comment:see changes
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk | tls-1-4-1
Files: files | file ages | folders
SHA1: ea64ff013f048351c30cb08414d00b8be998820a
User & Date: hobbs on 2001-06-21 23:34:20
Other Links: manifest | tags
Context
2002-02-04
22:45
updated to load tls from build dir check-in: 0efce5e54e user: hobbs tags: trunk
2001-06-21
23:34
see changes check-in: ea64ff013f user: hobbs tags: trunk, tls-1-4-1
23:34
moved to patchlevel 1.4.1 check-in: 55d3a9dbda user: hobbs tags: trunk
Changes

Modified ChangeLog from [9d7c1d4605] to [d1a7a7f0bf].

            1  +2001-06-21  Jeff Hobbs  <[email protected]>
            2  +
            3  +	* configure: added configure to CVS
            4  +	* configure.in: moved to patchlevel 1.4.1
            5  +
            6  +	* Makefile.in: corrected 'dist' target
            7  +
            8  +	* tests/certs/file.srl:
            9  +	* tests/certs/ca.pem:
           10  +	* tests/certs/client.key:
           11  +	* tests/certs/client.pem:
           12  +	* tests/certs/client.req:
           13  +	* tests/certs/privkey.pem:
           14  +	* tests/certs/server.key:
           15  +	* tests/certs/server.pem:
           16  +	* tests/certs/server.req:
           17  +	* tests/certs/cacert.pem: replaced by new ca.pem
           18  +	* tests/certs/skey.pem: replaced by new server.key
           19  +	* tests/certs/ckey.pem: replaced by new client.key
           20  +	* tests/certs/README.txt: new set of test certificates with some
           21  +	README info on their generation.
           22  +
           23  +	* tests/ciphers.test: updated ciphers expected with default
           24  +	openssl build.
           25  +
           26  +	* tests/tclIO.test: updated to use new names for certs/keys.
           27  +
     1     28   2001-03-14  Jeff Hobbs  <[email protected]>
     2     29   
     3     30   	* tls.c (Tls_Init): add do/while for random number initialization
     4     31   	to work around some OSes quirks.  ([email protected])
     5     32   
     6     33   2000-09-07  Jeff Hobbs  <[email protected]>
     7     34   

Modified README.txt from [b10c949569] to [0b15f3a7be].

     1      1   Copyright (C) 1997-2000 Matt Newman <[email protected]>
     2         -TLS 1.4 Copyright (C) 2000 Ajuba Solutions
            2  +TLS 1.4.1 Copyright (C) 2000 Ajuba Solutions
     3      3   
     4         -$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.2 2000/08/15 18:49:07 hobbs Exp $
            4  +$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.3 2001/06/21 23:34:20 hobbs Exp $
     5      5   
     6      6   TLS (aka SSL) Channel - can be layered on any bi-directional Tcl_Channel.
     7      7   
     8      8   Both client and server-side sockets are possible, and this code should work
     9      9   on any platform as it uses a generic mechanism for layering on SSL and Tcl.
    10     10   
    11     11   The TLS 1.4 release requires Tcl 8.2.0+, with 8.3.2+ preferred.  The
    12     12   stacked channel implementation in Tcl was originally introduced in 8.2.0
    13     13   (previously the Trf patch) and rewritten for 8.3.2+ due to inherent
    14     14   limitations in the earlier implementation.  TLS 1.4 should compile with
    15     15   any stubs-capable Tcl interpreter, but will require 8.2+ when loaded.
    16     16   There are known limitations in the 8.2.0-8.3.1 stacked channel
    17     17   implementation, so it is encouraged that people use TLS 1.4+ with an
    18         -8.3.2+ Tcl interpreter.
           18  +8.3.2+ Tcl interpreter.  These modifications are by Jeff Hobbs
           19  +<[email protected]>.
    19     20   
    20     21   Full filevent sematics should also be intact - see tests directory for
    21     22   blocking and non-blocking examples.
    22     23   
    23     24   This was built (almost) from scratch based upon observation of OpenSSL 0.9.2B
    24     25   
    25     26   Addition credit is due for Andreas Kupries ([email protected]), for