Skip to content

Releases: rustls/rustls

0.23.34

22 Oct 06:44
@djc djc
v/0.23.34

Choose a tag to compare

Fix docs.rs build after doc_auto_cfg stabilization.

What's Changed

0.23.33

17 Oct 09:43
@ctz ctz

Choose a tag to compare

  • New feature: foundational support for QUIC multipath draft - #2706 thanks to @flub
  • Bug fix: avoid long-running TLS1.3 connections from eventually failing with PeerMisbehaved::TooManyKeyUpdateRequests - #2709

What's Changed

New Contributors

Full Changelog: v/0.23.32...v/0.23.33

rustls-post-quantum 0.2.4

23 Sep 15:22
@djc djc
rustls-post-quantum-v/0.2.4

Choose a tag to compare

Support using ML-DSA keys for signing when the aws-lc-rs-unstable feature is enabled.

What's Changed

0.23.32

19 Sep 11:38
@ctz ctz

Choose a tag to compare

New feature: support verification of P256+SHA512 and P384-SHA512 ECDSA signatures with aws-lc-rs. This is not a recommended combination, but such signatures exist in the wild. Fixes #2661 and #2477.

What's Changed

Full Changelog: v/0.23.31...v/0.23.32

0.23.31

29 Jul 18:10
@ctz ctz

Choose a tag to compare

  • Fixes #2584 -- complete_io() not making progress when used with non-blocking IO. This was a regression in 0.23.30 (now yanked).

What's Changed

Full Changelog: v/0.23.30...v/0.23.31

0.23.30

27 Jul 13:08
@cpu cpu
v/0.23.30

Choose a tag to compare

  • Fixes a bug with the unbuffered connection API that could result in deframing junk data after a close notify alert was received.
  • Updates Connection::complete_io() to yield a WouldBlock error when both read/write operations are blocked.

What's Changed

  • Clarify the ambiguous process-level CryptoProvider error by @cpu in #2561
  • 0.23: cherry-pick of fixes to complete_io() with non-blocking transport by @ctz in #2578
  • sign: make public_key_to_spki() public by @djc in #2580
  • 0.23.30 release prep & 2575 backport by @cpu in #2576

Full Changelog: v/0.23.29...v/0.23.30

rustls-post-quantum-0.2.3

16 Jul 08:27
@djc djc
rustls-post-quantum-v/0.2.3

Choose a tag to compare

Add unstable support for verifying experimental post-quantum ML-DSA signature schemes.

What's Changed

  • post-quantum: add unstable ML-DSA support by @djc in #2550

0.23.29

10 Jul 11:57
@djc djc
v/0.23.29

Choose a tag to compare

  • Improved errors for invalid signature algorithms; added variants to both CertificateError and CertRevocationError to replace the UnsupportedSignatureAlgorithm variant (now deprecated) in order to provide more context.
  • Improved extension representation to increase handshake efficiency.

What's Changed

  • Delete unusable no-std ticketer code by @ctz in #2500
  • Support _ABSENT_PARAMS PKCS#1 signature algorithms by @ctz in #2505
  • Rework representation of extensions in ClientHello by @ctz in #2502
  • Rework representation of extensions in server messages by @ctz in #2508
  • Reduce small Vec<Enum> uses in extensions by @ctz in #2509
  • client: refactor in preparation for PSK support by @djc in #2516
  • client: pass all of ClientHelloInput into tls12 handle_server_hello() by @djc in #2518
  • client: refactor client handshake some more by @djc in #2521
  • Simplify the simpleserver example by using rustls::Stream by @Ten0 in #2522
  • Add SignatureSchemes for ML-DSA by @djc in #2532
  • add From<Arc<CertifiedKey>> for SingleCertAndKey by @stormshield-gt in #2535
  • Memoise computation of empty hash by @ctz in #2538
  • Correct calculation of ServerHello ECH confirmation by @ctz in #2545
  • Improve compactness of Debug impl for extensions by @ctz in #2546
  • Do not retain master secret during terminal key schedule state by @ctz in #2540
  • Adopt webpki 0.103.4 by @djc in #2531

0.23.28

16 Jun 11:46
@ctz ctz

Choose a tag to compare

What's Changed

  • fuzz: remove Cargo patch for webpki by @cpu in #2450
  • Update verifybench test data by @ctz in #2453
  • Update dependencies by @djc in #2452
  • manual: add a short howto debugging section by @cpu in #2451
  • chore(deps): update dependency go to v1.24.3 by @renovate-bot in #2454
  • SECURITY.md: temporal updates by @ctz in #2456
  • internals: clean up item order around ClientHelloPayload by @djc in #2457
  • Small clippy fixes by @cpu in #2458
  • Rework clippy setup by @ctz in #2460
  • Nightly clippy fixes by @ctz in #2461
  • Upgrade to criterion 0.6 by @djc in #2464
  • Move some tests about; reduce duplication of test helper code by @ctz in #2462
  • Enable more lints on internal crates by @ctz in #2465
  • Fix "Format (unstable)" job in CI by @ctz in #2466
  • Fix nightly docs by @ctz in #2467
  • Support rustls-graviola in rustls-bench by @ctz in #2469
  • Fix bug in crypto::aws_lc_rs::pq::hybrid::Layout by @cjpatton in #2470
  • Support secp256r1mlkem768 by @ctz in #2471
  • Convert more low-level integration tests into unit tests by @ctz in #2472
  • Disable clippy::clone_on_ref_ptr lint by @ctz in #2474
  • Prefer x.clone() to Arc::clone(&x) by @ctz in #2475
  • feat: expose the number of received TLS1.3 resumption tickets by @Frando in #2476
  • Convert more low-level integration tests into unit tests by @ctz in #2473
  • Eliminate redundant HandshakeMessagePayload::typ field by @ctz in #2478
  • Introduce specific error for unsupported signatures by @ctz in #2479
  • Take semver-compatible updates by @ctz in #2481
  • Further precursor refactors from "Improve TLS extension representation" by @ctz in #2482
  • Only include renegotiation SCSV for TLS1.2 attempts by @ctz in #2486
  • ci-bench: low-noise benchmarks with rustls-fuzzing-provider by @ctz in #2483
  • Expose named_groups extension in ClientHello by @ctz in #2488
  • Prepare 0.23.28 by @ctz in #2499

New Contributors

Full Changelog: v/0.23.27...v/0.23.28

0.23.27

05 May 20:25
@djc djc
v/0.23.27

Choose a tag to compare

  • Add support for connection-level ALPN protocol configuration.
  • Improve invalid key purpose errors.
  • Prefer post-quantum key exchange algorithms by default.
  • Add improved kTLS API.

What's Changed